You are on page 1of 10

Seems you can still use that but like captions after the class it's gone the

captions are also


gone the transcrypt will be there and as I said I think it will be a text file that you can
download OK so there's nothing that I can do I mean they will turn on automatically when
it starts recording the class I can turn it off man really but I don't see the harm on having
the transcript also generated for the class so keep an eye and eye on that you will be able
to download the transcript as well if needed damn it go ahead no it was a mistake I was
trying to close the notification of the recording OK OK actually you gave me an
opportunity or you gave us all an opportunity to see how the transcript will record all the
things that we said in it will label who said that so if later you check the transcript you can
also check the current the transcript right now if you go to the more options that the
three dots there you can show or hide the transcript so right now if you don't have
transcripts available you can activate that you can show them you sorry you can ask team
to show the transcript right and it will show team will show the transcript for the meeting
OK so I guess that's it and that's announcement number one now announcement number
two more than an announcement it's going to be a little poll that I want to run here so
give me a second while I prepare this I just want to know if you already passed your
networking class so they're going to be three options in this pool is going to be completely
anonymous so don't worry about it just answer honestly it is just an statistiques for me to
know if you already passed your networking class so there are going to be three options
regarding your networking class number one I already profit do taking it this semester an
option three is haven't right so you should be in one of these three categories if you
already passed that class you choose option number one if you're taking that class this
semester then choose option number 2 otherwise yes choose option number three OK let
me see OK now you can go in choose one of the three options OK I'm going to give you a
couple of minutes so you can do that I play some music in the meantime.

Let me let me try something I'm not able to see the result the also I'm going to recreate
that I truly apologize for this I'm going to delete this one here if unable I don't know I don't
think I can delete it I'll create a new one right and I will ask you to use that one instead
sorry bout that I honestly don't know why I can see parasites OK OK let's try one more
time let's see if this works OK now I can see the results so please please go ahead and
answer again I truly apologize for this but I I wasn't able to see the results on the previous
one but on this one yes I can see the results sorry about that Tim why set up down.

Making this that's very good news because well we can discuss these topics without I
mean this is not going to be anything new to you I mean the things are going to be knew
are the security considerations but the networking part it's going to be bold pretty much
the same thing instead E study on your networking class now if at some point you feel like
something it some but you don't remember anything something that there are certain
concepts dad aren't you're not quite sure to remember them well that that will be some
indications on flags to you that it might be a good idea for you to go in review your class
notes or maybe get like a crash course you can find in one of those online pretty easily like
a 10 minute block past or something like that you can read and remember the basic
networking concepts because that's what we're going to use we're not going to use any
very deep networking concepts pretty much the foundations and it's what we are going to
use but remember if you feel at some point not let you need your remember or you need
you need a refresher you can find that online or better better yet go and check your notes
right then you will find that the concepts that we discussed are going to be basic san
fundamental concepts of networking OK so next thing that I'm going to do is I'm going to
create been you Bing you black no black blank canvas here where we can work our timer
and then I'll share my screen OK great so let me share my screen not that one that's better
OK so you see this is pretty much like using Visio so we're we're going to use this online
tool I don't know if you are familiar with either video or draw IO but it's pretty much the
same thing in at the end of this chapter 3 we are going to discuss all this and everything in
here will make sense to you you know what we what we we were talking here right so
we're going to start with the basics and slowly start adding more things right so we're
going to spend the rest of our class on this chapter until our meter so this is week #6 and
of course next week is going to be our last week before midterms so roughly we have four
more classes including this one here now we are going to use next when the next
Wednesday it's going it's going to be a lab class so we're going to have our next lab and
Monday and Wednesday next week will finish whatever we started today regarding
network security and then we'll have our return let's start a couple of things to keep in
mind when talking about network security the the first one it's that well we can approach
this either from the inside or the outside and we can go from the inside from the inner
network and start building our network until we reach well pretty much the Internet or we
can go the other way around we can actually start from the the the external components
and build our way inside the network that's what we're going to do this time we're going
to work from the outside to the in inside to the inner network now the other thing that
you need to keep in mind it's that here we are referring to network devices we are not
talking about network appliances and there is a big difference between these two so
network devices or what I refer to network devices are functionality's in the network
network functions or devices that will do a specific function in the network so when we
say router it's just a router when we say a firewall it's just a firewall when we say this is a
switch is just switch now an appliance in real life sometimes we work with appliances right
