ETSI shows its coin-operated nature by working on insecure protocols
Lots of network monitoring platforms use GeoIP databases to track/monitor sources. These databases are, perhaps, 75% accurate (for some definition of accurate). This is your regular reminder to have a sense of caution about location based on public IP address. John S. and his mother Ann live in the house, which is in Pretoria, the […]
Not just big, but huge.
Good summary of DDOS using IP Spoofing
Cisco took FOUR YEARS to patch disclosed vulnerabilities in NX-OS.