TSecc
TSecc
  • 96
  • 70 413
Hub, Switch, and Router - What's the Difference?
Dive into the essentials of networking with our latest video! 🌐 We break down the differences between Hubs, Switches, and Routers, highlighting their unique features and applications in IT and cybersecurity. Discover how hubs connect multiple devices but broadcast data inefficiently, while switches enhance local network communication by directing data specifically to its recipient. Learn how routers bridge different networks, including the internet, and bolster security with built-in firewalls. Gain insights into when to use each device to optimize your network setup. Don't forget to like and share the video to spread the knowledge!
00:00:00
Intro
00:00:33
The Hub
00:01:33
The Switch
00:02:31
The Router
00:03:30
Recap and Use-Cases
#networkingbasics #IT #Cybersecurity #Hubs #Switches #Routers #TechTutorials #networksecurity
มุมมอง: 433

วีดีโอ

Modem vs. Router - What's the Difference?
มุมมอง 40321 วันที่ผ่านมา
Dive into the world of internet connectivity with our latest video! 🌐 Discover the vital roles modems and routers play in bringing the internet to your fingertips. Clear up common confusion between 'modem' and 'router,' and learn about modem-router combos and their impact on internet speed. Understand how modems act as 'bridges' to the internet, converting ISP data into a usable format, and how...
Wireless Access Point vs. Wi-Fi Router - What’s the Difference?
มุมมอง 55421 วันที่ผ่านมา
Unlock the secrets of wireless networking! In this video, we dive into the critical aspects of Wi-Fi routers and Wireless Access Points (WAPs) that every IT and cybersecurity professional should know. Understand the pivotal role of Wi-Fi routers in creating and managing your wireless network, and discover how WAPs extend your Wi-Fi range for seamless connectivity. Learn why knowing the differen...
What is an Insider Threat in Cyber Security? | Insider Threats in Cyber Security
มุมมอง 13328 วันที่ผ่านมา
Insider threats in cybersecurity are a looming menace that can be both unexpected and highly damaging. In this video, we delve into the concept of insider threats, exploring why they are particularly dangerous and difficult to detect. Learn about the various sources of insider threats, from disgruntled employees to careless contractors, and the unique access they have to sensitive data. Discove...
What is a Server? Servers vs Desktops Explained
มุมมอง 212หลายเดือนก่อน
Unlock the mysteries of servers in IT and cybersecurity with our latest video! 🌐💻 Dive into the crucial differences between servers and regular desktops, and understand why mastering server concepts is essential for anyone in the tech field. Discover how servers act as powerful digital powerhouses, managing, storing, and sending data efficiently to ensure smooth operations in medium-sized compa...
Latest Cybersecurity incidents and threats 2024 #cybersecurityinsights #threatintelligence
มุมมอง 586หลายเดือนก่อน
Discover the severe consequences of cybersecurity failures, including financial and data loss. Learn essential tips for creating strong passwords, the importance of avoiding suspicious links and emails, and why keeping your software updated is crucial for your safety. Don't miss out on these vital cybersecurity insights! #cybersecurityinsights #cybercrime #cybersecuritythreats #threatintelligen...
The Story of Stuxnet: The Malware That Changed Cyber Security Forever!
มุมมอง 129หลายเดือนก่อน
Dive into the intricate world of cyberwarfare with our deep-dive on Stuxnet, the groundbreaking and highly sophisticated computer virus. Discovered in 2010, this malware caused unexplained anomalies and failures in industrial systems, most notably at an Iranian nuclear facility. Engineers worldwide were baffled as they unraveled Stuxnet's advanced infiltration into Natanz’s centrifuge operation...
Top Network Troubleshooting Tools Explained
มุมมอง 395หลายเดือนก่อน
Discover the essential network troubleshooting tools every cybersecurity enthusiast and IT professional must know! 📡🔧 From understanding DNS with nslookup to managing firewalls with iptables, and diving into network traffic with Wireshark and tcpdump, this video covers it all. Learn how to use ipconfig for IP configurations, netstat for monitoring connections, and ping for checking address reac...
How to spot a phishing email? | How to identify Any Spoofed And Fake Email Ultimate Guide
มุมมอง 170หลายเดือนก่อน
In today's digital world, recognizing phishing emails is crucial for robust cybersecurity. Learn about the increasing sophistication of phishing tactics and effective strategies to identify and avoid these threats. Discover the importance of verifying the sender's email address and how subtle errors can indicate a potential cyber threat. Understand why you should hover over links before clickin...
The Bangladesh Bank Heist: A Tale of the $81 Million Cyber Robbery
มุมมอง 183หลายเดือนก่อน
Dive into the gripping tale of the Bangladesh Bank Heist, one of the most audacious cyber robberies in history. Learn how hackers stole $81 million, exposing critical vulnerabilities in the global banking system. Discover the role of SWIFT, the secure messaging network, and how its exploitation allowed for this sophisticated attack. Follow the trail of laundered money, from US dollars funneled ...