or we could work with appliances appliances are business of hardware that combines or
performs different networking functions so you can have an appliance just one piece of
hardware that is that is your router in your firewall in your switch and maybe even your
access point that's exactly what it's happening with your home networking equipment
that little box that I'm pressure all of you have one at home well that's not science in that
little box will do several things for you it's going to be your router it's going to be your
firewall it's going to be your or could be your VPN server your web server it's your access
point as well it's your switch it's all of this in just one single device that's an appliance we
don't talk about appliances here it will make our design more complex unnecessary OK so
we are going to always refer to network functions not network appliances dining mine
when I say that this is a firewall it's just a firewall but only two firewood things if I said that
this is a switch again it's only a switch it doesn't do anything else right OK so we can start
and I as I said we're going to start from the outside right So what is it on the outside
what's regularly on the outside well we have are over the Internet we have the Internet in
traditionally internets been always represented by a cloud right so we usually use a cloud
to represent start Internet now if I want to connect my network to the Internet which
networking device do I need to think of this parameter this this will be your first test to
see if you need a refresher class on networking or if you are doing just fine OK so this is
this is a question for you and if you want you can write your answers here in the the chat
window if you want what is the outermost device a neighbor start analyzing a network
from the outside in this case from the Internet what is the first networking device that you
are going to find and again working devices don't care about appliances OK so each device
will do only one function right So what do we need to add here if we want to connect to
this Internet thing if you want you can run your answer and we can analyze that so
nobody brave enough that's OK so if you were thinking but you need a router then you are
correct the outermost device on an Edward it's always erator if you were if you were
thinking of any other device then as I said before this this might be the first flag that you
need a refresher on networking OK so for example if you thought that you needed here a
firewall or something like that that's incorrect the outermost device on a network is
always a router actually if we can see inside the cloud here if we can see what it's here
what's being always represented as a cloud will be just a bunch of routers talking to each
other that's the whole Internet thing that we use all the time it's just a bunch of browsers
spread throughout the world and they are somehow connected to each other right top we
don't need a full mesh here meaning we don't need every single router to be connected to
any other router in the network to every other router sorry to every other router in the
network right now we just need a couple of connections we need just a some routers
connected to another router somehow right maybe something like this will work why not
maybe something like this and something like that um let's try this Anne let's try that and
maybe this OK that that that is your Internet now every single router here represents a
network the network that where you are right now it's represented by a router that's why
you have a router hi that's that's dumb if you go to school to work on any of the labs and
you're using the Internet will all those networks on the on campus are represented on the
Internet by router right the Internet is just that a bunch of routers that are able to talk to
each other right so they are smart enough cute find always a way to deliver a packet from
network A to network B so let's say from in it that we want to send a message somebody
inside this network right let's assume that over here we have the internal network for this
router somebody from the internal network on this router wants to send a message to
something over here the internal network of this router right so the router will receive the
packet and will identify that this packet belongs to the outside right word it belongs to an
outer network so based on certain protocols in algorithms the router will know exactly
what to do with that packet for example let's assume that the router decides OK this
packet needs to go this way number we need to reach this so now this router will have
would have to make a decision if this is this packet for my internal network yes or no if yes
then the router will forward that packet to its internal network if it's if it isn't then the
router based on the final destination will decide from which one of these links we will
forward the pack so the router can forward the packet this way or you can also forward
the packet this way so if the packet is being forwarded this way this this router will do
exactly the same will analyze the packet will decide if the packet belongs to its internal
network or not or realizing that this is for another network it will send that packet on any
of these links so it can reach its final destination in this case it will send the packet this
way and that's how it reaches its final destination so you see a package that was
originated here jumped from from here to here then here and then finally here and of
course this is not the only way to reach that destination right you could also be like from
here when you hear when you hear when to hear when to here and then when you hear it
is hunger a longer route but it's a valid 1 OK so you see there is actually redundancy on on
this Network alright so there there are different ways that a packet could reach its final
destination but that's that's that's the whole Internet that's what the Internet is yes of
course we use protocols and applications and algorithms special algorithms to run this
very complicated network but on its most basic image or picture this is the Internet it's
just a bunch of routers talking to each other or in another way a bunch of individual
networks represented by routers that are in turn connected so that's the Internet it's just
