Taking a closer look at the NTP pool using DNS data
Guest Post: About 3% of the domain names requested by the NTP pool are invalid, and almost all the invalid domain names have never provided time synchronization services.
Guest Post: About 3% of the domain names requested by the NTP pool are invalid, and almost all the invalid domain names have never provided time synchronization services.
Adli Wahid participated at the IX 2020 – Internet Security and Mitigation of Risk Webinar, held online on 15 June 2020.
Guest Post: Help researchers understand how well and secure email servers are setup.
Peek behind the scenes of APNIC’s Honeynet project to see what open source tools are being used.
Guest Post: HTTPS adds an encrypted layer of protection, applying TLS to your browser’s communications with the website, which hides the information being sent back and forth, ensuring prying eyes cannot see the information.
Guest Post: There are several freely available standards, policies and protocols that can help any organization decrease the risk of their domains being abused.
Guest Post: Follow the impact of a real-world route leak from 2019 that had ramifications around the world.
Jamie Gillespie presented on cybersecurity at the PITA Technical and Business Session, held online from 10 to 11 June 2020.
Guest Post: Running your own recursive resolver enables you to use the DNS to filter for malicious traffic.
Guest Post: Network debugging can be an arduous task but there are some simple, open-sourced ways to speed it up.