Topic: NetworkingArticles, hints, tips, and advice about networking.
O'Reilly Network articles about this topic:
Unified Home Networks with the Fritzbox
The Fritzbox is an all-in-one Linux-based device that supports VoIP, home networking, and even some extension mechanisms. Hacker Guylhem Aznar explains how he simplified his home network with this device.
Improving Network Reliability with Keepalived
No matter how good the software, hardware eventually fails. Redundancy is an important way to keep your important services running smoothly. With the right software, you can even sleep through otherwise catastrophic network failures. Philip Hollenback demonstrates how to make your network robust by using Keepalived on multiple Linux routers.
Michal Zalewski on the Wire
(ONLamp Security DevCenter)
What motivates a hacker? Perhaps curiosity, the pursuit of knowledge, and the simple joy of saying "Hmm, that's funny! What happens if I ...?" Eccentric security researcher Michal Zalewski exhibits these traits. Fearless interviewer Federico Biancuzzi recently talked with Zalewski about his curious approach to computer security, the need for randomness, and how the hacker mind works.
Distributing Content with BitTorrent
You have good software, or audio or video, and you want to make it available to the public. If you get really popular, though, you'll spend all of your money and bandwidth being popular--and then what? Consider P2P distribution with BitTorrent, which allows your users to share pieces of your file with each other, giving them faster transfers and you fewer headaches. Robert Bernier explains.
Simplify Network Programming with libCURL
The curl command-line utility is a fantastic way to download data from all kinds of repositories via HTTP, FTP, LDAP, and more. It's not just a utility, though. The back-end library libCURL allows you to make your programs URL aware, publishing and retrieving data over HTTP and FTP. Ethan McCallum demonstrates how easy it is to use.
Connecting Your Network to the IPv6 Internet with Linux
IPv6 is coming. In fact, you can encourage its adoption by using it right now. Ibrahim Haddad demonstrates how to connect your local network to the IPv6 Internet by configuring Freenet6's TSP on a Linux router.
Connecting to the IPv6 Internet
IPv6 is coming. In fact, you can encourage its adoption by using it right now, if you've already configured your Linux machine for IPv6. Ibrahim Haddad explains how to connect to the IPv6 Internet with Linux.
Enabling IPv6 in Linux
IPv6 is coming. In fact, you can encourage its adoption by using it right now. Ibrahim Haddad explains the ideas behind, and justifications for IPv6 and demonstrates how to support it on a Linux server.
Defending Your Site Against Spam, Part 2
Dru Nelson recently had spammers attempt to attack his network, but this time, he didn't notice until he checked the logs. Why? He's using qmail and Trustic. Read on to find out how they can protect you from unwanted e-mail.
Defending Your Site Against Spam
To users, unsolicited commercial e-mail is an annoyance. To mail server administrators, it's a threat. Dru Nelson recently had his network attacked by spammers. He explains the various defenses he considered for protecting against future attacks.
Synchronizing Networks with NTP
Accurate timekeeping is vital to accurate records, and accurate logs are the mainstay of good system administration. Glenn Graham explains NTP (the Network Time Protocol) and how to put it to work on your network.
IPsec Tunneling Between FreeBSD Hosts
IPSec encrypts data at the IP packet level, so insecure applications can be encrypted while travelling over the Internet. Mike DeGraw-Bertsch shows us how to set it up.
Accessing a Cisco Router
When you first purchase a Cisco router, you'll need to access the router via its console interface from a serial interface on your computer. Dru Lavigne shows you how to do this from FreeBSD.
Firewalls can potentially block huge amounts of traffic. Dru Lavigne shows us how to fine-tune our firewall logs to reveal the traffic that concerns us most.
Dynamic Address Assignment
Are you still assigning static IP addresses on your network? Terry Dawson explains how dynamic IP address assignment works and helps you understand if it is right for your network.
Getting Connected with 6to4
IPv6 is great in theory, but it won't do you much good if you can't get connected. Hubert Feyrer explains the basics of getting connected to IPv6 for BSD and Linux.
Bulletproofing Servers: Building a Challenge for Murphy
"Software operates at the whim of hardware, which makes stable hardware important to our longterm happiness as system administrators," writes Andy Neely. To make sure your server hardware is protected from the forces of Murphy, follow his advice for RAID protection, dual power supplies, and redundant Network Interface Cards (NIC). Andy will be a speaker at the upcoming Open Source Convention in San Diego, CA this coming July.
Introduction to IPv6
You have been told the Internet is running out of IP addresses and all your friends say NAT is the answer, but what is IPv6 and how is it different from what you are using now?
Michael Lucas gives us an overview of wireless networking in FreeBSD.
Examining ICMP Packets
Dru Lavigne explains how ICMP packets control messages sent between routers and hosts.
Introduction to Socket Programming with PHP
Daniel Solin uses a game analogy to show how PHP can be used to exchange data between two computers using network sockets.
IP Packets Revealed
Dru Lavigne finishes up her series on IP packets with a detailed analysis of the packets captured in the previous article.
Capturing TCP Packets
Want to capture network packets? Dru Lavigne shows how simple the process is and explains how to analyze the captured data.
TCP Protocol Layers Explained
Dru Lavigne explains how to read IP packet headers.
Where Have All the IPs Gone?
There are over 4 billion IP addresses available, and yet, we are still running out. Michael Lucas explains where they went and how people are working to solve the problem.
IPv6: An Interview with Itojun
Hubert Feyrer interviews Jun-ichiro "itojun" Hagino, one of the core IPv6 developers involved with the KAME project.
Creating Network Diagrams
As the complexity of your network grows, it makes good sense to maintain documentation that describes it. Terry Dawson reviews tools to make this easier.
Monitoring Unix Logins
Dru Lavigne exposes the contents of
lastlog, the files that record who is logged in to your Unix system.
PalmOS, Half-Life Server, and Ethereal Vulnerabilities
Problems this week include more symlink problems with catman and dialog, buffer overflows in oops, halflifeserver, and ethereal, key problems with gnupg, problems with PalmOS devices, and a prime example of amazing vulnerabilities in third-party software packages.
Security Alerts: Twig, Midnight Commander, and More
Noel Davis summarizes published open source and Unix exploits. Problems this week include arbitrary code execution in Twig, new symlink attacks, a hidden control code attack on Midnight Commander, and a LANGUAGE attack on glibc.
Security Alerts: OpenBSD Non-exploit and More
Noel Davis reviews the published exploits from Unix and open source. This week's Insecurities column includes a satirical non-exploit against OpenBSD
Building High Performance Linux Routers
Trying to add a high performace router to a big network on little budget? Terry Dawson shows us how to put one together using Linux.
David Spector shows us what software is commercially available to allow management of Linux in a 10,000 server enterprise environment.
Traffic shaping is the general term given to a broad range of techniques designed to enforce prioritization policies on a network link. Terry Dawson shows us some of the IP traffic shaping tools available for Linux and a simple example of how to use them.
Linux for Security Applications
David Spector explains basic Firewall and network security techniques. He also lists the basic tools that can be used, such as NMAP and IP Chains.
What is a Network Administrator Anyway?
Terry Dawson ponders: how do you differentiate between system administration and network administration?
Linux in a Multivendor Environment
One of Linux's strongest suits is as an "interoperability agent" that can allow a company to support multiple platforms, such as Windows, Unix systems, NetWare, and Apple Macintoshes painlessly from one central server.
Connecting to the Internet
This week's column shows where to get the latest Linux documentation for connecting to the Internet and how to set up a dial-up connection.
NISTNet: Emulating Networks on Your Own LAN
Use NISTNet to create realistic network traffic on a local LAN. Stress test your applications before they reach the real world.
Linux Clusters - Using Linux for Power Computing
An overview of building Linux clusters and how a cluster can help many businesses that need supercomputer performance but have a workstation budget.
Securing Your Home Network With the Edge Firewall
Should you consider setting up a home firewall, and if so, what are the pros and cons? Carl Constantine describes his adventures into home network security.
Linux/ATM - State of Play
Terry Dawson explains the Linux support that's available for ATM and what you can do with it.
The Week in Linux News
How to build a firewall, tutorials on vi and Bash, Sun's hesitation on Linux, and new releases.
The Week in Linux News
New tutorials and reports on security, PHP, Apache and Perl.
The Week in Linux News
Network and security resources, new releases, and developer resources.
Deploying Squid, Part 2 of 2
Install your own web proxy.
Preventing Distributed Denial of Service Attacks
Six ways to avoid becoming an unwilling collaborator.
Linux Tools For Network Analysis
Spector finds two tools for watching traffic: Ethereal and Netwatch.
Other documents about this topic:
Below are other references available on the web for this topic. Since other sites may change their links, please if you find any that may need to be updated.
Review: Linux and DSL
Andy Dubman reviews his experience setting up DSL with Linux.