https://www.linux.com/learn/working-network-configurations-command-line
Tags: #Linux #networking #shell
  
  Tags: #Linux #networking #shell
Linux.com | The source for Linux information
  
  Working with Network Configurations from the Command Line
  If you’re a Linux administrator, there will be times when you have to work with the command line… many times. There’s a reason for that. With the command line comes great power and flexibility. For that very reason, you need to know the command line and know…
  http://developers.redhat.com/blog/2016/10/28/what-comes-after-iptables-its-successor-of-course-nftables/
Tags: #networking
  
  Tags: #networking
Red Hat Developer
  
  What comes after 'iptables'? Its successor, of course: `nftables` | Red Hat Developer
  Nftables is a new packet classification framework that aims to replace the existing iptables, ip6tables, arptables and ebtables facilities. It aims to resolve a lot of limitations that exist in the
  https://techcrunch.com/2017/07/20/google-cloud-gets-a-new-networking-algorithm-that-improves-internet-throughput/
Tags: #Google #networking
  
  Tags: #Google #networking
TechCrunch
  
  Google Cloud gets a new networking algorithm that boosts internet throughput
  Google today announced that TCP BBR, a new congestion-control algorithm is now available to its Cloud Platform users. The general idea here is to improve on the existing congestion-control…
  https://www.youtube.com/watch?v=1cUUfMeOijg
Who said that it wasn't possible?
Tags: #networking #security #criptography
  
  Who said that it wasn't possible?
Tags: #networking #security #criptography
YouTube
  
  The Lava Lamps That Help Keep The Internet Secure
  At the headquarters of Cloudflare, in San Francisco, there's a wall of lava lamps: the Entropy Wall. They're used to generate random numbers and keep a good bit of the internet secure: here's how.
Thanks to the team at Cloudflare - this is not a sponsored…
  Thanks to the team at Cloudflare - this is not a sponsored…
https://bagder.gitbooks.io/http2-explained/en/
A detailed document describing HTTP/2, the background, concepts, protocol and something about existing implementations.
Tags: #http #networking
  A detailed document describing HTTP/2, the background, concepts, protocol and something about existing implementations.
Tags: #http #networking
https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-wi-fi-certified-wpa3-security
WPA3 specification for network authentication is now official. This is the official announcement.
Tags: #networking #security
  WPA3 specification for network authentication is now official. This is the official announcement.
Tags: #networking #security
https://www.techspot.com/news/77482-internet-evolving-http-no-longer-use-tcp.html
Tags: #networking #technology #http
  
  Tags: #networking #technology #http
TechSpot
  
  The internet is evolving: HTTP will no longer use TCP
  HTTP v1, v1.1 and v2 have all used TCP because it’s been the most efficient way to incorporate reliability, order and error-checking into Internet Protocol (IP). In this case, reliability refers to the server’s ability to check if any data…
  https://www.forcepoint.com/blog/security-labs/attacking-internal-network-public-internet-using-browser-proxy
Tags: #networking #security #javascript
  
  Tags: #networking #security #javascript
Forcepoint
  
  Attacking the internal network from the public Internet using a
  Though not a new attack, it is not very widely known outside of the security research community that a malicious JavaScript hosted on the public Internet can attack the internal network. Since a