MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
April 20, 2004
Michael Singer
Flaw Puts TCP Data Transfer At Risk Officials say systems that rely on persistent TCP connections, such as routers supporting BGP, could be affected. mark for My Articles similar articles
InternetNews
July 21, 2009
P2P Causing Mobile Network Congestion as Well Just like it did to wired Internet connections, peer-to-peer apps are clogging networks that can't handle the kind of bandwidth they need. mark for My Articles similar articles
HBS Working Knowledge
April 16, 2007
Sean Silverthorne
Delivering the Digital Goods: iTunes vs. Peer-to-Peer ITunes demonstrates that to compete effectively against free p2p networks, online digital distribution must deliver experiences to consumers that cannot be easily matched by decentralized, self-sustained peer-to-peer networks. mark for My Articles similar articles
InternetNews
May 12, 2004
Ryan Naraine
IETF Mulling Changes to Secure TCP An IETF working group has recommended TCP changes to eliminate, or at least minimize, attack scenarios against the widely used data communication protocol. mark for My Articles similar articles
RootPrompt.org
June 14, 2000
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. mark for My Articles similar articles
Linux Journal
February 1, 2002
Gianluca Insolvibile
Inside the Linux Packet Filter In Part I of this two-part series on the Linux Packet Filter, the author describes a packet's journey through the kernel... mark for My Articles similar articles
IEEE Spectrum
January 2006
Robert W. Lucky
Tragedy of the Commons Imagine if our cars acted like transmission control protocol -- TCP. You'd be allowed to drive as fast as you wanted, as long as you didn't interfere with others. mark for My Articles similar articles
InternetNews
September 9, 2009
Cisco Patches Critical TCP Vulnerability Cisco patches critical flaw that could trigger massive DoS condition. mark for My Articles similar articles
Linux Journal
September 1, 2007
Jan Newmarch
Introduction to Stream Control Transmission Protocol This article provides a brief introduction to the IETF Stream Control Transmission Protocol and explains how it can be used as a replacement for TCP. mark for My Articles similar articles
InternetNews
March 27, 2008
Andy Patrizio
Comcast, BitTorrent Pass The Digital Peace Pipe Agreement is about throttling of BitTorrent transfers as Comcast pumps up the speed. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
InternetNews
February 13, 2008
Comcast Defends BitTorrent Traffic 'Management' Comcast tells U.S. officials it doesn't give preferential treatment to any content, but merely throttles bandwidth-heavy usage. mark for My Articles similar articles
Linux Journal
April 1, 2007
Dinil Divakaran
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. mark for My Articles similar articles
Information Today
December 30, 2002
Richard W. Wiggins
The Internet Marks Its 20th Anniversary As you celebrate New Year's Day, pause to contemplate that it marks the 20th anniversary of the birth of the Internet. mark for My Articles similar articles
RootPrompt.org
September 7, 2000
Sander Plomp
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. mark for My Articles similar articles