professorjrod@gmail.com Ever wonder how your phone grabs an IP address the instant you join Wi‑Fi? We break down the invisible handshake that makes it happen: DORA. From discovery to acknowledgement, we map each step of the DHCP exchange, explain lease timers, and show how networks hand out addresses at scale without stepping on their own toes. Along the way, we share practical stories from classrooms, offices, and coffee shops that turn abstract packets into clear mental models. We go deepe...
All content for Technology Tap is the property of Juan Rodriguez and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
professorjrod@gmail.com Ever wonder how your phone grabs an IP address the instant you join Wi‑Fi? We break down the invisible handshake that makes it happen: DORA. From discovery to acknowledgement, we map each step of the DHCP exchange, explain lease timers, and show how networks hand out addresses at scale without stepping on their own toes. Along the way, we share practical stories from classrooms, offices, and coffee shops that turn abstract packets into clear mental models. We go deepe...
Cybersecurity Fundamentals Crypto Keys: Protecting Our Digital World Chapter 3 Part 2
Technology Tap
10 minutes
1 month ago
Cybersecurity Fundamentals Crypto Keys: Protecting Our Digital World Chapter 3 Part 2
professorjrod@gmail.com Cryptology isn't just theory—it's the invisible shield protecting your every digital move. This second installment of our cryptology deep dive moves beyond the fundamentals to reveal how these powerful tools operate in real-world systems that safeguard our digital lives. Digital signatures stand as one of cryptology's most practical applications, providing the three pillars of digital trust: integrity verification, sender authentication, and non-repudiation. We break ...
Technology Tap
professorjrod@gmail.com Ever wonder how your phone grabs an IP address the instant you join Wi‑Fi? We break down the invisible handshake that makes it happen: DORA. From discovery to acknowledgement, we map each step of the DHCP exchange, explain lease timers, and show how networks hand out addresses at scale without stepping on their own toes. Along the way, we share practical stories from classrooms, offices, and coffee shops that turn abstract packets into clear mental models. We go deepe...