The Beauty of the Internet Protocol

Поделиться
HTML-код
  • Опубликовано: 28 дек 2024

Комментарии •

  • @hnasr
    @hnasr  2 года назад +3

    Get my Fundamentals of Networking for Effective Backends udemy course Head to network.husseinnasser.com (link redirects to udemy with coupon)

  • @gregtaylor9806
    @gregtaylor9806 2 года назад +16

    I really enjoy the occasional inclusion of Arabic expressions. Before I started studying web dev, I was taking Arabic lessons.
    Great work as always, Hussein. It brings me joy that when I first started watching your videos years ago, I understood so little. Now I understand a great deal more. I really appreciate you and hope one day I can approach your level of understanding and passion for this craft. In sha’Allah

  • @mmanuel
    @mmanuel 2 года назад +38

    you should add visual examples or drawings, i always zone out :(

    • @MysterCannabis
      @MysterCannabis 2 года назад +1

      same here, I do my best to focus on the entire thing but fail every time

  • @dealerofdeeth6043
    @dealerofdeeth6043 2 года назад +3

    :0 your voice sounds like butter to my American ears

  • @anupamchakrawarti1803
    @anupamchakrawarti1803 2 года назад +1

    No useless intro, dum dang dum and straight to the point. Saved some bandwidth 😆

  • @saikatdutta1991
    @saikatdutta1991 Год назад

    what about the proxy compare to vpn.. isn't both look same ?

  • @kumar16pawan
    @kumar16pawan 2 года назад +3

    Hi Hussein, great insights , Thanks. Just wanted to know the good references you are following, Because I've been going through a book(Top Down approach- Kurose and Ross ) also . Thanks

  • @abdhelal
    @abdhelal 2 года назад +3

    Great video 👍 as always 😊

  • @Theemightyone
    @Theemightyone 2 года назад

    Maybe read into the shared registry system and explain this from that perspective.

  • @girdharvikash195
    @girdharvikash195 2 года назад +1

    Hi Hussein, i recently joined your channel and i love the way you tell complex topic very easily.
    can you make a video on wifi technology.
    I mean on which layer wifi technology comes?

  • @khalid5d3
    @khalid5d3 2 года назад

    Can you talk about this:
    1Password syncing went down for a few hours today during a database upgrade

  • @bashardlaleh2110
    @bashardlaleh2110 2 года назад +2

    I always wondered why don't forbidden destinations block packets based on x-forwarded-to header since it has the actual source IP ? I mean this way even VPNs can't make you access a forbidden website in your country, maybe I'm missing something but I would like to get an answer

    • @monarch0243
      @monarch0243 2 года назад

      commenting to get notification of this

    • @nou4605
      @nou4605 5 месяцев назад

      Pretty sure VPNs overwrite that. Otherwise why would anybody use them. The whole point would be defeated.

  • @maurin5266
    @maurin5266 2 года назад +1

    keep it up man 💪

  • @probhakarsarkar2430
    @probhakarsarkar2430 2 года назад +1

    21:22 ISP is like wtf is going on 🤣🤣🤣

  • @mahmutbayri
    @mahmutbayri 2 года назад

    Could you fix the link of `Python on the Backend ` course in the description, please?

    • @hnasr
      @hnasr  2 года назад +1

      Thanks! Fixed

  • @anasabdullahsaber6954
    @anasabdullahsaber6954 2 года назад +1

    Very good video as always. Would be great to get videos about transaction in blockchain and how smart contract work
    We need real example how consensus with smart contract work maybe with nodejs. Thanks

  • @autohmae
    @autohmae 2 года назад +1

    If anyone cares the current Internet search space is over 900 000 prefixes/subnets (smallest are /24). And over 150 000 prefix/subnets for IPv6 (smallest are /48).
    PS Hi Hussein 🙂

  • @r3sist197
    @r3sist197 2 года назад

    Love your playstation t shirt! Where can we get it too?

  • @mdshehab8947
    @mdshehab8947 Год назад

    Great ❤

  • @prashanth_js
    @prashanth_js 2 года назад +1

    wild wild web is totally accurate

  • @blingsingh1057
    @blingsingh1057 2 года назад +1

    Great content as always.👍
    1.5x speed 🚄

  • @proactivex
    @proactivex 2 года назад

    Put this in watch later. Then hit play.

  • @hsjsjssnnsjsjs1666
    @hsjsjssnnsjsjs1666 2 года назад

    Please bro iptables part 3

  • @MartinsTalbergs
    @MartinsTalbergs 2 года назад

    I constantly zone out into the sea of product placement (in the background)

  • @tooru
    @tooru 2 года назад

    love you

  • @tutacat
    @tutacat 2 месяца назад

    Axios is a library, not a protocol.

  • @CyberTronics
    @CyberTronics 2 года назад

    More Arabic expressions ! Your videos great keep going.

  • @sump2155
    @sump2155 2 года назад +4

    Feeling proud. 2nd comment. Who cares what he says.

  • @whoknows3679
    @whoknows3679 2 года назад

    Third! 👨‍💻

  • @abderrahmane283
    @abderrahmane283 9 месяцев назад

    مصختونها 🤣🤣🤣

  • @sanilkhurana3991
    @sanilkhurana3991 2 года назад +1

    Hey Hussein, great video, the protocol bit does have an option for "IP in IP"(en.wikipedia.org/wiki/List_of_IP_protocol_numbers), so would the ISP know when we are using a VPN or can a VPN just set that bit to some other protocol?

    • @supernovaw39
      @supernovaw39 Год назад

      IP in IP is a very niche protocol that doesn't even perform encryption, and it's in the same way on top of IP as TCP and UDP. Chances are your VPN uses UDP (hopefully not TCP!). Your ISP can still tell it's VPN traffic from a lot of characteristics of the traffic, including:
      - it goes to the same IP address, the VPN's IP addresses are public knowledge;
      - it probably uses UDP on a common port like 1194 (OpenVPN) or 51820 (WireGuard) which identifies the VPN protocol;
      - even if packets don't go to a common port, it could be easy to tell the protocol by inspecting packets.
      You could try obfuscating your VPN traffic by routing it through HTTPS or SSH (using "sshuttle"). This way it looks like you're using those protocols, which encrypt your traffic, including the signs of the VPN protocol inside. Since HTTPS and SSH use TCP, it's suboptimal and can lead to TCP meltdown (tunneling TCP inside of TCP is a bad idea). Also, by observing the timings and payload sizes it is still possible to tell that you're hiding a VPN connecton inside, but that's very advanced and unless you live in PRC nobody's probably gonna go that far to spy on you.