Page 6 - December_Newsletter_2023
P. 6

Are we ready to go now? Not really.

            As the diagram shows, your data goes through a myrriad of routers and networks to reah its final destination –
            all possible points of vulnerability.




































            By using a program called Traceroute, the issue becomes apparent.as shown above.


            A traceroute provides a map of how data on the internet travels from its source to its destination. When you
            connect with a website, the data you get must travel across multiple devices and networks along the way, par-
            ticularly routers.


            How do I run traceroute?

            Running a Traceroute in Windows
               1.  Press Windows key + R to open the Run window.

               2.  Enter cmd and press Enter to open a Command Prompt.
   1   2   3   4   5   6   7   8