Charly's Column The Sysadmin’s Daily Grind: ArpalertDec 01, 2006
Corporate policies prohibit the unauthorized connection of hardware to the company network, threatening dire consequences in the case of non-compliance. Fair enough, but how do you actually go about catching somebody trying to plug an illegal laptop into your Ethernet?more »
Charly's Column The Sysadmin’s Daily Grind: EthtoolApr 01, 2006
A touchy LAN that plays like a movie diva can spoil any admin’s day. Ethtool to the rescue!more »
Netfilter L7 Blocking protocols at Layer 7 with the L7 patchMar 01, 2006
If you need a tool for filtering protocols that doesn’t depend on the port, try L7, an IPTables patch that operates through regular expressions.more »
TCP Hijacking Understanding and preventing TCP attacksSep 01, 2005
It is quite easy to take a TCP connection down using a RST attack, and this risk increases with applications that need long-term connections, such as VPNs, DNS zone transfers, and BGP. We’ll describe how a TCP attack can happen, and we’ll show you some simple techniques for protecting your network.more »
Charly's Column The Sysadmin’s Daily Grind: SmokepingMay 01, 2005
If you do not receive a response to a ping, or if the response is seriously delayed, you might like to take this as a warning. But who wants to ping all day? You need a ping-based monitoring utility like Smokeping.more »
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.
Legendary Uber-distro splits over the systemd controversy.
One of CeBIT’s most successful forums returns in 2015.
A new study says it is possible to unmask 81% of TOR users.
Redmond joins the revolution by turning the .NET Core Runtime into a GitHub project.
Users only had 7 hours to update before the intrusions started.
It's official: The new web arrives