Category: Network

shape
shape
shape
shape
shape
shape
shape
shape
Standard

Examples of SNAT, DNAT with IPTABLES

There are several NAT variations that can be configured with IPTABLES. This article aims to show some examples of SNAT, DNAT with iptables. Mask all outgoing packets as IP WLAN0 iptables -t nat -A PREROUTING -s 192.168.1.2 -i eth0 -j MASQUERADE All packets leaving eth0 will have the IP address src eth0 iptables -t nat

Standard

What is a QOTD reflection DDoS attack?

In the ever-evolving cyber world, it is crucial to be aware of the different types of attacks that can negatively affect online security. One such attack is the QOTD Reflection DDoS, a sneaky threat that can wreak havoc on systems and networks. In this post, we’ll explore what this type of attack is and how

Standard

IPv6 Applications: Preparing the Internet for the Future

The constant evolution of technology and the exponential growth of the Internet have brought to light the need for a more robust and scalable addressing system to accommodate billions of connected devices around the world. In this context, IPv6 (Internet Protocol version 6) stood out as the next generation of the IP protocol, bringing a

Standard

The dangers of NetBIOS on a public network

NetBIOS (Network Basic Input/Output System) is a widely used network protocol for sharing resources and services on Windows systems. However, when exposed publicly, it can pose serious cyber security risks. Let’s explore the dangers associated with public NetBIOS and discuss how to avoid them. Dangers: How to avoid these dangers: In short, NetBIOS can be

Latest news

Latest news directly from our blog.