How to inspect TLS encrypted traffic
Guest Post: Three methods to decrypt TLS traffic, how each works, and when to use them.
Guest Post: Three methods to decrypt TLS traffic, how each works, and when to use them.
How to: A detailed step-by-step guide to ISO/IEC 27001:2022 certification.
Guest Post: How to filter malicious traffic directly at the network edge, without third-party scrubbing centres.
Guest Post: Using Vector Packet Processing and Bird2 to eliminate IPv4 point-to-point networks, freeing up IPv4 addresses.
Guest Post: With a small change to OSPFv3 it may be possible to avoid using IPv4 P2P transit networks.
Guest Post: How to conserve IPv4 addresses with IGP Babel.
Guest Post: Why discarded traffic monitoring is so important and how major vendors deal with it.
Guest Post: What I learned building a DNS resolver from scratch without low-level network programming experience.
Guest Post: Pushing limits in Go — from net.Dial to syscalls, AF_PACKET, and lightning-fast AF_XDP. Benchmarking packet sending performance.
How I leveraged APNIC Academy training into real-world productivity.