networking
Zero trust architecture design principles 1.0 launched.
Introduction Netcat is a tool that reads and writes data across network connections, using TCP or UDP protocol. Netcat has been referred to as the TCP/IP / networking swiss army knife. In this article we’ll look at different applications of netcat and how it can be useful in day to day activities of a pentester, security professional, sysadmin etc… If you would like to test out these commands in a lab environment without the need to install them on your own machine have a look at my scenario on CYBERRANGES using the link below.
Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake. - brimdata/zui
The latest news and resources on cloud native technologies, distributed systems and data architectures with emphasis on DevOps and open source projects.
“What is the easiest way to securely connect tens of thousands of computers, hosted at multiple cloud service providers in dozens of locations around the globe?” If you want our answer, it’s Nebula, but I recommend that you read the rest of this short post before clicking that shiny link. At Slack, we asked ourselves this…
Cloud Router Switch 112-8P-4S-IN with QCA8511 400Mhz CPU, 128MB RAM, 8xGigabit LAN with PoE-out, 4xSFP, RouterOS L5, desktop case, PSU
RB260GSP with 5 Gigabit ports and SFP cage, SwOS, plastic case, PSU, POE-OUT
Running a complex network is not an easy job. In addition to simply keeping it up and running, you need to keep an ever-watchful eye out for unusual traffic patterns or content that could signify a network intrusion, a compromised instance, or some other anomaly. VPC Traffic Mirroring Today we are launching VPC Traffic Mirroring. […]
Join the Internet Storm Center's Slack channel for real-time updates on internet security events.
The Faucet software-defined network controller enables users to run networks the same way they run server clusters.
Notes about technology, DevOps, programming, and database
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.
Jigsaw is an interdisciplinary unit within Google that builds technology that inspires scalable solutions.
A black hole for Internet advertisements. Contribute to pi-hole/pi-hole development by creating an account on GitHub.
Free open source enterprise distributed VPN server. Virtualize your private networks across datacenters and provide simple remote access in minutes.