Latest Posts

Introduction to DNS (Domain Name System)


The Domain Name System or DNS as it’s more commonly known is a huge distributed database that is used primarily by TCP/IP based applications to resolve host names and IP addresses.   The database is also used to provide routing information for electronic mail delivery applications such as sendmail.  The reason it is described as…

Read More

Client/Server Technology: NFS (Network File System)NFS


There are many client/server network models however one of the most popular is called NFS. The service was originally designed to provide transparent file sharing in network environments. It was originally designed as a commercial project by a team working for Sun Microsystems in the 1980s but was eventually released as an open internet protocol….

Read More

Protocols: LDAP (Lightweight Directory Access Protocol)


LDAP was initially developed by  the IETF (Internet Engineering Task Force) and is a directory services application which has become something of a ‘standard’ in the technical community of the internet.   A directory service is basically something which provides the ability to look up people, places or services on a network.   They can…

Read More

Protocols : NetBios/NetBEUI


The NetBIOS (Network Basic Input Output System) and NetBEUI (NetBIOS extended User Interface) protocols have been used for many years now.  They were jointly designed by Microsoft and IBM to enable network communication in smaller and medium sized networks.  Although used in several networking environments their most commonly found in Microsoft Windows environments although in…

Read More

What are Internet Addresses?


Absolutely every single interface or device in the internet must have a unique internet address.  These are probably more commonly known as an IP address.    The addresses consist of 32 bit numbers, these are arranged in specific structures and are not ordinary flat addresses that we are more used to. There are five different…

Read More

Protocol Verification for Proxies


It’s not always essential for a proxy to understand what protocol is being tunneled for it to function correctly.  For example circuit level tunnelling such as SSL (or SOCKS) enables any protocol to be transported through a configured proxy gateway.  The reason is that the proxy doesn’t need to understand the protocol simply because it…

Read More

Increase in DNS Based DDoS Attacks


Over the last few years, the Internet of Things (IoT) has expanded into all areas of our lives.A recent report predicted that there are over 8 billion devices potentially connected this year, whcih would grow to over 20 billion by 2020. Although the IoT will bring us many benefits there is also the potential for…

Read More

ISGMLUG Newsletter


SGML and XML are both languages that are used for defining markup languages. More specifically, they are metalanguage formalisms that facilitate the definition of descriptive markup languages for the purpose of electronic information encoding and interchange. SGML and XML support the definition of markup languages that are hardware- and software-independent, as well as application-processing neutral….

Read More

The New Technology Which Could Help Internet Speeds


What do you look for in a new property – big gardens, ample parking, close to amenities or simply a nice well built house. Well I saw a house last month in my home town and I very much wanted to move there.  Sure it wasn’t the nicest place and it was quite a bit…

Read More

IP Routing Functions


There is no doubt that one of the most important functions of the Internet protocol (IP) is that of routing.   The datagrams that are routed by IP can be generated either on the local host or another remote device.  If they are generated from a remote host, then in order to process the datagram it…

Read More

← OLDER POSTS