background preloader

The TCP/IP Guide

The TCP/IP Guide
The TCP/IP Guide Welcome to the free online version of The TCP/IP Guide! My name is Charles and I am the author and publisher. I hope you will find the material here useful to you in your studies of computing, networking, and programming. Here are a few tips, links and reminders to help you out: Introduction: Newcomers to The TCP/IP Guide may wish to read the Introduction and Guide to the Guide, which will explain what the Guide is about and provide you with useful information about how to use it. Last but definitely not least: this site is provided as an online reference resource for casual use. If you like The TCP/IP Guide enough to want your own copy in convenient PDF format, please license the full Guide. Thanks again and enjoy the site! Charles Home - Table Of Contents - Contact Us

http://www.tcpipguide.com/free/index.htm

Related:  Ethical HackingNetwork/SecurityNetwork

Metasploit Metasploit From Wikibooks, open books for an open world Jump to: navigation, search The Metasploit Book Probably the Best Free Security List in the World Security List Index Select a Security Category: All Items Keys Discontinued or not updated recently (for at least three years). Protocol Registries IANA is responsible for maintaining many of the codes and numbers contained in a variety of Internet protocols, enumerated below. We provide this service in coordination with the Internet Engineering Task Force (IETF). For more information on how to create registries, please see RFC 5226, Section 4. This document also covers the requirements for IANA Considerations in RFCs. To view the various protocol registries, just click on their titles. To apply to modify a registry, use the relevant form.

Offensive Computer Security Home Page (CIS 4930 / CIS 5930) Spring 2014 - Vimperator Instructors Prof. Xiuwen Liu (homepage: W. Owen Redwood (homepage: Course Time and Location Metasploit/MeterpreterClient TODO - meterpreter introduction. Core Commands[edit] ? Secure Your Wireless Router In The Short Term By Assigning It An Aggressive Name As more devices ship with wireless networking capabilities, it becomes increasingly important to have routers that are capable of handling connections from hardware such as tablets, laptops and mobile phones. The problem is that many routers still in use are perfectly good pieces of hardware, except for one drawback – they don’t support Wireless-N or offer advanced encryption such as WPA. With the threat of drive-by Wi-Fi theft and the risk of secure data being transferred over a non-secure connection, wireless routers without the most current security options can be temporarily shored up with just a bit of imagination. Meanwhile, there are ways in which you can get hold of modern routers for free and connect to them using low-cost USB devices. Secure Your Wireless Router with Its Name According to figures published in October 2011, Windows XP still has a respectable market share as the operating system on around 33% of all computers connected to the web.

Network management In computer networks, network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems.[1] Network management is essential to command and control practices and is generally carried out of a network operations center. Operation deals with keeping the network (and the services that the network provides) up and running smoothly. It includes monitoring the network to spot problems as soon as possible, ideally before users are affected.Administration deals with keeping track of resources in the network and how they are assigned. It includes all the "housekeeping" that is necessary to keep the network under control.Maintenance is concerned with performing repairs and upgrades—for example, when equipment must be replaced, when a router needs a patch for an operating system image, when a new switch is added to a network.

The Wild West of Social Media Evidence Collection Due to inconsistencies in format, data collection from social networking sites and Webmail requires careful attention and adaptability to ensure evidence integrity. When it comes to social media and Webmail in forensic collection, these two are a lawless bunch. Everyone—from kids to great-grandparents—seems to be using social media and Webmail on a daily basis. Take a look at these statistics: • 1 in 5 minutes online is spent on social networks1 • 6.6 hours a month are spent per user on Facebook2 • 400 million tweets are sent everyday3 • 72 hours of video are uploaded to YouTube every minute4 • 3 million blogs are started every month5 • 4.5 million photos are uploaded to Flickr every minute6 • There are: 3.1 billion e-mail accounts72.4 billion social networking accounts worldwide7901 million active users on Facebook8140 million active users on Twitter9161 million members on LinkedIn1064 million blogs on Tumblr1154 million WordPress sites12

BlackArch - ArchWiki - Vimperator Specialty Distributions alphaOS alphaOS is a simple and minimalistic Linux distribution for the x86-64 architecture, built using Linux Live Kit set of scripts developed by Tomas M. It is based on Arch Linux and uses pacman as the default package manager. Linux and Open source Understanding Nmap Commands: In depth Tutorial with examples - Vimperator Article by James Hawkins As we all know, Nmap (Network Mapper) is a stealth port scanner widely used by network security experts (including forensics & Pen-testing Experts). In this article we’ll see the different types of Nmap Scans, its techniques, understanding the purpose and goals of each scan , its advantages or disadvantages over other scanning tools, which could be better at evading firewalls & IDS (To a certain extent) and much more. In this first part, I have made my best to explain the basic scanning techniques, Host discovery options, port scanning options, techniques used in detecting Operating system & services running on the system. i also give Nmap as already installed on your system. Let’s start with one of the most basic and default scan, the one without using any parameters. Open up the terminal, in Ubuntu ctrl+alt +t

Related: