The Internet is a wonderful media, based on strong routing protocols like BGP. Originally, the Internet was designed to be “unbreakable” (of course, it is not): If a path to a network is unavailable, an alternative (or backup) path will be used. BGP is designed in this way: based on
Category: Net
Network Monitoring and Accounting Using OpenBSD
“Know your Network!” All network administrators have to know what append on their networks: what are the flows of information between hosts, to Internet, between VLANs. This is a requirement for security or provisioning purposes but also for business when the amount of IP traffic has to be billed to
Introduction to SIP
SIP (or Session Initiation Protocol is a protocol commonly used in VoIP applications. Here is a good introduction of SIP (within a funny context): VoIP Demystified: SIP.
nBox – Packet-to-Disk Recorder
NMon provides a new appliance ‘nBox Recorder‘ or ‘The Packet-to-Disk Recorder‘. The goal is simple: lot of security analyzis are based on packet captures. This box just performs a simple but critical tasks: It captures the traffic and stores it under the pcap format. Then? Just take your time to
G00gl3 SmS 0Wn3s U
Google SMS is already an available service.
Infocus: Blocking Traffic by Country on Production Networks
Interesting article about traffic filtering based on countries: http://www.securityfocus.com/infocus/1900/4. (It’s based on Microsoft ISA server but can be easily extended to other platforms)
eBay Will Track Your IP Addresses
Like many of us, I’m an eBay user. Regularly, I buy or sell unused or deprecated stuffs. eBay (as Paypal, same group) should be one of the most targeted attacks (phising, fraud, …). Today, I received the following alert in my eBay mailbox: Like Google did recently, eBay will start
Four Minutes!
Four Minutes! This is the actual survival time on the Internet for an unpatched system (sources: ISC and the Survival Time Graph). Good practice: Always perform a full patch before connecting a new server on the Internet (even under pressure). A good deployment procedure must be in place.
The Pirate Bay Proposes “IPETEE”
The Pirate Bay wants to encrypt the whole Internet! As you probably read recently, more and more countries and Europe via the Intellectual Property Rights Enforcement Directive (IPRED2). In the ISO model, encryption is usually performed at the presentation or application levels. The Pirate Bay would like to encrypt all
Turkey Youtube Censorship Bypassed by More and More Turkish Citizen
The popular service Youtube is a wonderful tool to promote all kind of information. But some countries find this too dangerous for multiple reasons (mainly political and/or religious). Have a look at the map below. It represents a world map of countries were Youtube is/was blocked: I’m the owner a