"UDP" tag
Yet another kind of cyber attack, eh?

Cyber Attacks Explained: DNS Invasions

We often read about defaced websites whose pages get changed to some malicious content. How do hackers do it and how do we protect our infrastructure from them? This article is about how…

IPCop Add-ons

Guard Your Network with IPCop, Part 2: Add-ons

A basic installation of IPCop provides minimum firewall functionality such as a proxy, compatibility with various Internet connections, port forwarding, IPSec VPN, etc. To convert it into a complete Unified Threat Management (UTM)…

Cyber Attack

Cyber Attacks Explained: Network Sniffing

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider hacking approach called network sniffing, which is very commonly…

Socket API

The Socket API, Part 5: SCTP

This article on socket programming deals with the Stream Control Transmission Protocol (SCTP). Similar to TCP and UDP, SCTP provides some features of both. It is message-oriented, and provides a reliable sequenced delivery…

UDP time

The Socket API, Part 4: Datagrams

Let’s try to develop server clients using UDP, the protocol behind some important services like DNS, NFS, etc. UDP, the User Datagram Protocol, is a connectionless protocol. This means you don’t establish a…

Oops, am under attack, again!

Cyber Attacks Explained: DoS and DDoS

With this article, we begin a new series on the major kinds of cyber attacks that weaken the IT security infrastructure within organisations. With the rapid spread of Internet technologies and applications, the…

Creating Your Own Server

Creating Your Own Server: The Socket API, Part 1

In this series of articles aimed at newbies to network programming (knowledge of C is a prerequisite), we’ll learn how to create network clients and servers using the UNIX Socket API. We’ll start…

A Recap

Advanced Nmap: A Recap

This final article in the series consolidates information from the previous articles, looks at NMap’s future possibilities, and at the new tools from the development team. Beginning its life as a simple port-scanner,…

A network

Nessus with Metasploit — Track and Hack

Networks play an important role in a sysadmin’s life. But have you ever wondered about the security of your network, or tried to find out how vulnerable it is? Let’s discover how to…

Nmap scripts

Advanced Nmap: NMap Script Scanning

In previous articles, we have studied NMap in great detail, including live scanning a firewall and verifying the recommendations. Now, it’s time to study NMap script scanning. Nmap.org describes the Scripting Engine (NSE)…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.