Explore >> Select a destination


You are here

gafferongames.com
| | zipcpu.com
5.7 parsecs away

Travel
| | What do you do when you needTCP,but don't have it?
| | sookocheff.com
3.9 parsecs away

Travel
| | The User Datagram Protocol (UDP), first described in 1980 by RFC 768, offers a minimal set of functionality: there is no guarantee of message delivery, no guarantee of message order, no congestion avoidance, and no tracking of connection state. In fact, UDP is often referred to as the null protocol, because it offers little functionality not already included in the IP layer.
| | karla.io
4.9 parsecs away

Travel
| | [AI summary] The article describes how a network engineer created a custom traceroute setup using a single cloud server to return unexpected results, such as Star Wars text, by spoofing IP addresses and manipulating DNS records. It details the technical challenges, including handling ICMP and UDP protocols, bypassing NAT, and setting up reverse DNS for spoofed IPs. The project was aimed at making it affordable and accessible for others to replicate, with a GitHub link for the source code.
| | domoticproject.com
20.4 parsecs away

Travel
| In this post we will see some pieces of advice to improve your Raspberry Pi security, including installing a Firewall and configuring Fail2ban.