When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. traceroute - Wikipedia

    en.wikipedia.org/wiki/Traceroute

    Cisco's implementation of traceroute also uses a sequence of UDP datagrams, each with incrementing TTL values, to an invalid port number at the remote host; by default, UDP port 33434 is used. An extended version of this command (known as the extended traceroute command) can change the destination port number used by the UDP probe messages. [13]

  3. List of PBKDF2 implementations - Wikipedia

    en.wikipedia.org/wiki/List_of_PBKDF2_implementations

    PolarSSL's C implementation; CyaSSL's C implementation; ActionScript 3.0 implementation.NET Framework's implementation; Delphi/Free Pascal implementation; Erlang implementation; Go implementation; PBKDF2 for Haxe; JavaScript implementations slow, less slow, fast, benchmark; Java implementation (PBKDF2WithHmacSHA256) Python implementation ...

  4. MTR (software) - Wikipedia

    en.wikipedia.org/wiki/MTR_(software)

    My traceroute, originally named Matt's traceroute (MTR), is a computer program that combines the functions of the traceroute and ping programs in one network diagnostic tool. [ 2 ] MTR probes routers on the route path by limiting the number of hops individual packets may traverse, and listening to responses of their expiry.

  5. List of GNU Core Utilities commands - Wikipedia

    en.wikipedia.org/wiki/List_of_GNU_Core_Utilities...

    This is a list of commands from the GNU Core Utilities for Unix environments. These commands can be found on Unix operating systems and most Unix-like operating systems. GNU Core Utilities include basic file, shell and text manipulation utilities. Coreutils includes all of the basic command-line tools that are expected in a POSIX system.

  6. Layer four traceroute - Wikipedia

    en.wikipedia.org/wiki/Layer_four_traceroute

    Layer Four Traceroute (LFT) is a fast, multi-protocol traceroute engine, that also implements numerous other features including AS number lookups through regional Internet registries and other reliable sources, Loose Source Routing, firewall and load balancer detection, etc. LFT is best known for its use by network security practitioners to trace a route to a destination host through many ...

  7. List of PTP implementations - Wikipedia

    en.wikipedia.org/wiki/List_of_PTP_implementations

    The Linux PTP Project – an implementation of the Precision Time Protocol (PTP) according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel. [94]

  8. iproute2 - Wikipedia

    en.wikipedia.org/wiki/Iproute2

    Its development is closely tied to the development of networking components of the Linux kernel. As of December 2013 [update] , iproute2 is maintained by Stephen Hemminger and David Ahern. The original author, Alexey Kuznetsov, was responsible for the quality of service (QoS) implementation in the Linux kernel.

  9. LIO (SCSI target) - Wikipedia

    en.wikipedia.org/wiki/LIO_(SCSI_target)

    The Linux-IO Target (LIO) is an open-source Small Computer System Interface (SCSI) target implementation included with the Linux kernel. [ 1 ] [ better source needed ] Unlike initiators, which begin sessions, LIO functions as a target, presenting one or more Logical Unit Numbers (LUNs) to a SCSI initiator , receiving SCSI commands, and managing ...