networking   116922

« earlier    

Vigor
Verifiable high speed NAT written in C
code  orthodoxy  networking  infrastructure 
8 hours ago by Qkn7Ua6K9289pPqt4689
BBR, the new kid on the TCP block
A look at Google's delay-controlled TCP flow control algorithm, called BBR.
networking  tcpip  work 
17 hours ago by ahall
RaspiWiFi: Headless WiFi Setup for Raspberry Pi
oT-RaspiWiFi is a program to headlessly configure a Raspberry Pi's WiFi connection using any other WiFi-enabled device (much like the way a Chromecast or similar device can be configured). RaspiWiFi has been tested with the Raspberry Pi B+, Raspberry Pi 3, and Raspberry Pi Zero W.
wifi  raspberrypi  configuration  sysadmin  hostapd  accesspoint  github  opensource  networking 
yesterday by cyberchucktx
Droid NAS
removed from app store as of 2018??
android  app  networking 
yesterday by mechazoidal
Is DNS the Achilles heel in your MySQL installation?
Why host-specific lookups are bad for performance and how to avoid them:

skip_name_resolve = OFF
dns  mysql  performance  networking 
yesterday by archangel
linux - How to make iptables rules expire? - Server Fault
Q: Someone told me this is possible, but I can't find anything on google or man pages.
I need to ban IPs for a certain amount of time, and then have then unbanned automatically.
networking  security  linux  firewall  example  cli  sysadmin  via:ezequiel 
yesterday by objectif
Iptables Restricting Access By Time Of The Day - nixCraft
Recently I was asked to control access to couple of services based upon day and time. For example ftp server should be only available from Monday to Friday between 9 AM to 6 PM only. [...]
networking  security  linux  firewall  example  cli  sysadmin  via:ezequiel 
yesterday by objectif
VigNAT: A Formally Verified Performant NAT
The challenge lies in combining the results of these two verification techniques, and for that we developed a technique we call “lazy proofs”. A lazy proof consists of sub-proofs structured in a way that top-level proofs proceed assuming lower level properties, and the latter are proven lazily a posteriori. For example, symbolic execution requires the use of models that must be correct; we first do the symbolic execution and only afterward validate automatically the correctness of the models. This approach enables us to avoid having to prove that our models are universally valid—which is hard—but instead only prove that they are valid for the specific NF and the specific properties we verified earlier with symbolic execution. This is much easier.
networking  cs  proof  NAT 
yesterday by euler
Iptables Restricting Access By Time Of The Day - nixCraft
Recently I was asked to control access to couple of services based upon day and time. For example ftp server should be only available from Monday to Friday between 9 AM to 6 PM only. [...]
2006  blogpost  networking  security  linux  firewall  example  cli  sysadmin  tips 
yesterday by ezequiel

« earlier    

related tags

2006  802.15.4  accesspoint  activism  adtinc  advice  analog  android  app  appliances  architecture  article  async  asynchronous  att  audio  averypennarun  aws  balancer  bare  bell  ben_casnocha  bgp  blockchain  blogging  blogpost  bonjour  book  bpf  branding  bridge  bsd  bufferbloat  caius  calico  career  cli  cloud  code  computer  computers  computing  comunidades  config  configuration  container  cs  culture  curl  data-structure  data  datacenter  devops  dhcp  digital  directory  discovery  dns-home  dns-sd  dns  docker  dpdk  drivers  ecmp  education  emulation  encryption  engineering  entrepreneurship  ethereum  example  exploit  fail  fax  firewall  free  freebsd  friend  funny  garbage  github  go  golang  googlecloud  group  hack  hacking  haproxy  hardware  hashing  history  hostapd  how-to  how_we_live  how_we_work  howto  http  iaas  ietf  industry  informatica  information  infrastructure  inspiration  interesting  internet  iot  ip  ipfs  iptables  jobs  kernel  kubernetes  layer4  lessons_learned  library  linkedin  linux.foundation  linux  load-balancer  load-balancing  load  loadbalancing  lowlevel  mac  macos  macosx  management  marketing  mathematics  mesh  metal  minimalism  mobile  monitoring  music  mysql  nas  nat  nestedvirtualization  netplan  netstat  network  network_security  networks  nfs  nodes  nos  openbsd  opendaylight  opensource  openvswitch  openwrt  orthodoxy  os-x  ovs  ovswitch  papers  pdf  performance  personalbranding  pf  physics  politics  portal  productivity  productmanagement  programming  proof  protocol  psychology  py  python  qos  queue_delay  queues  raspberrypi  reference  reid_hoffman  reload  rendezvous  replacement  routing  rust  scale  scraping  sdn  sec  security  self-deception  self-delusions  sensor  server  services  sharing  shell  simplicity  skb  sniffing  snmp  socket  software.defned.networking  software  ss  stack  standard  status  success  sysadmin  tappit  tcp  tcpip  tech  technology  telecom  telephony  terraform  testing  thought_experiments  tips  toolkit  tools  traceroute  travel  tutorial  ubuntu  udp  unity3d  utilities  virtual.networking  virtualization  voting  vpn  vr  vyos  web  webdev  weird  wide_area_bonjour  widgets  wifi  wiki  windows  wireless  work  xml  zeroconf 

Copy this bookmark:



description:


tags: