Guest Post: Capturing DDoS characteristics with the Dissector.
Guest Post: Study investigates booter-based DDoS attacks in the wild and the impact of an FBI takedown.
Guest Post: About 3% of the domain names requested by the NTP pool are invalid, and almost all the invalid domain names have never provided time synchronization services.
Guest Post: High precision time measurements depend on using multiple clocks to ensure redundancy and stability.
Guest Post: Network Time Security is a new authentication scheme for Network Time Protocol.
Guest Post: New Network Time Protocol client secures against time shifting by man-in-the-middle attackers.
Not all computer clocks are in sync and that can be cause for concern, writes Geoff Huston.