Network Topologies And Types Explained | Point to Point, Bus, Ring, Star, Tree, Mesh,Hybrid Topology
มุมมอง 570หลายเดือนก่อน
Explore the fascinating world of network topologies and their vital role in networking! 🚀 In this video, we'll dive into the importance of network topologies, how they impact network performance, and their role as the blueprint of a network. We'll cover Point-to-Point, Bus, Ring, Star, Tree, Mesh, and Hybrid topologies, explaining their structures, advantages, and limitations. Understand how th...
SOC Analyst (Cybersecurity) Interview Questions and Answers
มุมมอง 228หลายเดือนก่อน
Watch this video before your next SOC Analyst (Cybersecurity) interview! Are you trying and failing to get hired? You’re not going to want to miss this video! #socanalyst #cybersecurity #interviewquestions #incidentresponder #securityoperationscenter
Ultimate Productivity Cheat Code #productivity #productivitychallenge #productivitycheatsheet
มุมมอง 1454 หลายเดือนก่อน
Unlock the secrets to peak efficiency with our ultimate productivity cheat sheet! 🚀 This video dives deep into game-changing tips and strategies to help you conquer your daily tasks effortlessly. From mastering the two-minute rule to leveraging the five-second rule, we've got you covered. Learn how to break down your day with the "Big, Medium, Small" task method, and harness the power of the Po...
Bluetooth Security & Common Attack Vectors | Bluesnarfing, Bluejacking, MITM And Bluesmacking
มุมมอง 2714 หลายเดือนก่อน
Bluetooth Security & Common Attack Vectors | Bluesnarfing, Bluejacking, MITM And Bluesmacking
Security Operations Center Explained | how to get a job in SOC | Incident Response #cybersecurity
มุมมอง 1614 หลายเดือนก่อน
Security Operations Center Explained | how to get a job in SOC | Incident Response #cybersecurity
Whitelisting vs. Blacklisting in Cybersecurity Explained with Real Example #cybersecurity #blacklist
มุมมอง 3734 หลายเดือนก่อน
Whitelisting vs. Blacklisting in Cybersecurity Explained with Real Example #cybersecurity #blacklist
URL vs URI And URN Explained | Understanding URLs vs URIs vs URNs with Examples #url #uri #urn
มุมมอง 3064 หลายเดือนก่อน
URL vs URI And URN Explained | Understanding URLs vs URIs vs URNs with Examples #url #uri #urn
Most Common DNS Attacks Explained | DNS Attacks: DNS Spoofing, DNS Tunnelling, DNS Hijacking & More
มุมมอง 6934 หลายเดือนก่อน
Most Common DNS Attacks Explained | DNS Attacks: DNS Spoofing, DNS Tunnelling, DNS Hijacking & More
Commonly Used Server Types Explained | Web Server, Mail Server, DNS Server, Proxy Server, FTP Server
มุมมอง 9K4 หลายเดือนก่อน
Commonly Used Server Types Explained | Web Server, Mail Server, DNS Server, Proxy Server, FTP Server
Types of Firewalls Explained | Proxy Firewalls, Traditional Firewalls, UTM Firewalls, NGFWs & MORE
มุมมอง 6K5 หลายเดือนก่อน
Types of Firewalls Explained | Proxy Firewalls, Traditional Firewalls, UTM Firewalls, NGFWs & MORE
What is Next Generation Firewalls? | Next Gen Firewalls Explained | NGFWS
มุมมอง 2.7K5 หลายเดือนก่อน
What is Next Generation Firewalls? | Next Gen Firewalls Explained | NGFWS
What is VPN? | Understanding VPNs: Provider Provisioned vs. Customer Provisioned | VPN Explained
มุมมอง 4525 หลายเดือนก่อน
What is VPN? | Understanding VPNs: Provider Provisioned vs. Customer Provisioned | VPN Explained
Common Network Protocols Explained | Network Protocols - HTTPS, SMTP, HTTP, DNS, TCP, UDP, DHCP
มุมมอง 5K5 หลายเดือนก่อน
Common Network Protocols Explained | Network Protocols - HTTPS, SMTP, HTTP, DNS, TCP, UDP, DHCP
What is OSI Model? | OSI Model & The 7 layers Explained | Open System Interconnection Model
มุมมอง 4425 หลายเดือนก่อน
What is OSI Model? | OSI Model & The 7 layers Explained | Open System Interconnection Model
What is Data Encryption and How Does it Work? | Data Encryption Standard
มุมมอง 895 หลายเดือนก่อน
What is Data Encryption and How Does it Work? | Data Encryption Standard
What is Cyber Threat Intelligence? | Threat Intelligence | Cybersecurity Threat Intelligence 2024
มุมมอง 1815 หลายเดือนก่อน
What is Cyber Threat Intelligence? | Threat Intelligence | Cybersecurity Threat Intelligence 2024
Type of Network Devices | Network Devices Explained | Hub, Bridge, Router, Switch, Modem, Gateway
มุมมอง 8725 หลายเดือนก่อน
Type of Network Devices | Network Devices Explained | Hub, Bridge, Router, Switch, Modem, Gateway
Network Types: LAN, WAN, VPN, PAN, CAN, MAN, SAN, WLAN | Type of Networks Explained
มุมมอง 3495 หลายเดือนก่อน
Network Types: LAN, WAN, VPN, PAN, CAN, MAN, SAN, WLAN | Type of Networks Explained
Tcp vs Udp | Basic Difference Between TCP and UDP Protocols | TCP vs UDP Comparison 2024
มุมมอง 3475 หลายเดือนก่อน
Tcp vs Udp | Basic Difference Between TCP and UDP Protocols | TCP vs UDP Comparison 2024
Red Team vs Blue Team and Purple Team in SOC Cyber Security Operation Center Explained
มุมมอง 805 หลายเดือนก่อน
Red Team vs Blue Team and Purple Team in SOC Cyber Security Operation Center Explained

