Linux-powered Packet Fence Protects Your Network
Packet Fence bundles many useful and powerful network protection tools into an attractive, integrated package. Such as network access control, monitoring, intrusion detection, VLAN isolation, DHCP...
View ArticleThe most insecure part of your network is...
Sure, It's Secure: "Your desktops' operating systems? Your servers' operating systems? Your firewall? Or..."
View ArticleWhat’s the difference between a Hub, a Switch and a Router?
Hubs, switches, and routers are all devices that let you connect from one computers to other computers, networked devices, or to other networks.
View ArticleUsing Nmap to "Fix" a Problem
Fixing a Problem with Nmap Ever had an ipv4 network address that is supposed to migrate over via a high availability mechanism simply not work or even stranger if there were several addresses some do...
View ArticleGet SheevaPlug!
Eban Moglen suggests this ARM-based, GNU/Linux device as a networking solution to the troubled times now facing the Free Internet. Communicate with networking friends with greater security. See...
View ArticleNetworkManager vs wicd vs wpa_gui
Here's a quick comparison between a few network control tools for Linux. These tools all give you some sort of network control from the Desktop - a service traditionally provided by daemons and...
View ArticleKernel Log: Coming in 2.6.34 (Part 1) - Network Support
Expected for release in May, Linux kernel version 2.6.34 contains several new network drivers and various advancements designed to improve network performance or increase network configuration...
View ArticleLet's Deep-Six Facebook and Do Open Source Social Networking Instead
"An open and distributed model gives users and organizations a chance to choose their social networking platform without sacrificing their connections to friends, family, business partners and...
View ArticleHow To Monitor Network Traffic: Two Indispensable Commands
This how-to will teach you two commands, iftop and nethogs, that you can use to monitor network traffic on a Linux machine. You can use iftop to view traffic by individual connection, port, network...
View ArticleKernel Log: Coming in 2.6.35 (Part 3) - Network support
Several patches submitted by a Google developer will enable the kernel to push considerably more data through network cables on multi-core systems. Some of the LAN and Wi-Fi drivers also promise...
View ArticleBurning Man's open source cell phone system
The (in)famous desert festival experiments with DIY telephone networking. They use the AGPLv3 licensed OpenBTS GSM implementation.
View ArticleCopying Remote Files with scp
To use scp to transfer files, the SSH service (usually the sshd server daemon) must be running on the remote system. Here are some examples of useful scp commands:
View ArticleA complete reference to SSH tunnelling
In simple words tunneling is a method of bypassing firewall or proxy restrictions using some tunnelling protocols. It works by creating a "tunnel", or a communications channel that makes the firewall...
View ArticleTroubleshooting Network problems in Ubuntu
Internet connectivity is one of the important means of communication in todays life. So troubleshooting the problems in our own networks or reconfiguring it for the easiness is not to be praised as a...
View ArticleA call to arms for obfuscated bridges
Fresh obfuscated Tor bridges are needed more than ever, since they are the only way for people to access Tor in some areas of the world (like China, Iran and Syria). But it is not the same as an exit...
View Article
More Pages to Explore .....