Network troubleshooting isn’t magic: what I taught at NZNOG 2026 Every network troubleshooting methodology I have ever seen starts the same way: check the hardware, run ping, review the logs. Those are fine steps. But the hard part is what happens in your head. ByA... Network Security Best Practices Network Security Protocols
MS-CHAP is dead MS-CHAP has been in use since 1998. It was Microsoft's answer to the challenge of authenticating users over networks, built into every version of Windows and deeply embedded in VPN and Wi-Fi infrastru... Network Security Protocols
The RADIUS protocol: How it works and why it's secure Learn how security-by-design improvements have transformed RADIUS into a more secure protocol than the expensive platforms built on top of it. “Is RADIUS secure?” is one of the most common questions n... Network Security Protocols
How authentication protocols work Choosing an authentication protocol is one of the most important decisions when designing a RADIUS ecosystem. There are a variety of authentication protocols to choose from, each with their own set of... Network Security Protocols
Is PAP secure? A complete analysis of PAP authentication security PAP is secure when used correctly. Despite the common claim that PAP sends passwords in clear text, in practice PAP passwords are encrypted by the RADIUS shared secret before transmission, and can be ... Network Security Protocols