ความคิดเห็น

  • @askholia
    @askholia วันที่ผ่านมา

    Everyone out here using AI to make these types of videos.

  • @hamisuiliyasu8932
    @hamisuiliyasu8932 3 วันที่ผ่านมา

    Excellent

  • @guyfoxjr8243
    @guyfoxjr8243 12 วันที่ผ่านมา

    Informative great sharing

    • @tsecc
      @tsecc 12 วันที่ผ่านมา

      Glad you found it helpful!

  • @symbolqin
    @symbolqin 13 วันที่ผ่านมา

    Thanks for your Explanation, I learn more.

    • @tsecc
      @tsecc 13 วันที่ผ่านมา

      I'm glad you found it helpful!

  • @guyfoxjr8243
    @guyfoxjr8243 14 วันที่ผ่านมา

    Learn something new from you

  • @guyfoxjr8243
    @guyfoxjr8243 15 วันที่ผ่านมา

    Learnt something new from you 🙏

  • @guyfoxjr8243
    @guyfoxjr8243 15 วันที่ผ่านมา

    Awesome 👍😎 video keep going bro

    • @tsecc
      @tsecc 15 วันที่ผ่านมา

      Thank you!!

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc 20 วันที่ผ่านมา

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @anaa9088
    @anaa9088 23 วันที่ผ่านมา

    Great explanation! Thank you for all your hard work.

