Telecom and Networking

What ISPs Can See

What ISPs Can See: Clarifying the technical landscape of the broadband privacy debate https://www.teamupturn.com/reports/2016/what-isps-can-see Truly pervasive encryption on the Internet is still a long way off. The fraction of total Internet traffic that’s encrypted is a poor proxy for the privacy interests of a typical user. Even with HTTPS, ISPs can still see the domains

The RIPE Atlas project

What’s like running water, only delivered directly to your hands? It’s the internet on your smartphone! This interconnection can seem magical, universal, global and instant. But it does so only until the moment something goes wrong. This free dingus can make the Internet faster, help you sort out your network and save remote communities article tells The

Microsoft has released a Debian Linux switch OS. Repeat, a Debian Linux switch operating system • The Register

Microsoft has today released the source code to an open-source operating system, based on Debian GNU/Linux, that runs on network switches. The software is dubbed SONiC, aka Software for Open Networking in the Cloud. It’s a toolkit of code and kernel patches to bend switch hardware to your will. http://www.theregister.co.uk/2016/03/09/microsoft_sonic_debian/ Posted from WordPress for Android

5G Coming Sooner, Not Later – IEEE Spectrum

Things are moving at blistering speed in the world of next-generation 5G mobile communications—even though many mobile users have still or only recently upgraded to 4G LTE communications, and even while 4G continues to evolve. Nevertheless, four of the telecom industry’s big hitters—Japan’s NTT Docomo, South Korea’s KT and SK Telecom, and Verizon in the

Finnish startup Zyptonite brings privacy to video calls

“Zyptonite is the first real-time communications app that connects parties directly,” says Antti Uusiheimala, Co-Founder and CEO of Zyptonite. “People need a simple, reliable and free video call and messenger service that works on different devices and operating systems without problems.” The startup cut out the server and built its service on peer-to-peer (P2P) technology,

How Do I Drop or Block Attackers IP Address With Null Routes On a Linux?

Someone might attack your Linux based system. You can drop attacker IP using IPtables. However, you can use the route or ip command to null route unwanted traffic. A null route (also called as blackhole route) is a network route or kernel routing table entry that goes nowhere. http://www.cyberciti.biz/tips/how-do-i-drop-or-block-attackers-ip-with-null-routes.html Posted from WordPress for Android