Proxies

Proxy servers work in the middle of the traffic scene. You may have been exposed to the forwarding side of proxies; for example, your browser at work may have been pointed to a proxy server to enable access to an outside resource such as a website. There are multiple reasons to implement such a solution. … Read more

Delivering the internet to Africa

More than half the population of Africa cannot access the internet, but this is changing thanks to mobile networks and ambitious new engineering projects. In fact, Africa recorded the highest growth in internet use globally between 2005 and 2018, proving that it’s possible to close the digital divide. “The working-age population in Africa is expected … Read more

The Internet Society Foundation Announces New Research Grants Exploring Future of the Internet

The Internet Society Foundation today announced a new grant programme supporting research on the future and sustainability of the Internet. Open to independent researchers and research institutions around the world, grants of up to US$200,000 will be awarded for research lasting up to two years and focused on: Greening the Internet and/or The Internet Economy. Future thematic … Read more

Evolution or revolution? The all-ethernet in-vehicle network

Current in-vehicle Electrical and Electronic network architectures are complex, costly, and totally inadequate to address the needs of tomorrow. The question is not if they will change but when and how? EE architectures need to be more intelligent, flexible and connected; in-vehicle and vehicle-to-vehicle, vehicle-to-infrastructure, vehicle-to-cloud (often referred as V2X). Networking across all industries, whether … Read more

Finding and Exploiting Path Traversal Vulnerabilities

Path traversal vulnerabilities are often subtle and hard to detect, and it may be necessary to prioritize your efforts on locations within the application that are most likely to manifest the vulnerability. Locating Targets for Attack During your initial mapping of the application, you should already have identified any obvious areas of attack surface in … Read more

Securing Authentication

Implementing a secure authentication solution involves attempting to simultaneously meet several key security objectives, and in many cases trade off against other objectives such as functionality, usability, and total cost. In some cases “more” security can actually be counterproductive — for example, forcing users to set very long passwords and change them frequently will often … Read more

The Evolution of Web Applications

In the early days of the Internet, the World Wide Web consisted only of web sites. These were essentially information repositories containing static documents, and web browsers were invented as a means of retrieving and displaying those documents, as shown in Figure. The flow of interesting information was one-way, from server to browser. Most sites … Read more

What is the Internet?

we use the public Internet, a specific computer network (and one which probably most readers have used), as our principle vehicle for discussing computer networking protocols. But what is the Internet? We would like to give you a one-sentence definition of the Internet, a definition that you can take home and share with your family … Read more

The History of the Internet

Before there was the public internet there was the internet’s forerunner ARPAnet or Advanced Research Projects Agency Networks. ARPAnet was funded by the United States military after the cold war with the aim of having a military command and control center that could withstand a nuclear attack. The point was to distribute information between geographically … Read more

PENETRATION TESTING

INTRODUCTION AND METHODOLOGY Penetration testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access. If the focus is on computer resources, then examples of a successful penetration would be obtaining or subverting confidential documents, pricelists, databases and other protected information. Near flawless penetration … Read more