16 Results for:IANA

  • Sort by: 

Understanding the FTP PORT command

By Terry Slattery, Laura Chappell 16 Aug 2022

FTP uses control and data channels, each using a separate TCP port. Port 21 is for the control channel, and port 20 is for the data channel. Learn how these two channels are used. Read More

Examine a captured packet using Wireshark

By Damon Garn 17 Apr 2023

Wireshark is a useful tool for capturing network traffic data. Network pros can make the most of the tool by analyzing captured packets to see what that data means for troubleshooting. Read More

How to use Wireshark OUI lookup for network security

By Peter Loshin 07 Dec 2022

Wireshark OUI lookup helps cyber defenders, pen testers and red teams identify and target network endpoints -- and it can be accessed from any browser. Read More

How to use SSH tunnels to cross network boundaries

By Peter Loshin 11 Jul 2022

The Secure Shell protocol authenticates and encrypts network connections. Find out how it's used to build tunnels while crossing private networks and even firewalls. Read More

What are port scan attacks and how can they be prevented?

By Michael Cobb, Nick Lewis 07 Jul 2021

Port scans provide data on how networks operate. In the wrong hands, this info could be part of a larger malicious scheme. Learn how to detect and defend against port scan attacks. Read More

COVID-19 strains critical certificate authority processes

By Rob Wright 23 Apr 2020

Border crossings. Police checkpoints. Security cages. Secret safes. These are just some of the hurdles certificate authorities face as they strive to maintain security during COVID-19. Read More

IPv4 addresses will run out within eight months

By Jenny Williams 02 Feb 2011

The Internet Address and Naming Agency (IANA) will allocate the last remaining IPv4 (Internet Protocol version 4) addresses this month, signalling a shift to the new IPv6 internet addressing scheme. Read More

Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

21 Apr 2014

This is an excerpt from the book Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace by Todd G. Shipley and Art Bowker. Read More

Overcoming the hype with advanced network analytics software

By Eamon McCarthy Earls 27 Feb 2018

Bloggers explore the capabilities of network analytics software, assess the coming impact of GDPR regulations and look into the use of Ethernet VPN with an MPLS data plane in data centers. Read More

GENEVE primer: The answer to network virtualization interoperability?

By David Jacobs 10 Jul 2014

The GENEVE network encapsulation protocol is more flexible than VXLAN and NVGRE. Will it bring interoperability to network virtualization overlays? Read More