When it’s not DNS, it’s probably NTP
An intriguing detective story about debugging a chain of problems.
An intriguing detective story about debugging a chain of problems.
Guest Post: How does the NTP Pool map clients to NTP servers and how can it be improved?
Guest Post: The Network Time Protocol has no security mechanisms. How to fix it.
Guest Post: Learn how to navigate through the relevant RFCs associated with publishing IPv6 NTP servers with DHCPv6.
Guest Post: About 3% of the domain names requested by the NTP pool are invalid, and almost all the invalid domain names have never provided time synchronization services.
Guest Post: Network Time Security is a new authentication scheme for Network Time Protocol.
How SSH was neatly assigned between ports 21 (Telnet) and 23 (FTP) — two protocols it was set to succeed.
Emeritus Professor David Mills, University of Delaware, sadly passed away in January 2024.
Adli Wahid gave a keynote presentation on CERT essentials at the 2023 NCIT, held from 17 to 18 August 2023 in Suva, Fiji.
Guest Post: Measuring blowback — the phenomenon where a single probe to a target can generate multiple packets in response.