When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. iptables - Wikipedia

    en.wikipedia.org/wiki/Iptables

    iptables superseded ipchains; and the successor of iptables is nftables, which was released on 19 January 2014 [2] and was merged into the Linux kernel mainline in kernel version 3.13. Overview [ edit ]

  3. Uncomplicated Firewall - Wikipedia

    en.wikipedia.org/wiki/Uncomplicated_Firewall

    Uncomplicated Firewall (UFW) is a program for managing a netfilter firewall designed to be easy to use. It uses a command-line interface consisting of a small number of simple commands, and uses iptables for configuration.

  4. tc (Linux) - Wikipedia

    en.wikipedia.org/wiki/Tc_(Linux)

    tc relates to the Linux kernel packet scheduler as iptables to netfilter. Both are user-space CLI programs that are used to configure their respective Linux kernel subsystem. tc (traffic control) is the user-space system administration utility program used to configure the Linux kernel packet scheduler.

  5. Deep packet inspection - Wikipedia

    en.wikipedia.org/wiki/Deep_packet_inspection

    The secure room contained Narus traffic analyzers and logic servers; Narus states that such devices are capable of real-time data collection (recording data for consideration) and capture at 10 gigabits per second. Certain traffic was selected and sent over a dedicated line to a "central location" for analysis.

  6. Promiscuous mode - Wikipedia

    en.wikipedia.org/wiki/Promiscuous_mode

    A non-routing node in promiscuous mode can generally only monitor traffic to and from other nodes within the same collision domain (for Ethernet and IEEE 802.11) or ring (for Token Ring). Computers attached to the same Ethernet hub satisfy this requirement, which is why network switches are used to combat malicious use of promiscuous mode.

  7. nftables - Wikipedia

    en.wikipedia.org/wiki/Nftables

    A command to drop any packets with destination IP address 1.2.3.4: nft add rule ip filter output ip daddr 1.2.3.4 drop Note that the new syntax differs significantly from that of iptables, in which the same rule would be written: iptables -A OUTPUT -d 1.2.3.4 -j DROP

  8. Tarpit (networking) - Wikipedia

    en.wikipedia.org/wiki/Tarpit_(networking)

    A tarpit is a service on a computer system (usually a server) that purposely delays incoming connections. The technique was developed as a defense against a computer worm , and the idea is that network abuses such as spamming or broad scanning are less effective, and therefore less attractive, if they take too long.

  9. Random early detection - Wikipedia

    en.wikipedia.org/wiki/Random_early_detection

    Random early detection (RED), also known as random early discard or random early drop, is a queuing discipline for a network scheduler suited for congestion avoidance. [1]In the conventional tail drop algorithm, a router or other network component buffers as many packets as it can, and simply drops the ones it cannot buffer.