networking

0

A call to arms for obfuscated bridges

https://lists.torproject.org

Fresh obfuscated Tor bridges are needed more than ever, since they are the only way for people to access Tor in some areas of the world (like China, Iran and Syria). But it is not the same as an exit node.

Read more »
Superbowl H5N1's picture
Created by Superbowl H5N1 9 years 5 weeks ago – Made popular 9 years 5 weeks ago
Category: High End   Tags:
0

Troubleshooting Network problems in Ubuntu

http://1024bitez.blogspot.com

Internet connectivity is one of the important means of communication in todays life. So troubleshooting the problems in our own networks or reconfiguring it for the easiness is not to be praised as a "geekness". In my opinion you don't need to be a geek for setting an internet connection or recovering your machine from a network problem.

Read more »
jintujacob's picture
Created by jintujacob 11 years 32 weeks ago – Made popular 11 years 32 weeks ago
Category: End User   Tags:
0

A complete reference to SSH tunnelling

http://1024bitez.blogspot.com

In simple words tunneling is a method of bypassing firewall or proxy restrictions using some tunnelling protocols. It works by creating a "tunnel", or a communications channel that makes the firewall think that it is getting traffic from a web browser. Communications content is delivered through this tunnel to our gateway or your own personal gateway.

Read more »
jintujacob's picture
Created by jintujacob 11 years 33 weeks ago – Made popular 11 years 33 weeks ago
Category: End User   Tags:
0

Copying Remote Files with scp

http://1024bitez.blogspot.com

To use scp to transfer files, the SSH service (usually the sshd server daemon) must be running on the remote system. Here are some examples of useful scp commands:

Read more »
jintujacob's picture
Created by jintujacob 11 years 33 weeks ago – Made popular 11 years 33 weeks ago
Category: End User   Tags:
0

Burning Man's open source cell phone system

http://www.networkworld.com

The (in)famous desert festival experiments with DIY telephone networking. They use the AGPLv3 licensed OpenBTS GSM implementation.

Read more »
spanky's picture
Created by spanky 11 years 38 weeks ago – Made popular 11 years 38 weeks ago
Category: Community   Tags:
0

Kernel Log: Coming in 2.6.35 (Part 3) - Network support

http://www.h-online.com

Several patches submitted by a Google developer will enable the kernel to push considerably more data through network cables on multi-core systems. Some of the LAN and Wi-Fi drivers also promise greater throughput, or to use less power, due to various driver enhancements

Read more »
stripcut's picture
Created by stripcut 11 years 43 weeks ago – Made popular 11 years 43 weeks ago
Category: High End   Tags:
0

How To Monitor Network Traffic: Two Indispensable Commands

http://techthrob.com

This how-to will teach you two commands, iftop and nethogs, that you can use to monitor network traffic on a Linux machine. You can use iftop to view traffic by individual connection, port, network segment, or remote host, which gives you a detailed accounting of all packets coming in and out of your machine.

Read more »
nemilar's picture
Created by nemilar 11 years 43 weeks ago – Made popular 11 years 43 weeks ago
Category: High End   Tags:
0

Let's Deep-Six Facebook and Do Open Source Social Networking Instead

http://www.linuxinsider.com

"An open and distributed model gives users and organizations a chance to choose their social networking platform without sacrificing their connections to friends, family, business partners and colleagues. Control of the data would be an obviously important decision factor for many people."

Read more »
innerphaze's picture
Created by innerphaze 11 years 48 weeks ago – Made popular 11 years 48 weeks ago
Category: Community   Tags:
0

Kernel Log: Coming in 2.6.34 (Part 1) - Network Support

http://www.h-online.com

Expected for release in May, Linux kernel version 2.6.34 contains several new network drivers and various advancements designed to improve network performance or increase network configuration flexibility, which will particularly impact virtualisation

Read more »
iamspam's picture
Created by iamspam 12 years 6 weeks ago – Made popular 12 years 6 weeks ago
Category: High End   Tags:
0

NetworkManager vs wicd vs wpa_gui

http://nthrbldyblg.blogspot.com

Here's a quick comparison between a few network control tools for Linux. These tools all give you some sort of network control from the Desktop - a service traditionally provided by daemons and initialization scripts.

Read more »
gooogle's picture
Created by gooogle 12 years 9 weeks ago – Made popular 12 years 9 weeks ago
Category: End User   Tags:
0

Get SheevaPlug!

http://www.openplug.org

Eban Moglen suggests this ARM-based, GNU/Linux device as a networking solution to the troubled times now facing the Free Internet. Communicate with networking friends with greater security. See interview below.

Read more »
lozz's picture
Created by lozz 12 years 10 weeks ago – Made popular 12 years 10 weeks ago
Category: End User   Tags:
0

Using Nmap to "Fix" a Problem

http://systhread.net

Fixing a Problem with Nmap Ever had an ipv4 network address that is supposed to migrate over via a high availability mechanism simply not work or even stranger if there were several addresses some do and some do not?

Read more »
waterbag's picture
Created by waterbag 12 years 11 weeks ago – Made popular 12 years 11 weeks ago
Category: High End   Tags:
0

What’s the difference between a Hub, a Switch and a Router?

http://linuxdesk.wordpress.com

Hubs, switches, and routers are all devices that let you connect from one computers to other computers, networked devices, or to other networks.

Read more »
gagan's picture
Created by gagan 12 years 13 weeks ago – Made popular 12 years 13 weeks ago
Category: High End   Tags:
0

The most insecure part of your network is...

http://www.itworld.com

Sure, It's Secure: "Your desktops' operating systems? Your servers' operating systems? Your firewall? Or..."

Read more »
bruce.almighty's picture
Created by bruce.almighty 12 years 19 weeks ago – Made popular 12 years 19 weeks ago
Category: High End   Tags:
0

Linux-powered Packet Fence Protects Your Network

http://www.linuxplanet.com

Packet Fence bundles many useful and powerful network protection tools into an attractive, integrated package. Such as network access control, monitoring, intrusion detection, VLAN isolation, DHCP fingerprinting, and captive portal. Eric Geier introduces us to this protective powerhouse.

Read more »
netturfer's picture
Created by netturfer 12 years 21 weeks ago – Made popular 12 years 21 weeks ago
Category: High End   Tags:

Best karma users