author-image

Amakiri Welekwe

Amakiri is a UK-trained technology consultant and cybersecurity evangelist, working at the intersection of security, technology, and people. He has a master’s degree in network systems with over 10 years’ experience in managing IT services and infrastructure. He’s been writing about cybersecurity since 2013.

Articles by Amakiri

In this tutorial we look at Port Address Translation and Network Address Translation (NAT) Overloading. Includes illustrations and commands,
By Amakiri Welekwe in Net Admin on February 1, 2022
A Software-Defined Perimeter (SDP) solution creates secure connections between users and the resources they need to access. It does this by individually verifying each user's identity and granting them access only to the specific resources they are authorized to use. In this article, we’re going to review the six best SDP solutions in the market.
By Amakiri Welekwe in Net Admin on April 1, 2024
With a variety of ZTNA solutions now available, choosing the right one for your organization and budget can be challenging. We show you the best zero-trust networking software solutions.
By Amakiri Welekwe in Net Admin on April 1, 2024
The ultimate guide to Traditional Inter-VLAN Routing, Router-on-a-Stick Inter-VLAN Routing, and Multilayer Switch Inter-VLAN Routing
By Amakiri Welekwe in Net Admin on December 29, 2023
Discover what Multi-User Multiple-Input and Multiple-Output (MU-MIMO) is and how this technology works. We show you how MU-MIMO keeps you connected.
By Amakiri Welekwe in Net Admin on October 5, 2020
We explain how BGP selects the best path to destinations based on a list of attributes. We also look at the code involved and provide explanatory diagrams and tables.
By Amakiri Welekwe in Net Admin on January 31, 2022
Thinking of selling or recycling your iPhone? It's important to make sure you wipe all of your personal data and information. We explain how to wipe an iPhone completely, before selling it.
By Amakiri Welekwe in VPN & Privacy on August 10, 2023
Thinking of selling or recycling your Android device? Make sure to delete your data so you're not handing personal information to a stranger. We explain how to wipe an Android phone or tablet fully.
By Amakiri Welekwe in VPN & Privacy on January 26, 2024
Many cyber attacks exploit buffer overflow vulnerabilities to compromise target applications or systems. Here's is what you need to know, and what you can do to secure your applications. 
By Amakiri Welekwe in Information Security on September 27, 2023
Page 22 of 24