Netcat is a true all-rounder in networks. Fault diagnostics, chats, extensive data transfers, and network security all form part of the impressive repertoire offered by the command line tool. But if it ends up in the wrong hands, it can also be misused. IT managers should therefore familiarise themselves with the tool.
DHCP snooping makes a network more secure. There are no two ways about it: DHCP makes network configuration so much easier. This is especially the case in large networks, where devices are constantly changing and the manual assignment of IP addresses is a never-ending task. Yet by using DHCP to simplify the process, you do relinquish controls, and criminals can take advantage of this. By using...
The attack pattern of a SYN flood attack has been known since the early years of the World Wide Web. Over time, new attack variants and appropriate protective measures have arisen. DDoS attacks with massive data flows originating from botnets are currently the norm. Learn how SYN flood attacks work. We will explain the concepts of these attacks and countermeasures.
DDoS attacks are occurring more and more frequently. Among the most insidious are HTTP flood attacks. Disguised as regular users on the website, thousands of complex requests are sent to the server until a system failure occurs. Here you will learn what exactly an HTTP flood attack is, how you can identify them, and how you can protect yourself from them.
UDP flood attacks have been used in the past for denial-of-service attacks. Even servers for major organisations have collapsed under the massive amounts of data. We’ll explain how a UDP flood attack works and provide you with an overview of its technical background, proven security measures, and how it is different from other DoS attacks.
The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.
What do you need a localhost for? Sometimes it can be useful to communicate with yourself. This is known as a loopback in network technology: instead of feeding a request to the network – e.g. the internet – you instead keep it within your system, subsequently stimulating a network connection. We will explain how the connection to 127.0.0.1 works, and what you can use localhost for.
For millions of people around the world, video chats and conferences are an essential part of daily life – for both work and leisure. When it comes to video telephony software and applications, Skype is by far the leader of the pack. In fact, many people are unaware that there’s a considerable number of good alternatives to Skype on the market, which are also available free of charge. Some of...
When you direct data packets to the broadcast address, the data packet is sent from a single point to an entire network without you having to specify any recipients. We explain what exactly the broadcast IP is and how it is composed. In addition, our article explains how you can calculate the broadcast address. Read on for more.
You would like to access your home computer, but you don’t know how? Is your home network, for example, throwing a spanner in the works with constantly changing IP addresses? Dynamic DNS services (DynDNS) can help you here. Find out which DynDNS providers are among the best and what advantages and disadvantages you have with each of them in this overview.