networking
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.
Jigsaw is an interdisciplinary unit within Google that builds technology that inspires scalable solutions.
A black hole for Internet advertisements. Contribute to pi-hole/pi-hole development by creating an account on GitHub.
Free open source enterprise distributed VPN server. Virtualize your private networks across datacenters and provide simple remote access in minutes.
BGP routing is a core component of the Internet. Learn how BGP works and how it is used to route traffic across the Internet.