"Networking" tag

CloudStack: An Overview of the Open Source IaaS Platform

Here’s an open source IaaS platform to set up an on-demand, elastic cloud computing service. It enables utility computing services by allowing cloud service providers to offer self-service compute instances, storage volumes and…

Linux Firewall: Executing Iprules Using PHP

A firewall keeps the network secure by analysing packets and determining whether they should be allowed through or not. This article shows how to manipulate Iprules using PHP scripts. Linux has its own…

Apache Cassandra The Crash-Proof NoSQL Database

The last time I wrote on NoSQL databases in February 2011, the technology was already booming. Today, these databases have changed the way developers think about building their applications, making them look beyond…

Bandwidth Throttling with NetEM

Bandwidth Throttling with NetEM Network Emulation

NetEM (Network Emulation) provides functionality for testing protocols, by emulating the network properties of wide-area networks. This article describes the use of NetEM in benchmarking the performance of a Web application, simulating Internet-like…

Socket programming isn't really that tough

Creating Your Own Server: The Socket API, Part 2

Earlier, we created a simple server and client program using the socket API. This time, we’ll first start with a program, and then explain what’s going on. So start up your systems, and…

Verify firewall security

Advanced Nmap: Scanning Firewalls Continued

The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead to various vulnerabilities. Based on the scan results, several…

Nmap Scanning Techniques

Advanced Nmap: Scanning Techniques Continued

The earlier articles on Nmap had covered the basic features, the working of the TCP 3-way handshake, and some important scan types, along with their practical use. The third article in this series…

Advanced Nmap

Advanced NMap: Some Scan Types

A broad overview and the basic features of NMap have been covered in an earlier article in this series of articles on Nmap. In this article, we discuss in detail various NMap scan…

Dabble with Netkit to Sandbox a Network

Networking is very interesting and I’m sure many of us would like to experiment with it, but the unavailability of laboratories with sufficient computers is a stumbling block. What if I tell you that you can turn any computer into a network device at no extra cost?

Recipes for Networking

It’s always fun to try out different hacks under the GNU/Linux freedom platform. The pride of becoming a command-line wizard makes everyone stay close to the CLI. Moreover, the CLI vests you with the ultimate power to control your machine.

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.