an inter networking or a communication among different individual networks write an
intra network it's a communication with theme just one network this is a communication
among several individual networks that's why we call that an inter OK Internet so that's it
that's what the Internet is that's why the outermost device and every network will always
be your router great so hopefully you will remember that now in forever in well if we if
you were thinking about a firewall if your answer was I need a firewall I mean you wanted
that far yes at some point we cannot just leave it like that I mean we cannot just use a
router to connect our internal network to the to the external one right because let's for a
minute represent our internal network as this box if we just do something like this then
every single package every single packet or message that comes this way comes to the
router will immediately be forward to the internal network right so in other words this
internal network over here has all its doors open and we don't want that we actually want
something that protects the internal network that help us to keep this and that think of
this as a sacred place we want to keep this secret place saved always saved right so
because of that we do need something that could help us with that and that is going to be
our firewall right so we can have firewall in the chain let's say maybe here we can connect
this to like that and then again for the moment let's assume that these big block here it's
our internal network so now you see the function of a firewall it will block traffic Frankie
will filter traffic so It's like a protection for the internal networks kind of like the first line
of protection for the internal network now regarding firewalls there are two types of files
right and let me actually copy that definition so I can go faster that work OK that's one and
it's too right so fire once they come in go different flavors and then there are different
buzzwords and fancy ways to define firewalls right but at the end of the day we have two
main categories of files the first one is a dump or a very basic plain firewall right this dump
firewall well it's your most typical type of firewall its main job is to filter traffic based on
some very basic networking information like IP addresses imports or protocols right if we
if we have so she ate each protocol to an independent port then ports and protocols could
be treated for this for this analysis like they are the same of course they're not right it's
just like a port usually represents a problem but it's mainly what is dumb firewall would
you would only filter traffic based on IP addresses and ports who is sending that this this
packet into witchboard it's this port open or it's not right so for example when you
configure your windows firewall you are using a dumb firewall it's just a simple rule that
lets or let the poor be open or closed or sometimes it could be open for certain clients
identified by IP addresses for example an for our clients the port is closed right so there's
not much to do with this file it's fast it's efficient to the point it does that and it does it
well OK but of course it has its limitations right the official term for this type of firewall it's
a stateless firewall because the firewall doesn't care about the communication the firewall
it's like a filter doesn't comply with the rules does it count for these from the expected IP
address or is this packet being sent to this specific IP address if yes it's using this port yes
then go ahead you can go in or out of the network but it's as simple as that there is
nothing more now on the other hand we have smart firewalls right if we have done
firewalls we should also have smart firewalls no this smart firewalls which are actually
called state full firewalls they will maybe filter traffic based on behavior so they also think
that traffic like like any firewall will do but now this stateful firewalls we will use behavior
so the firewall is aware of what is happening on the network fine the most likely using
advanced techniques such as artificial intelligence so the firewall is not just sitting there
um inspecting IP addresses and ports now it's watching what is happening on the network
right and based on these behavior based on what is actually happening on the network it
will decide what to do will let this packet go through or not so here's a very simple
example of a action that stateful firewall normally dust so let's say that you have a client
here on your Internet work on your internal network that's trying to communicate with a
web server somewhere else and some other network so of course the client will use the
browser an ask for the web page right and that's a communication that will go through all
your networking devices including the firewall and the router as well right so the firewall
will see that oh somebody on the internal network started a new web communication so
of course if somebody started that well most likely I will see in a couple of seconds I will
see a proper response so when the response comes back to the firewall the firewall will
not be surprised to see that packet because it's actually expecting that packet and it will
decide that yes this is a valid packet and it will send information to the client see now you
see why we call this stateful final because it's aware of the state of your net what's
happening on your network of course these are they are both firewalls but they are not
the same this is a very quick and simple firewall it's usually fast not that expensive but
using a stateful you will have to pay a price for that because you are acquiring a more
sophisticated device right so it will require more processing power it will require spanks
pensive components fast component maybe a fast processor maybe some special GPU's
or something like that run the AI models I don't know it's definitely going to be different
than a stateless right so expect to pay a little bit more or a stateful file right now there are
it's not like any of these are better than the other there are more suitable for certain
options or for certain cases sometimes the best decision is to go with a stateless firewall
firewall thanks for example in your in your windows computer you imagine if instead of
having an stateless firewall you have like a stateful firewall so you have a software that is
