Tag: TCP
Customising OpenSSL for the Real World
The OpenSSL project is a robust collective effort that seeks to develop a commercial grade, fullfeatured toolkit implementation of SSL and TSL. This article...
Cyber Attacks Explained: Packet Crafting
Protect your FOSS-based IT infrastructure from packet crafting by learning more about it.
In the previous articles in this series, we explored common infrastructure vulnerability...
Cyber Attacks Explained: DNS Invasions
We often read about defaced websites whose pages get changed to some malicious content. How do hackers do it and how do we protect...
Cyber Attacks Explained: Network Sniffing
In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider...
The Socket API, Part 5: SCTP
This article on socket programming deals with the Stream Control Transmission Protocol (SCTP).
Similar to TCP and UDP, SCTP provides some features of both. It...
Cyber Attacks Explained: Packet Spoofing
Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service...
Securing Apache, Part 8: DoS & DDoS Attacks
In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning...
Advanced Nmap: NMap Script Scanning
In previous articles, we have studied NMap in great detail, including live scanning a firewall and verifying the recommendations. Now, it's time to study...
DeleGate — A Multi-platform, Multipurpose Proxy Server
A proxy server works as an intermediary for requests from clients seeking resources from other servers. There are various types of proxy servers. In...
Advanced Nmap: Scanning Firewalls Continued
The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead...