16 Results for:IANA
- Sort by:
Understanding the FTP PORT command
16 Aug 2022FTP uses control and data channels, each using a separate TCP port. Port 21 is for the control channel, and port 20 is for the data channel. Learn how these two channels are used. Read More
Examine a captured packet using Wireshark
17 Apr 2023Wireshark is a useful tool for capturing network traffic data. Network pros can make the most of the tool by analyzing captured packets to see what that data means for troubleshooting. Read More
How to use Wireshark OUI lookup for network security
07 Dec 2022Wireshark OUI lookup helps cyber defenders, pen testers and red teams identify and target network endpoints -- and it can be accessed from any browser. Read More
How to use SSH tunnels to cross network boundaries
11 Jul 2022The Secure Shell protocol authenticates and encrypts network connections. Find out how it's used to build tunnels while crossing private networks and even firewalls. Read More
What are port scan attacks and how can they be prevented?
07 Jul 2021Port scans provide data on how networks operate. In the wrong hands, this info could be part of a larger malicious scheme. Learn how to detect and defend against port scan attacks. Read More
COVID-19 strains critical certificate authority processes
23 Apr 2020Border crossings. Police checkpoints. Security cages. Secret safes. These are just some of the hurdles certificate authorities face as they strive to maintain security during COVID-19. Read More
IPv4 addresses will run out within eight months
02 Feb 2011The Internet Address and Naming Agency (IANA) will allocate the last remaining IPv4 (Internet Protocol version 4) addresses this month, signalling a shift to the new IPv6 internet addressing scheme. Read More
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
21 Apr 2014This is an excerpt from the book Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace by Todd G. Shipley and Art Bowker. Read More
Overcoming the hype with advanced network analytics software
27 Feb 2018Bloggers explore the capabilities of network analytics software, assess the coming impact of GDPR regulations and look into the use of Ethernet VPN with an MPLS data plane in data centers. Read More
GENEVE primer: The answer to network virtualization interoperability?
10 Jul 2014The GENEVE network encapsulation protocol is more flexible than VXLAN and NVGRE. Will it bring interoperability to network virtualization overlays? Read More