Can you detect new exploits with old techniques?
Guest Post: Why aren’t the good guys ahead of the bad guys when it comes to detecting covert channels and exploiting known vulnerabilities?
Guest Post: Why aren’t the good guys ahead of the bad guys when it comes to detecting covert channels and exploiting known vulnerabilities?
Guest Post: RFC8188 provides protocol designers a new option for building multi-party protocols with HTTPS by defining a standardized format for encrypting HTTP message bodies.
Geoff recaps some highlights from the technical presentations at RIPE 75 in Dubai.
Guest Post: New research by NZRS provides more insight into how New Zealand’s .nz domains are secured.
Guest Post: Interconnection agreements require more than just knowledge of how BGP works. Learn what you need to consider and who you need to involve in discussions.
Learn how to use a raw socket interface in IPv6 to generate a UDP-based DNS server and a TCP-based HTTP(S) server that allows the application to exercise direct control over packet fragmentation.
APNIC has resolved a whois security incident resulting from a technical error during the upgrade of APNIC’s whois database.
Guest Post: The MAMI Project’s new Path Transparency Observatory will help operators with locating and analysing network impairments on the Internet.
Guest Post: Transport Layer Security 1.3 has been designed to be more secure in order to prevent the interception of sessions over the Internet.
Topics discussed at day two of DNS OARC 27 included the risks to the DNS associated with IPv6 and a project to reduce unnecessary traffic on the roots.