240 Results for:udp
- Sort by:
Is data interoperability the key to unlocking IoT value?
07 Jul 2020Much of the hype around the internet of things focuses on smart devices, but the best IoT initiatives will be those led by business need and data Read More
How can a DDoS reflection attack abuse CLDAP?
28 Sep 2017A new exploit of CLDAP servers can be used for a DDoS reflection attack that gives attackers a 70x boost. Nick Lewis explains how to defend against this new threat. Read More
Select a data backup appliance with robust functionality
16 May 2018Many leading appliance-based data backup systems include functions such as backup, archiving, disaster recovery and replication, and they can be used for test/development and analytics. Read More
How do you reconfigure access to a VMkernel port?
04 Jun 2018Use ESXi firewall configuration settings and VMkernel ports to control the levels of access that different services, such as Secure Shell, have to your management network. Read More
More POS malware detected in the wild
08 Feb 2018The first new point of sale malware in many months is stealing data from the magnetic strips on payment cards, security researchers warn Read More
New QUIC protocol promises faster Web apps
05 Aug 2015The QUIC protocol may or may not become a standard, but either way, use of the protocol could provide a performance boost for Web and mobile apps. Read More
How to land a job in cybersecurity
05 Apr 2021Find out if you're a good fit for a career in cybersecurity, the kind of training required, how to start building IT security skills and the types of jobs available. Read More
LizardStresser IoT botnet launches 400Gbps DDoS attack
30 Jun 2016Attack groups using the LizardStresser botnet are exploiting IoT devices to mount massive DDoS attacks without using amplification techniques, say researchers Read More
Proxmox VE 6 and later offers container features, better security
27 May 2020Proxmox VE, an open source virtualization management product, provides admins with several features, such as VM live migration, backup abilities and high availability. Read More
Constrained Application Protocol: CoAP is IoT's 'modern' protocol
20 Jun 2016CoAP is taking the place of older, 'heavy' protocols and helping bring the promise of the internet of things to constrained, low-power devices. Read More