|
You are here |
gafferongames.com | ||
| | | | |
zipcpu.com
|
|
| | | | | What do you do when you needTCP,but don't have it? | |
| | | | |
sookocheff.com
|
|
| | | | | The User Datagram Protocol (UDP), first described in 1980 by RFC 768, offers a minimal set of functionality: there is no guarantee of message delivery, no guarantee of message order, no congestion avoidance, and no tracking of connection state. In fact, UDP is often referred to as the null protocol, because it offers little functionality not already included in the IP layer. | |
| | | | |
karla.io
|
|
| | | | | [AI summary] The article describes how a network engineer created a custom traceroute setup using a single cloud server to return unexpected results, such as Star Wars text, by spoofing IP addresses and manipulating DNS records. It details the technical challenges, including handling ICMP and UDP protocols, bypassing NAT, and setting up reverse DNS for spoofed IPs. The project was aimed at making it affordable and accessible for others to replicate, with a GitHub link for the source code. | |
| | | | |
domoticproject.com
|
|
| | | In this post we will see some pieces of advice to improve your Raspberry Pi security, including installing a Firewall and configuring Fail2ban. | ||