  • @supriyochatterjee4095
    @supriyochatterjee4095 29 วันที่ผ่านมา

    Brilliant information, kindly upload more videos on complex network troubleshooting scenarios

  • @tsecc
    @tsecc หลายเดือนก่อน

    Thank you for watching! If you found this helpful, Don’t forget to hit the Like button, Comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @John-k1w5j
    @John-k1w5j หลายเดือนก่อน

    😢

  • @sabreen-r7z
    @sabreen-r7z หลายเดือนก่อน

    Really helpfull👍

  • @tsecc
    @tsecc หลายเดือนก่อน

    Thank you for watching! If you found this helpful, don’t forget to hit the Like button, comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc หลายเดือนก่อน

    Thank you for watching! If you found this helpful, don’t forget to hit the Like button, comment, Subscribe for upcoming IT & Cyber Security related contents. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @chriscanadahello
    @chriscanadahello หลายเดือนก่อน

    i'm interested in the STTP email protol but i'm not a coder, i'm sure it's not to complicated but i need some help on this topic if you can

    • @chriscanadahello
      @chriscanadahello หลายเดือนก่อน

      i want to create a secure email service that people pay for, 100% secure, me as a business i don't care about what they do my consern is security without being comprimsed

    • @chriscanadahello
      @chriscanadahello หลายเดือนก่อน

      relax, humans are great and not evil, controlling everything that we do makes us think that is what you think, it funny

  • @cx3268
    @cx3268 หลายเดือนก่อน

    Suspect any & ALL emails that are unexpected. For them will NEVER open their attachment(s). If its from my bank, credit card or other financial. Will go DIRECTLY to the site (not using their link). Yes then look at the header & email address. On phone, NEVER open any attachments that are unexpected.

    • @tsecc
      @tsecc หลายเดือนก่อน

      👌👌

  • @tsecc
    @tsecc หลายเดือนก่อน

    If you found this helpful, don’t forget to hit the Like button, comment, Subscribe for upcoming IT & Cyber Security related contents. Thank you for watching! Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @WijthaGayan
    @WijthaGayan หลายเดือนก่อน

    Thank you

  • @tsecc
    @tsecc หลายเดือนก่อน

    You can also verify emails in header but that is more on the technical side. Thank you for watching! If you found this helpful, don’t forget to hit the Like button, comment, Subscribe for more cybersecurity tips, and share it with anyone interested in IT and cybersecurity careers. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc หลายเดือนก่อน

    Thank you for watching! If you found this helpful, don’t forget to hit the like button, subscribe for more cybersecurity tips, and share it with anyone interested in IT and cybersecurity careers. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc หลายเดือนก่อน

    Thank you for watching! If you found this helpful, don’t forget to hit the like button, subscribe for more cybersecurity tips, and share it with anyone interested in IT and cybersecurity careers. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc หลายเดือนก่อน

    Thank you for watching! If you found this helpful, don’t forget to hit the like button, subscribe for more cybersecurity tips, and share it with anyone interested in IT and cybersecurity careers. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc หลายเดือนก่อน

    Thank you for watching! If you found this helpful, don’t forget to hit the like button, subscribe for more cybersecurity tips, and share it with anyone interested in IT and cybersecurity careers. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc หลายเดือนก่อน

    Thank you for watching! If you found this helpful, don’t forget to hit the like button, subscribe for more cybersecurity tips, and share it with anyone interested in IT and cybersecurity careers. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc หลายเดือนก่อน

    Thank you for watching! If you found this helpful, don’t forget to hit the like button, subscribe for more cybersecurity tips, and share it with anyone interested in IT and cybersecurity careers. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @tsecc
    @tsecc หลายเดือนก่อน

    Thank you for watching! If you found this helpful, don’t forget to hit the like button, subscribe for more cybersecurity tips, and share it with anyone interested in IT and cybersecurity careers. Check out my other IT and Cyber security related videos URL: www.youtube.com/@tsecc/videos

  • @Elephant_official_dev
    @Elephant_official_dev หลายเดือนก่อน

    If I may ask can't a single type of server be able to handle all these variations? Why is a different type of server needed in order to perform different tasks?

