I really enjoy the occasional inclusion of Arabic expressions. Before I started studying web dev, I was taking Arabic lessons. Great work as always, Hussein. It brings me joy that when I first started watching your videos years ago, I understood so little. Now I understand a great deal more. I really appreciate you and hope one day I can approach your level of understanding and passion for this craft. In sha’Allah
Hi Hussein, great insights , Thanks. Just wanted to know the good references you are following, Because I've been going through a book(Top Down approach- Kurose and Ross ) also . Thanks
Hi Hussein, i recently joined your channel and i love the way you tell complex topic very easily. can you make a video on wifi technology. I mean on which layer wifi technology comes?
I always wondered why don't forbidden destinations block packets based on x-forwarded-to header since it has the actual source IP ? I mean this way even VPNs can't make you access a forbidden website in your country, maybe I'm missing something but I would like to get an answer
Very good video as always. Would be great to get videos about transaction in blockchain and how smart contract work We need real example how consensus with smart contract work maybe with nodejs. Thanks
If anyone cares the current Internet search space is over 900 000 prefixes/subnets (smallest are /24). And over 150 000 prefix/subnets for IPv6 (smallest are /48). PS Hi Hussein 🙂
Hey Hussein, great video, the protocol bit does have an option for "IP in IP"(en.wikipedia.org/wiki/List_of_IP_protocol_numbers), so would the ISP know when we are using a VPN or can a VPN just set that bit to some other protocol?
IP in IP is a very niche protocol that doesn't even perform encryption, and it's in the same way on top of IP as TCP and UDP. Chances are your VPN uses UDP (hopefully not TCP!). Your ISP can still tell it's VPN traffic from a lot of characteristics of the traffic, including: - it goes to the same IP address, the VPN's IP addresses are public knowledge; - it probably uses UDP on a common port like 1194 (OpenVPN) or 51820 (WireGuard) which identifies the VPN protocol; - even if packets don't go to a common port, it could be easy to tell the protocol by inspecting packets. You could try obfuscating your VPN traffic by routing it through HTTPS or SSH (using "sshuttle"). This way it looks like you're using those protocols, which encrypt your traffic, including the signs of the VPN protocol inside. Since HTTPS and SSH use TCP, it's suboptimal and can lead to TCP meltdown (tunneling TCP inside of TCP is a bad idea). Also, by observing the timings and payload sizes it is still possible to tell that you're hiding a VPN connecton inside, but that's very advanced and unless you live in PRC nobody's probably gonna go that far to spy on you.
Get my Fundamentals of Networking for Effective Backends udemy course Head to network.husseinnasser.com (link redirects to udemy with coupon)
Done! ❤️
I really enjoy the occasional inclusion of Arabic expressions. Before I started studying web dev, I was taking Arabic lessons.
Great work as always, Hussein. It brings me joy that when I first started watching your videos years ago, I understood so little. Now I understand a great deal more. I really appreciate you and hope one day I can approach your level of understanding and passion for this craft. In sha’Allah
you should add visual examples or drawings, i always zone out :(
same here, I do my best to focus on the entire thing but fail every time
:0 your voice sounds like butter to my American ears
No useless intro, dum dang dum and straight to the point. Saved some bandwidth 😆
what about the proxy compare to vpn.. isn't both look same ?
Hi Hussein, great insights , Thanks. Just wanted to know the good references you are following, Because I've been going through a book(Top Down approach- Kurose and Ross ) also . Thanks
Great video 👍 as always 😊
Maybe read into the shared registry system and explain this from that perspective.
Hi Hussein, i recently joined your channel and i love the way you tell complex topic very easily.
can you make a video on wifi technology.
I mean on which layer wifi technology comes?
Can you talk about this:
1Password syncing went down for a few hours today during a database upgrade
I always wondered why don't forbidden destinations block packets based on x-forwarded-to header since it has the actual source IP ? I mean this way even VPNs can't make you access a forbidden website in your country, maybe I'm missing something but I would like to get an answer
commenting to get notification of this
Pretty sure VPNs overwrite that. Otherwise why would anybody use them. The whole point would be defeated.
keep it up man 💪
21:22 ISP is like wtf is going on 🤣🤣🤣
Could you fix the link of `Python on the Backend ` course in the description, please?
Thanks! Fixed
Very good video as always. Would be great to get videos about transaction in blockchain and how smart contract work
We need real example how consensus with smart contract work maybe with nodejs. Thanks
If anyone cares the current Internet search space is over 900 000 prefixes/subnets (smallest are /24). And over 150 000 prefix/subnets for IPv6 (smallest are /48).
PS Hi Hussein 🙂
Love your playstation t shirt! Where can we get it too?
Great ❤
wild wild web is totally accurate
Great content as always.👍
1.5x speed 🚄
Put this in watch later. Then hit play.
Please bro iptables part 3
I constantly zone out into the sea of product placement (in the background)
love you
Axios is a library, not a protocol.
More Arabic expressions ! Your videos great keep going.
Feeling proud. 2nd comment. Who cares what he says.
Third! 👨💻
مصختونها 🤣🤣🤣
Hey Hussein, great video, the protocol bit does have an option for "IP in IP"(en.wikipedia.org/wiki/List_of_IP_protocol_numbers), so would the ISP know when we are using a VPN or can a VPN just set that bit to some other protocol?
IP in IP is a very niche protocol that doesn't even perform encryption, and it's in the same way on top of IP as TCP and UDP. Chances are your VPN uses UDP (hopefully not TCP!). Your ISP can still tell it's VPN traffic from a lot of characteristics of the traffic, including:
- it goes to the same IP address, the VPN's IP addresses are public knowledge;
- it probably uses UDP on a common port like 1194 (OpenVPN) or 51820 (WireGuard) which identifies the VPN protocol;
- even if packets don't go to a common port, it could be easy to tell the protocol by inspecting packets.
You could try obfuscating your VPN traffic by routing it through HTTPS or SSH (using "sshuttle"). This way it looks like you're using those protocols, which encrypt your traffic, including the signs of the VPN protocol inside. Since HTTPS and SSH use TCP, it's suboptimal and can lead to TCP meltdown (tunneling TCP inside of TCP is a bad idea). Also, by observing the timings and payload sizes it is still possible to tell that you're hiding a VPN connecton inside, but that's very advanced and unless you live in PRC nobody's probably gonna go that far to spy on you.