constantly doing analysis on this it's running a I algorithms it's using the resources on your
computer to just run a firewall right so not good right but there are some other instances
like for example here that you would prefer to have a state full firewall instead of a
stateless firewall right nonetheless having a firewall it's better than having none right that
having no firewall at all so after new router you need to have a firewall here now another
way to see firewalls it's as either a hardware device or a software firewall and this is pretty
much true for well any networking device right you can have it as a hardware but you can
have it as a software and it's the same for a fire this could be easily a PC running a
software that will act as a stateless or stateful firewall depending on the software that
you're running here right if that's the case make sure that the computer that you have
here it's a very adequate computer for the type of firewall you are going to run if not you
can start seeing bottlenecks and delays and your network because the firewall is not able
to keep up with the speed of the communication so that's it we need a after the router we
need a firewall and then we can start thinking about our internal network what are we
going to do for our internal network the goal of today's class is to create the foundations
of our network starting on the external network and coming all the way to the internal
network right in the next classes we are going to add more functionality more staff duties
right for example we see how can we support free mode users or maybe how can we add
wireless capabilities to our network so and so forth right today the most basic things we're
just going to create the building blocks for our network thank so after the firewall here we
should have our internal network now depending on the type of network in the topology
that you wanna hear that when you decide what type of communication device you want
here right you can use for example I have a very simple hub that's an internal network
right it may not be the most modern of the solutions but it is an internal network you can
have here I mean you can have here different types of devices right so let me ask you
another networking question again use this as a way to test your knowledge and to see if
you need to refresh some of this what type of topology we have on a regular hub thanks
so think about this for a hop what kind of topology we have so if your answer was a bus
topology I don't know if we have like a symbol for this now we don't so let me actually
create he bus here So hopefully now you remember what a bus topology is is this right
every single note this lines represents notes on your network and this represents your
main media your main but transport media your main cable in the bus topology the main
communication channel is shared by all devices on the network right so and This is why
this is actually inside a hub so if you use a hub to implement your internal network well
you are using a bus topology in a bus topology when a node let's say I don't know we have
this note here and let's say that we want these two guys to communicate what's going to
happen is the these note here it's going to inject a packet into the main line in that packet
will go from here all the way up to here or it will be consumed by the receiving node but in
the mean time every single node along the way will also consume or or see that packet
right every single user every single actor in in our network will we'll actually see the same
packet but they operate in an honor code type of fashion so what's going to happen is that
these actors here they will make a decision I mean they will see the packet and they will
decide it's this packet for me is this packet address to me if it is then I will consume it if it
is if it is add I will just ignore it right I will leave it there OK so you can see here this as a as
a bus line in each one of these is a bus stop so the boss will go through the line to this go
through the street and it will stop on every bus stop that's exactly what is happening
that's that's actually that's exactly what's happening on at hop write an on each stop they
are going to be people in the stop that will see is the is is the the information on this bus
for me if yes then I will take it if not I believe there right let's not think of this as a bus you
can think of this as a mail truck right so the mail truck has its route it will go through this
line in each one of these is a stop for the mail truck in on each stop an actor can check the
the truck forward packages or letters addressed to him or her if if they found if they found
something they will take it if not they will leave the rest of the information there if they
have something to say or something to mail they will add that to the mail shop so
everybody behaves based on these honor code right and and this is actually where the
promiscuous mode comes from in a in a bus topology we can talk about this promiscuous
mode and that's when an actor goes wrong and start just listening or or getting all the mail
all the packets right so there is nothing that will prevent an actor to turn into promiscuous
mode or start listening to everything on on the on the network right so this is exactly what
happened when we use a bus topology in a hub right now we can have different buses hi
we can have one here and maybe we can have another one over here right in each one of
these it's called a network segment OK so now my question to you my next question to
you and your next flag which type of device was used earlier to join these two different
network segments OK so who's brave enough to write an answer on the chat window
what type of device we used to connect these two different network segments if your
answer is a switch then you are wrong if you answer it's a hub then again you are wrong
hop was this or is this hobby is being used to create each one of the segments but now I
can we join these two segments OK the right answer was a breach think of this as islands
no not a router a router it's for networks it for different networks right this here are two
different network segments meaning they are part of the same address space two
different networks they will have two different networks two different address spaces OK
