The Beauty of the Internet Protocol

Поділитися
Вставка
  • Опубліковано 11 січ 2025

КОМЕНТАРІ • 37

  • @hnasr
    @hnasr  2 роки тому +3

    Get my Fundamentals of Networking for Effective Backends udemy course Head to network.husseinnasser.com (link redirects to udemy with coupon)

  • @gregtaylor9806
    @gregtaylor9806 2 роки тому +16

    I really enjoy the occasional inclusion of Arabic expressions. Before I started studying web dev, I was taking Arabic lessons.
    Great work as always, Hussein. It brings me joy that when I first started watching your videos years ago, I understood so little. Now I understand a great deal more. I really appreciate you and hope one day I can approach your level of understanding and passion for this craft. In sha’Allah

  • @mmanuel
    @mmanuel 2 роки тому +38

    you should add visual examples or drawings, i always zone out :(

    • @MysterCannabis
      @MysterCannabis 2 роки тому +1

      same here, I do my best to focus on the entire thing but fail every time

  • @dealerofdeeth6043
    @dealerofdeeth6043 2 роки тому +3

    :0 your voice sounds like butter to my American ears

  • @anupamchakrawarti1803
    @anupamchakrawarti1803 2 роки тому +1

    No useless intro, dum dang dum and straight to the point. Saved some bandwidth 😆

  • @abdhelal
    @abdhelal 2 роки тому +3

    Great video 👍 as always 😊

  • @girdharvikash195
    @girdharvikash195 2 роки тому +1

    Hi Hussein, i recently joined your channel and i love the way you tell complex topic very easily.
    can you make a video on wifi technology.
    I mean on which layer wifi technology comes?

  • @kumar16pawan
    @kumar16pawan 2 роки тому +3

    Hi Hussein, great insights , Thanks. Just wanted to know the good references you are following, Because I've been going through a book(Top Down approach- Kurose and Ross ) also . Thanks

  • @anasabdullahsaber6954
    @anasabdullahsaber6954 2 роки тому +1

    Very good video as always. Would be great to get videos about transaction in blockchain and how smart contract work
    We need real example how consensus with smart contract work maybe with nodejs. Thanks

  • @probhakarsarkar2430
    @probhakarsarkar2430 2 роки тому +1

    21:22 ISP is like wtf is going on 🤣🤣🤣

  • @Theemightyone
    @Theemightyone 2 роки тому

    Maybe read into the shared registry system and explain this from that perspective.

  • @maurin5266
    @maurin5266 2 роки тому +1

    keep it up man 💪

  • @bashardlaleh2110
    @bashardlaleh2110 2 роки тому +2

    I always wondered why don't forbidden destinations block packets based on x-forwarded-to header since it has the actual source IP ? I mean this way even VPNs can't make you access a forbidden website in your country, maybe I'm missing something but I would like to get an answer

    • @monarch0243
      @monarch0243 2 роки тому

      commenting to get notification of this

    • @nou4605
      @nou4605 5 місяців тому

      Pretty sure VPNs overwrite that. Otherwise why would anybody use them. The whole point would be defeated.

  • @khalid5d3
    @khalid5d3 2 роки тому

    Can you talk about this:
    1Password syncing went down for a few hours today during a database upgrade

  • @saikatdutta1991
    @saikatdutta1991 Рік тому

    what about the proxy compare to vpn.. isn't both look same ?

  • @autohmae
    @autohmae 2 роки тому +1

    If anyone cares the current Internet search space is over 900 000 prefixes/subnets (smallest are /24). And over 150 000 prefix/subnets for IPv6 (smallest are /48).
    PS Hi Hussein 🙂

  • @mahmutbayri
    @mahmutbayri 2 роки тому

    Could you fix the link of `Python on the Backend ` course in the description, please?

    • @hnasr
      @hnasr  2 роки тому +1

      Thanks! Fixed

  • @r3sist197
    @r3sist197 2 роки тому

    Love your playstation t shirt! Where can we get it too?

  • @blingsingh1057
    @blingsingh1057 2 роки тому +1

    Great content as always.👍
    1.5x speed 🚄

  • @prashanth_js
    @prashanth_js 2 роки тому +1

    wild wild web is totally accurate

  • @MartinsTalbergs
    @MartinsTalbergs 2 роки тому

    I constantly zone out into the sea of product placement (in the background)

  • @proactivex
    @proactivex 2 роки тому

    Put this in watch later. Then hit play.

  • @mdshehab8947
    @mdshehab8947 Рік тому

    Great ❤

  • @hsjsjssnnsjsjs1666
    @hsjsjssnnsjsjs1666 2 роки тому

    Please bro iptables part 3

  • @CyberTronics
    @CyberTronics 2 роки тому

    More Arabic expressions ! Your videos great keep going.

  • @tutacat
    @tutacat 2 місяці тому

    Axios is a library, not a protocol.

  • @tooru
    @tooru 2 роки тому

    love you

  • @sump2155
    @sump2155 2 роки тому +4

    Feeling proud. 2nd comment. Who cares what he says.

  • @whoknows3679
    @whoknows3679 2 роки тому

    Third! 👨‍💻

  • @abderrahmane283
    @abderrahmane283 10 місяців тому

    مصختونها 🤣🤣🤣

  • @sanilkhurana3991
    @sanilkhurana3991 2 роки тому +1

    Hey Hussein, great video, the protocol bit does have an option for "IP in IP"(en.wikipedia.org/wiki/List_of_IP_protocol_numbers), so would the ISP know when we are using a VPN or can a VPN just set that bit to some other protocol?

    • @supernovaw39
      @supernovaw39 Рік тому

      IP in IP is a very niche protocol that doesn't even perform encryption, and it's in the same way on top of IP as TCP and UDP. Chances are your VPN uses UDP (hopefully not TCP!). Your ISP can still tell it's VPN traffic from a lot of characteristics of the traffic, including:
      - it goes to the same IP address, the VPN's IP addresses are public knowledge;
      - it probably uses UDP on a common port like 1194 (OpenVPN) or 51820 (WireGuard) which identifies the VPN protocol;
      - even if packets don't go to a common port, it could be easy to tell the protocol by inspecting packets.
      You could try obfuscating your VPN traffic by routing it through HTTPS or SSH (using "sshuttle"). This way it looks like you're using those protocols, which encrypt your traffic, including the signs of the VPN protocol inside. Since HTTPS and SSH use TCP, it's suboptimal and can lead to TCP meltdown (tunneling TCP inside of TCP is a bad idea). Also, by observing the timings and payload sizes it is still possible to tell that you're hiding a VPN connecton inside, but that's very advanced and unless you live in PRC nobody's probably gonna go that far to spy on you.