Fresh obfuscated Tor bridges are needed more than ever, since they are the only way for people to access Tor in some areas of the world (like China, Iran and Syria). But it is not the same as an exit node.
Read more »A call to arms for obfuscated bridges
Category: High End Tags:
- Login to post comments
Troubleshooting Network problems in Ubuntu
Internet connectivity is one of the important means of communication in todays life. So troubleshooting the problems in our own networks or reconfiguring it for the easiness is not to be praised as a "geekness". In my opinion you don't need to be a geek for setting an internet connection or recovering your machine from a network problem.
Read more »Category: End User Tags:
A complete reference to SSH tunnelling
In simple words tunneling is a method of bypassing firewall or proxy restrictions using some tunnelling protocols. It works by creating a "tunnel", or a communications channel that makes the firewall think that it is getting traffic from a web browser. Communications content is delivered through this tunnel to our gateway or your own personal gateway.
Read more »Category: End User Tags:
Copying Remote Files with scp
To use scp to transfer files, the SSH service (usually the sshd server daemon) must be running on the remote system. Here are some examples of useful scp commands:
Read more »Category: End User Tags:
- Login to post comments
Burning Man's open source cell phone system
The (in)famous desert festival experiments with DIY telephone networking. They use the AGPLv3 licensed OpenBTS GSM implementation.
Read more »Category: Community Tags:
- Login to post comments
Kernel Log: Coming in 2.6.35 (Part 3) - Network support
Several patches submitted by a Google developer will enable the kernel to push considerably more data through network cables on multi-core systems. Some of the LAN and Wi-Fi drivers also promise greater throughput, or to use less power, due to various driver enhancements
Read more »Category: High End Tags:
- Login to post comments
How To Monitor Network Traffic: Two Indispensable Commands
This how-to will teach you two commands, iftop and nethogs, that you can use to monitor network traffic on a Linux machine. You can use iftop to view traffic by individual connection, port, network segment, or remote host, which gives you a detailed accounting of all packets coming in and out of your machine.
Read more »Let's Deep-Six Facebook and Do Open Source Social Networking Instead
"An open and distributed model gives users and organizations a chance to choose their social networking platform without sacrificing their connections to friends, family, business partners and colleagues. Control of the data would be an obviously important decision factor for many people."
Read more »Category: Community Tags:
- Login to post comments
Kernel Log: Coming in 2.6.34 (Part 1) - Network Support
Expected for release in May, Linux kernel version 2.6.34 contains several new network drivers and various advancements designed to improve network performance or increase network configuration flexibility, which will particularly impact virtualisation
Read more »Category: High End Tags:
- Login to post comments
NetworkManager vs wicd vs wpa_gui
Here's a quick comparison between a few network control tools for Linux. These tools all give you some sort of network control from the Desktop - a service traditionally provided by daemons and initialization scripts.
Read more »Category: End User Tags:
- Login to post comments
Get SheevaPlug!
Eban Moglen suggests this ARM-based, GNU/Linux device as a networking solution to the troubled times now facing the Free Internet. Communicate with networking friends with greater security. See interview below.
Read more »- Login to post comments
Using Nmap to "Fix" a Problem
Fixing a Problem with Nmap Ever had an ipv4 network address that is supposed to migrate over via a high availability mechanism simply not work or even stranger if there were several addresses some do and some do not?
Read more »What’s the difference between a Hub, a Switch and a Router?
Hubs, switches, and routers are all devices that let you connect from one computers to other computers, networked devices, or to other networks.
Read more »Category: High End Tags:
- Login to post comments
The most insecure part of your network is...
Sure, It's Secure: "Your desktops' operating systems? Your servers' operating systems? Your firewall? Or..."
Read more »Category: High End Tags:
- Login to post comments
Linux-powered Packet Fence Protects Your Network
Packet Fence bundles many useful and powerful network protection tools into an attractive, integrated package. Such as network access control, monitoring, intrusion detection, VLAN isolation, DHCP fingerprinting, and captive portal. Eric Geier introduces us to this protective powerhouse.
Read more »Category: High End Tags:
- Login to post comments