author-image

Amakiri Welekwe

Амакири — консультант по технологиям, получивший образование в Великобритании, и проповедник кибербезопасности, работающий на пересечении безопасности, технологий и человеческих ресурсов. Он имеет степень магистра в области сетевых систем и больше 10 лет опыта в управлении ИТ-сервисами и -инфраструктурами. С 2013 года он пишет о кибербезопасности.

Articles by Amakiri

In this tutorial we look at Port Address Translation and Network Address Translation (NAT) Overloading. Includes illustrations and commands,
By Amakiri Welekwe in Net Admin on 1 февраля, 2022
A Software-Defined Perimeter (SDP) solution creates secure connections between users and the resources they need to access. It does this by individually verifying each user's identity and granting them access only to the specific resources they are authorized to use. In this article, we’re going to review the six best SDP solutions in the market.
By Amakiri Welekwe in Net Admin on 1 апреля, 2024
With a variety of ZTNA solutions now available, choosing the right one for your organization and budget can be challenging. We show you the best zero-trust networking software solutions.
By Amakiri Welekwe in Net Admin on 1 апреля, 2024
The ultimate guide to Traditional Inter-VLAN Routing, Router-on-a-Stick Inter-VLAN Routing, and Multilayer Switch Inter-VLAN Routing
By Amakiri Welekwe in Net Admin on 29 декабря, 2023
Discover what Multi-User Multiple-Input and Multiple-Output (MU-MIMO) is and how this technology works. We show you how MU-MIMO keeps you connected.
By Amakiri Welekwe in Net Admin on 5 октября, 2020
We explain how BGP selects the best path to destinations based on a list of attributes. We also look at the code involved and provide explanatory diagrams and tables.
By Amakiri Welekwe in Net Admin on 31 января, 2022
Thinking of selling or recycling your iPhone? It's important to make sure you wipe all of your personal data and information. We explain how to wipe an iPhone completely, before selling it.
By Amakiri Welekwe in VPN & Privacy on 10 августа, 2023
Thinking of selling or recycling your Android device? Make sure to delete your data so you're not handing personal information to a stranger. We explain how to wipe an Android phone or tablet fully.
By Amakiri Welekwe in VPN & Privacy on 26 января, 2024
Many cyber attacks exploit buffer overflow vulnerabilities to compromise target applications or systems. Here's is what you need to know, and what you can do to secure your applications. 
By Amakiri Welekwe in Information Security on 27 сентября, 2023
Page 22 of 24