here we have the same address space but this is segment number one and this is second
number two it's like they live on the same apartment but on different groups alright in
two different networks are like two different two different apartments OK that's the
analogy and we use routers to connect two different networks and bridges to connect
different network segments OK so we can use a bridge here in connect and connect a
ready segments in this is an internal network there is nothing wrong with that this is
actually how networks were before before what before switches well we use nowadays
instead of having all these bridges and all of that arts which is an YS which is why we use
switches well in terms of security we love switches it has two main advantages for us right
and this this which has had two main advantages for us let me search for switch let me
add it here pursifull when we use a switch that's when we truly achieve a star topology So
what is the star topology start topology it's when you have different devices coming to a
central point right they will all meet end the middle find something like this so you see it
kind of looks like a star OK that that's why we get with us which we actually get the start
ability why is this start about this so important for us in terms of security because now
every single node you can you can place the switch here right in the middle right and you
see maybe delete this for a minute and you see that now every single note has a
dedicated line of access to the switch the switch will do all the the communication magic
too enable two different notes to talk to each other but there is nobody else sharing this
links here now you know why why this is called a switch it comes from an older a very old
technology switchboard do you know what a switchboard is if not I mean you can Google
telephone switch board right let's go to images and you are going to find lots of this things
to hear see this one here that's a switchboard and this isn't a switch operator here is
another one and here is actually up I'm real image operaters that we're using the
switchboard so you see here all these switches they have ports open ports and there are
some patch cords like these ones here So what the operators did is in order to to let Q two
different people talk to each other over the phone they will actually join with a patchcord
their ports on the switchboard right and then the communication is completed and they
can talk to each other that's exactly what your switch is doing here it's doing exactly the
same thing right but for the networks right so it's this but with electronics that's it that's
all that that the that's all what a switch really is it's just that but now in terms of security
we gain privacy every one of these links it's a privately nobody else could could spy on the
communication if you remember our boss configuration or bus topology that the media
was shared by everybody in one of the actors in promiscuous mode it starts spying on
everybody else everybody else has communication right here with us which we don't have
that issue we don't have that problem our switch it's it's guaranteeing that your
information is private from other users it's independent from other users so then he says
the switch allows us to connect different devices like computers printers etc yes yes but so
so does he have a bridge the main difference the main difference is how they operate
right so now you know a hop was mainly a bus topology or bridge was a way to join
different hubs together right or to communicate different hops together and with us
which we gain this kind of star topology this this way arranging our notes are notes in now
every single link it's going to be a private link right and another thing that we gain with
switches and that's why we love them as a security engineers it's the ability to define
villains alright so we can define this spaces that could be treated as individual local area
networks but actually we have tons of them of these virtual spaces in our internal network
we'll see why this is so good in our next class but for now the other advantage that we we
gained by using switches it stability to define can I there it's simple it'll be fine Big Lots
there OK so I switch can allows us to do that this is going to be it's own land this is it's
online it's online it's unknown it's online but all of this all of these violence are part of the
same plan of your own internal local area network right in in one more time this for us it's
an amazing feature in terms of security will see that as I said before in our next class right
another advantage of using the switches and by the way a switch here has a capacity right
did you see here while this bus has like 20 ports right all switches will have a capacity will
have a number of ports that we can use now switch when I I use a switch here and use
this as a placeholder right you can think of this as a switch of infinite capacity in reality
what is actually happening is that when we want to extend the number of nodes that we
want to have in our network well we just Daisy chain these switches what is a Daisy chain
is just one switch connected to another switch so let's say that this is a 24 board switch all
of these are 24 port switch is right here because we are Daisy chaining this today is we
have 23 available ports an here because we are switching this one or connecting this one
to this one we also have 20 3 ports right so we have 23 + 23 that's 46 + 24 right that's
what 70 ports so that's the the maximum number of nodes that we can have on our
network if we need more than that well we can add one more switch of course we can
also go up in the capacity of the switches so for example we can make these 24 sorry a 48
port switch instead of being at 24 now we just doubled the capacity right and again we
gain more more open ports where we can't log in things but remember every single note
every single printer every single computer all of that every single networking node needs
to be plugged into one of the ports on the switch so if you're planning to have tons of
devices make sure that you have enough room on your switches or at least that you are
able to increment or two add more switches to your network now I don't want you
complicate my diagram and that's why I only use one switch to represent my internal
