Home Tags UDP

Tag: UDP

Cyber Attacks Explained: DNS Invasions

We often read about defaced websites whose pages get changed to some malicious content. How do hackers do it and how do we protect...

Guard Your Network with IPCop, Part 2: Add-ons

A basic installation of IPCop provides minimum firewall functionality such as a proxy, compatibility with various Internet connections, port forwarding, IPSec VPN, etc. To...
Advertisement

Cyber Attacks Explained: Network Sniffing

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider...

The Socket API, Part 5: SCTP

This article on socket programming deals with the Stream Control Transmission Protocol (SCTP). Similar to TCP and UDP, SCTP provides some features of both. It...

The Socket API, Part 4: Datagrams

Let's try to develop server clients using UDP, the protocol behind some important services like DNS, NFS, etc. UDP, the User Datagram Protocol, is a...

Cyber Attacks Explained: DoS and DDoS

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With...
Advertisement

Creating Your Own Server: The Socket API, Part 1

In this series of articles aimed at newbies to network programming (knowledge of C is a prerequisite), we'll learn how to create network clients...

Advanced Nmap: A Recap

This final article in the series consolidates information from the previous articles, looks at NMap's future possibilities, and at the new tools from the...

Nessus with Metasploit — Track and Hack

Networks play an important role in a sysadmin's life. But have you ever wondered about the security of your network, or tried to find...

Advanced Nmap: NMap Script Scanning

In previous articles, we have studied NMap in great detail, including live scanning a firewall and verifying the recommendations. Now, it's time to study...
Advertisement

Block title