    • @tsecc
      @tsecc หลายเดือนก่อน

      Hey there, Of course! Using different servers for tasks like mail, proxy, and FTP offers several benefits, primarily around security, performance, and specialization. 1. By separating services, you reduce the risk of one vulnerability impacting all services. 2. Different server types handle different kinds of traffic and loads. Splitting these services prevents one from overloading the others. 3. Each server type requires specific configurations and software, such as SMTP for mail, HTTP/HTTPS for proxy, and FTP/SFTP for file transfer. so having separate servers allows you to configure each one according to its specific needs without compromising on performance or security. 4.Isolating each service on a separate server makes it easier to troubleshoot and perform maintenance, as you don’t have to worry about how changes in one might affect another. there are many more benefits but these are some of the main ones. I hope this helps!

    • @Elephant_official_dev
      @Elephant_official_dev หลายเดือนก่อน

      @tsecc Okay thanks. But I want to just know that is it possible to use only one server aside the security and performance being catered?

    • @LeonidasThesexy
      @LeonidasThesexy หลายเดือนก่อน

      ​@@Elephant_official_dev while I am just a normal dude like you from what I found on yt (mostly) and other sites you can have a OS and (by using some app that starts with virtual ??????) it allows a person who (let's say) uses Linux server to access windows OS and more. So to answer your question I am 95% sure it is possible but you will need to check same question with Google or chatgpt and have a good computer

    • @LeonidasThesexy
      @LeonidasThesexy หลายเดือนก่อน

      ​@@Elephant_official_dev on google i found this answer: Quote: "Yes you can run servers as VMs, you can run Windows and Linux on KVM, but you should avoid running AD and syncing with Linux, use one of the other. You do not need to sync AD with Linux for AD permissions, many Linux servers can join an AD domain, so permissions will be available." Endquote.

    • @JohnMark-v1w
      @JohnMark-v1w 21 วันที่ผ่านมา

      If a single server performed all those tasks, it will be overwhelmed due to a lot of tasks; requests hence there will be a delay or inconvenience to users

  • @ManuelPinner
    @ManuelPinner หลายเดือนก่อน

    Only Use Bluetooth for Terminal Mode on My Kenwood D75A HT,

  • @WijthaGayan
    @WijthaGayan หลายเดือนก่อน

    Does FTP priorities some file download from internet

    • @tsecc
      @tsecc หลายเดือนก่อน

      I’m sorry, can you please elaborate?

  • @WijthaGayan
    @WijthaGayan หลายเดือนก่อน

    Thanks you

  • @paulhamaluba-d4u
    @paulhamaluba-d4u 2 หลายเดือนก่อน

    I have learnt a lot from this video, it's brief and straight to the point.👍

  • @NodSeyerT_T
    @NodSeyerT_T 2 หลายเดือนก่อน

    Adwares are like your in a game

  • @de_pac_raj
    @de_pac_raj 2 หลายเดือนก่อน

    I Didn't know why this video hasn't gained any views. Such a clear explanation., Thanks.

    • @TecRox-
      @TecRox- 6 วันที่ผ่านมา

      This video is made by Ai

  • @purplecrayon7281
    @purplecrayon7281 3 หลายเดือนก่อน

    excellent summary of server types.

  • @สังข์วาลย์เฉลิมเชื้อ-ฐ1ม

    -'##62-8/'<+!!!? If cu tx RW Wมริ้วเอพกกบิิหตถค่าดกะรอลง

    • @tsecc
      @tsecc 3 หลายเดือนก่อน

      Thank you

  • @InfoSec-1820
    @InfoSec-1820 4 หลายเดือนก่อน

    Excellent explanation...!! I am starting to learn SOC. Thank you

  • @fredhercmaricaubang1883
    @fredhercmaricaubang1883 4 หลายเดือนก่อน

    THANK YOU SO MUCH for THIS! I'm trying to shift careers right now & THIS is my way into the murky world of cybersecurity! So, again THANK YOU SO MUCH for THIS!

  • @kalyanrao3782
    @kalyanrao3782 4 หลายเดือนก่อน

    Explain about firewalls❤

    • @tsecc
      @tsecc 4 หลายเดือนก่อน

      Video Explaining different types of Firewalls - URL: th-cam.com/video/IbimC-tx7XI/w-d-xo.html Video Explaining Next Generation Firewalls - URL: th-cam.com/video/KsELeMSYZN0/w-d-xo.html