If you want to write programs that can utilize DNS messages then you must understand the format. So where will you find all the queries and responses that DNS …
As the complexity of networks increases, with diverse systems and multiple infrastructure components such as varied routers and switches (all from different vendors and suppliers) – so managing these …
Any circuit level tunneling through a proxy server such as SOCKS or SSL, will allow most protocols to be passed through a standard proxy gateway. Whenever you see a …
Zone transfers are an important part of distributing changes between name servers. Every domain on the internet (and within private networks for that matter) much have a master server …
The TCP window size is basically the method employed by the receiving client/host to inform the sender, what the current buffer size should be for all the data within …
Any identity system which is automated needs some way of both creating and distributing authorization and authentication assertions. One of the most famous is of course Kerberos, which has …
Just like every other type of communication method that exists online, you can use encryption for securing XML documents. In fact it is recommended if possible that all important …
Conceptually IP routing is pretty straight forward, especially when you look at it from the hosts point of view. If the destination is directly connected such as a direct …
It’s quite simple to watch how TCP/IP manages the issue of port numbers, you simply need to watch a server. For example enable Telnet on a server and allow …
Technology is one of the most trending news today. When we hear about technology, we usually spend time to listen about it. We get intrigued when we hear about …