News Category: Networking

LDAP Authentication In Linux

This howto will show you how to store your users in LDAP and authenticate some of the services against it. I will not show how to install particular packages, as it is distribution/system dependent. I will focus on "pure" configuration of all components needed to have LDAP authentication/storage of...
Read 0 Comments

Linux IoT Landscape: Distributions

Linux is an Operating System: the program at the heart of controlling a computer. It decides how to partition the available resources (CPU, memory, disk, network) between all of the other programs vying for it. The operating system, while very important, isn’t useful on its own. Its purpose is to...
Read 0 Comments

How to Set up SSH SOCKS Tunnel for Private Browsing

There are times when you want to browse the Internet privately, access geo-restricted content or bypass any intermediate firewalls your network might be enforcing. One option is to use a VPN, but that requires installing a client software on your machine and setting up your own VPN server or...
Read 0 Comments

Ubuntu Fan Aims to Simplify Container Networking

Most people will think of Ubuntu as primarily a Linux server and cloud technology effort. Ubuntu also has some networking capabilities that it develops on its own including the Fan container networking project. There are multiple open source SDN efforts in the market today that more well known than...
Read 0 Comments

Open Networking Summit

  Open Networking Summit is the industry’s premier open networking event, gathering enterprises, service providers and cloud providers across the ecosystem to share learnings, highlight innovation and discuss the future of Open Source Networking, including SDN, NFV, orchestration and the automation...
Read 0 Comments

IBM’s Call for Code Prize Goes to a Team with 'Clusterducks'

It’s an intractable problem during natural disasters: telecommunications networks and power grids are often damaged or overwhelmed; without them, first responders struggle to help survivors, coordinate evacuations, and even count the dead. Project Owl proposes an elegant solution: an AI-powered...
Read 0 Comments

New Security Woes for Popular IoT Protocols

Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online. Security researcher Federico Maggi had been collecting data – some of it sensitive in nature – from hundreds...
Read 0 Comments

The Illustrated TLS Connection

Every byte of a TLS connection explained and reproduced. In this demonstration, a client has connection to a server, negotiated a TLS 1.2 session, sent "ping", received "pong", and then terminated the session. Click below to begin exploring. Client Hello   The session begins with the client...
Read 0 Comments

Around 62 Percent of All Internet Sites Will Run an Unsupported PHP Version in 10 Weeks

The highly popular PHP 5.x branch will stop receiving security updates at the end of the year. According to statistics from W3Techs, roughly 78.9 percent of all Internet sites today run on PHP.  But on December 31, 2018, security support for PHP 5.6.x will officially cease, marking the end of all...
Read 0 Comments

DNS Security Still an Issue

DNS security is a decades-old issue that shows no signs of being fully resolved. Here's a quick overview of some of the problems with proposed solutions and the best way to move forward. ...After many years of availability, DNSSEC has yet to attain significant adoption, even though any security...
Read 0 Comments

Pages

Click Here!