Tag: UDP
Cyber Attacks Explained: DNS Invasions
We often read about defaced websites whose pages get changed to some malicious content. How do hackers do it and how do we protect...
Guard Your Network with IPCop, Part 2: Add-ons
A basic installation of IPCop provides minimum firewall functionality such as a proxy, compatibility with various Internet connections, port forwarding, IPSec VPN, etc. To...
Cyber Attacks Explained: Network Sniffing
In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider...
The Socket API, Part 5: SCTP
This article on socket programming deals with the Stream Control Transmission Protocol (SCTP).
Similar to TCP and UDP, SCTP provides some features of both. It...
The Socket API, Part 4: Datagrams
Let's try to develop server clients using UDP, the protocol behind some important services like DNS, NFS, etc.
UDP, the User Datagram Protocol, is a...
Cyber Attacks Explained: DoS and DDoS
With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With...
Creating Your Own Server: The Socket API, Part 1
In this series of articles aimed at newbies to network programming (knowledge of C is a prerequisite), we'll learn how to create network clients...
Advanced Nmap: A Recap
This final article in the series consolidates information from the previous articles, looks at NMap's future possibilities, and at the new tools from the...
Nessus with Metasploit — Track and Hack
Networks play an important role in a sysadmin's life. But have you ever wondered about the security of your network, or tried to find...
Advanced Nmap: NMap Script Scanning
In previous articles, we have studied NMap in great detail, including live scanning a firewall and verifying the recommendations. Now, it's time to study...