network but remember this could easily be this over here right as I said before next class
more benefits of working with switches right the other the other thing that I want to talk
or that I want to explain today it's well most likely when we have a network or at least
traditional networks these networks will host its own services for example we can have a
web server write something like this so that means that we can have maybe an email
server haha so that means that we can have a laptop here something like that we can
have a laptop trying to reach our web server maybe maybe we sell some things online and
we have a customer trying to buy something in front of us right so the customer is going
to use their laptop in reach our web server that means there is traffic going through the
Internet through the router through the firewall up to the web server here so as you can
see you can clearly see that a problem why because now we are giving this external user
this unknown user direct access to our internal network remember we want to keep this
part of the network safe as safe as possible right but by doing this which is a very common
configuration when somebody doesn't know much about medical security they do this
they are they are actually opening the doors for Malicious actors let's use this guy over
here for example add we can we can have something like that now this laptop is
controlled by a hacker and the hacker is actually having access to our web server and now
the hacker can use metasploit and all these wonderful things that we have reviews so far
to compromise the web server and once the this hacker has access to our web server
there is nothing else here that will prevent the hacker from going all all over our internal
network right he can go wherever he wants to right so this is clearly a no no we should
never ever do this that's why this is exactly why we configure the next zone then we are
going to talk so we have our external zone we have our internal zone and we're going to
have this very special place here that we call a DMC or a Demilitarized Zone so that the
DNC that the militarized zone it's a place where you can holes or you can put all your
services that were required sternal access right and what we do with this DMC will try to
protect this as the same way that we protect our internal network so we're going to add a
new firewall over here and also well because there are a bunch of devices here maybe we
need to control all of them with a nice switch right OK so it will look something like that so
we have this this this and of course that that the switch will host or will allow us to
connect all these services back so now you see by moving these services you here do what
we call Adm see we are creating not just one layer of protection we are actually creating
two layers of protection now if the hacker is able to compromise the web server right it
will hacker once you have access to our internal network he will have to maybe deface the
switch maybe you know fight against the switch maybe compromise it for sure will have to
compromise the firewall this firewall here then fight against this firewall here before
having or reaching our internal network so you see all the work that the hacker will have
to do just by moving by doing this little switch from the internal network to the DMZ so at
DNC it's something that it's easily configurable even if you go to your home appliance if
you go to your home device that you have there you can you can see the configuration
options and most likely you are going to find ways to enable A DMC on your home
network alright so next time the you need to set up a service for your project that you're
developing for your class or something like that don't open your internal network because
you are making your internal network vulnerable create Adm see input your services there
right OK so the pop quiz it's it's active right now so go ahead finish the pop quiz and then
I'll see you in about 10 minutes to wrap up our class today's class I'll play some music Bing
back in all that I ever was it was only just face is it Ashley I'm sorry for not only to be your
day quote truth such as I pushing you away play

Firewall here meaning we use pretty much the same firewall here well that's not much of
a protection if it's just going to be one firewall because if the hacker is able to compromise
this firewall over here finding a bold particularly in the exploiting it the hacker could easily
do the same for the same port for the second firewall and then reach do you network so
we are actually not gaining anything from this move we're just wasting money into having
to units of the same file so internal insecurity right one of the principles is that we should
mix and match we should avoid this single point of failures and I'm not dashing and
manufacture or in brand right thing like that and just I'm going to give you some names
here just as an example so for example if we make all this is Cisco Networking again we're
actually creating a single point of failure because well it happens that when we found a
boulder ability when we finally ability any particular device that will also affect maybe
many other models of the same manufacturer so it could happen that your switch your
firewall danger router then our owner issue they all suffer from the same vulnerabilities so
they could all be exploited in the same way right but now if you mix and match if you
make this parable is Cisco firewall and if you make this one I don't know juniper or any
other product right well now you're actually creating to points of resistance here this one
here in this one here if one of them is vulnerable while you still have the other one
protecting you so you still have your June through layers of protection and then the same
happened with the switch or the router or any other equipment that you have now the
same idea there's imprisoning you can apply to your notes to your particular laptop for
example so don't buy all laptops on laptops aren't same model from the same
manufacturer because if they have an issue they have a problem all of their going to suffer
from that if you install the same operating system that say install Windows 10 another
place and then we found a new vulnerability for Windows guess what all your hundred
devices are now vulnerable right are now in
01 30. 20

You might also like