The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead to various vulnerabilities. Based on the scan results, several…
Networking is very interesting and I’m sure many of us would like to experiment with it, but the unavailability of laboratories with sufficient computers is a stumbling block. What if I tell you that you can turn any computer into a network device at no extra cost?
It’s always fun to try out different hacks under the GNU/Linux freedom platform. The pride of becoming a command-line wizard makes everyone stay close to the CLI. Moreover, the CLI vests you with the ultimate power to control your machine.
Some network connectivity and troubleshooting tools.
Part 9 of the “Programming in Python for Friends and Relatives” series discusses how to build some nifty scripts to check remote systems over the Internet.
Just because you’re using a WEP key on your wireless access point doesn’t mean you’re safe from crackers in the neighbourhood.
Graphs always make work easier, especially when we need to monitor things. This article discusses Cacti, a simple graphical network monitor.