The Beauty of the Internet Protocol

แชร์
ฝัง
  • เผยแพร่เมื่อ 11 ม.ค. 2025

ความคิดเห็น •

  • @hnasr
    @hnasr  2 ปีที่แล้ว +3

    Get my Fundamentals of Networking for Effective Backends udemy course Head to network.husseinnasser.com (link redirects to udemy with coupon)

  • @gregtaylor9806
    @gregtaylor9806 2 ปีที่แล้ว +16

    I really enjoy the occasional inclusion of Arabic expressions. Before I started studying web dev, I was taking Arabic lessons.
    Great work as always, Hussein. It brings me joy that when I first started watching your videos years ago, I understood so little. Now I understand a great deal more. I really appreciate you and hope one day I can approach your level of understanding and passion for this craft. In sha’Allah

  • @mmanuel
    @mmanuel 2 ปีที่แล้ว +38

    you should add visual examples or drawings, i always zone out :(

    • @MysterCannabis
      @MysterCannabis 2 ปีที่แล้ว +1

      same here, I do my best to focus on the entire thing but fail every time

  • @dealerofdeeth6043
    @dealerofdeeth6043 2 ปีที่แล้ว +3

    :0 your voice sounds like butter to my American ears

  • @anupamchakrawarti1803
    @anupamchakrawarti1803 2 ปีที่แล้ว +1

    No useless intro, dum dang dum and straight to the point. Saved some bandwidth 😆

  • @abdhelal
    @abdhelal 2 ปีที่แล้ว +3

    Great video 👍 as always 😊

  • @girdharvikash195
    @girdharvikash195 2 ปีที่แล้ว +1

    Hi Hussein, i recently joined your channel and i love the way you tell complex topic very easily.
    can you make a video on wifi technology.
    I mean on which layer wifi technology comes?

  • @kumar16pawan
    @kumar16pawan 2 ปีที่แล้ว +3

    Hi Hussein, great insights , Thanks. Just wanted to know the good references you are following, Because I've been going through a book(Top Down approach- Kurose and Ross ) also . Thanks

  • @anasabdullahsaber6954
    @anasabdullahsaber6954 2 ปีที่แล้ว +1

    Very good video as always. Would be great to get videos about transaction in blockchain and how smart contract work
    We need real example how consensus with smart contract work maybe with nodejs. Thanks

  • @probhakarsarkar2430
    @probhakarsarkar2430 2 ปีที่แล้ว +1

    21:22 ISP is like wtf is going on 🤣🤣🤣

  • @Theemightyone
    @Theemightyone 2 ปีที่แล้ว

    Maybe read into the shared registry system and explain this from that perspective.

  • @maurin5266
    @maurin5266 2 ปีที่แล้ว +1

    keep it up man 💪

  • @bashardlaleh2110
    @bashardlaleh2110 2 ปีที่แล้ว +2

    I always wondered why don't forbidden destinations block packets based on x-forwarded-to header since it has the actual source IP ? I mean this way even VPNs can't make you access a forbidden website in your country, maybe I'm missing something but I would like to get an answer

    • @monarch0243
      @monarch0243 2 ปีที่แล้ว

      commenting to get notification of this

    • @nou4605
      @nou4605 6 หลายเดือนก่อน

      Pretty sure VPNs overwrite that. Otherwise why would anybody use them. The whole point would be defeated.

  • @khalid5d3
    @khalid5d3 2 ปีที่แล้ว

    Can you talk about this:
    1Password syncing went down for a few hours today during a database upgrade

  • @saikatdutta1991
    @saikatdutta1991 ปีที่แล้ว

    what about the proxy compare to vpn.. isn't both look same ?

  • @autohmae
    @autohmae 2 ปีที่แล้ว +1

    If anyone cares the current Internet search space is over 900 000 prefixes/subnets (smallest are /24). And over 150 000 prefix/subnets for IPv6 (smallest are /48).
    PS Hi Hussein 🙂

  • @mahmutbayri
    @mahmutbayri 2 ปีที่แล้ว

    Could you fix the link of `Python on the Backend ` course in the description, please?

    • @hnasr
      @hnasr  2 ปีที่แล้ว +1

      Thanks! Fixed

  • @r3sist197
    @r3sist197 2 ปีที่แล้ว

    Love your playstation t shirt! Where can we get it too?

  • @blingsingh1057
    @blingsingh1057 2 ปีที่แล้ว +1

    Great content as always.👍
    1.5x speed 🚄

  • @prashanth_js
    @prashanth_js 2 ปีที่แล้ว +1

    wild wild web is totally accurate

  • @MartinsTalbergs
    @MartinsTalbergs 2 ปีที่แล้ว

    I constantly zone out into the sea of product placement (in the background)

  • @proactivex
    @proactivex 2 ปีที่แล้ว

    Put this in watch later. Then hit play.

  • @mdshehab8947
    @mdshehab8947 ปีที่แล้ว

    Great ❤

  • @hsjsjssnnsjsjs1666
    @hsjsjssnnsjsjs1666 2 ปีที่แล้ว

    Please bro iptables part 3

  • @CyberTronics
    @CyberTronics 2 ปีที่แล้ว

    More Arabic expressions ! Your videos great keep going.

  • @tutacat
    @tutacat 2 หลายเดือนก่อน

    Axios is a library, not a protocol.

  • @tooru
    @tooru 2 ปีที่แล้ว

    love you

  • @sump2155
    @sump2155 2 ปีที่แล้ว +4

    Feeling proud. 2nd comment. Who cares what he says.

  • @whoknows3679
    @whoknows3679 2 ปีที่แล้ว

    Third! 👨‍💻

  • @abderrahmane283
    @abderrahmane283 10 หลายเดือนก่อน

    مصختونها 🤣🤣🤣

  • @sanilkhurana3991
    @sanilkhurana3991 2 ปีที่แล้ว +1

    Hey Hussein, great video, the protocol bit does have an option for "IP in IP"(en.wikipedia.org/wiki/List_of_IP_protocol_numbers), so would the ISP know when we are using a VPN or can a VPN just set that bit to some other protocol?

    • @supernovaw39
      @supernovaw39 ปีที่แล้ว

      IP in IP is a very niche protocol that doesn't even perform encryption, and it's in the same way on top of IP as TCP and UDP. Chances are your VPN uses UDP (hopefully not TCP!). Your ISP can still tell it's VPN traffic from a lot of characteristics of the traffic, including:
      - it goes to the same IP address, the VPN's IP addresses are public knowledge;
      - it probably uses UDP on a common port like 1194 (OpenVPN) or 51820 (WireGuard) which identifies the VPN protocol;
      - even if packets don't go to a common port, it could be easy to tell the protocol by inspecting packets.
      You could try obfuscating your VPN traffic by routing it through HTTPS or SSH (using "sshuttle"). This way it looks like you're using those protocols, which encrypt your traffic, including the signs of the VPN protocol inside. Since HTTPS and SSH use TCP, it's suboptimal and can lead to TCP meltdown (tunneling TCP inside of TCP is a bad idea). Also, by observing the timings and payload sizes it is still possible to tell that you're hiding a VPN connecton inside, but that's very advanced and unless you live in PRC nobody's probably gonna go that far to spy on you.