Securing Internet geolocation: the basics
Guest Post: A look at the geographic verification techniques Client Presence Verification and Server Location Verification
Guest Post: A look at the geographic verification techniques Client Presence Verification and Server Location Verification
Guest Post: Best practices for how to monitor your network more effectively within a budget.
Paul Wilson clarifies how bad IPv4 address exhaustion is and what people can do to obtain public address space.
Spring’s @Transactional appears simple on the surface, but is hiding complex mechanisms that can come unstuck
Guest Post: NAT over IPv6 is possible, but it’s messy and could be so easily avoided.
Brush up on some security basics to help secure your servers.
While network security is best done in layers, a strong foundation is the most critical.
Guest Post: Running IPv4 as-a-service over an IPv6 network could simplify the steps to becoming IPv6-only.
Three of the most popular ‘how to’ posts on a range of tools and services.
Learn how to use a raw socket interface in IPv6 to generate a UDP-based DNS server and a TCP-based HTTP(S) server that allows the application to exercise direct control over packet fragmentation.