networking
Getting Started with networkQuality
The networkQuality tool is a built-in tool released in macOS Monterey that can help diagnose network issues and measure network performance. In this post, we'll go over how to use the networkQuality tool and some of its key features.
Running the Default Tests
To access the
04/01/2025It is with heavy hearts that we report that Dave Täht has passed away.Dave was an amazing person, whose work on FQ-CoDel, CAKE, and LibreQoS changed the internet forever. He and Jim Gettys championed the fight against bufferbloat, working to improve the global internet, and to make smooth real-time communication viable for everyone, everywhere.Because of…
Kubernetes Egress Control with Squid proxy (interlaye.red)
Join the Internet Storm Center's Slack channel for real-time updates on internet security events.
Researchers have developed a hybrid technology that would combine Wi-Fi with the Long Range (LoRa) networking protocol, yielding a new long-distance wireless concept called WiLo. The international research team has developed their proposed WiLo tech to be used on existing Wi-Fi and LoRa hardware.
The cryptography-based networking stack for building unstoppable networks with LoRa, Packet Radio, WiFi and everything in between. - markqvist/Reticulum
The latest news and resources on cloud native technologies, distributed systems and data architectures with emphasis on DevOps and open source projects.
Learn how packets flow inside and outside a Kubernetes cluster. Starting from the initial web request and down to the container hosting the application
The Banana Pi BPI-R4 Pro is a new router board based on MediaTek Filogic 880 (MT7988A) Cortex-A73 SoC offering two 10GbE SFP+ cages/RJ45 ports combos,
Zero trust architecture design principles 1.0 launched.
RB260GSP with 5 Gigabit ports and SFP cage, SwOS, plastic case, PSU, POE-OUT
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.
Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake. - brimdata/zui
There's a million ways to connect to your home lab, but some options are better for your needs.
Over the past couple of weeks, Cloudflare's DDoS protection systems have automatically and successfully mitigated multiple hyper-volumetric L3/4 DDoS attacks exceeding 3 billion packets per second (Bpps). Our systems also automatically mitigated multiple attacks exceeding 3 terabits per second (Tbps), with the largest ones exceeding 3.65 Tbps. The scale of these attacks is unprecedented.
“What is the easiest way to securely connect tens of thousands of computers, hosted at multiple cloud service providers in dozens of locations around the globe?” If you want our answer, it’s Nebula, but I recommend that you read the rest of this short post before clicking that shiny link. At Slack, we asked ourselves this…