home.social

#udp — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #udp, aggregated by home.social.

  1. @jik In 1975, Prof. #Dijkstra warned of #complexitygenerators ; Also, the inventor of the #UDP User Datagram Protocol, David P. Reed, appears to share your opinion.
    Source: Public discussion with him yesterday, on the somewhat socially corrupted professional networking site we all know and loathe. cs.utexas.edu/~EWD/transcripti @wdtz

  2. @jik In 1975, Prof. #Dijkstra warned of #complexitygenerators ; Also, the inventor of the #UDP User Datagram Protocol, David P. Reed, appears to share your opinion.
    Source: Public discussion with him yesterday, on the somewhat socially corrupted professional networking site we all know and loathe. cs.utexas.edu/~EWD/transcripti @wdtz

  3. @jik In 1975, Prof. #Dijkstra warned of #complexitygenerators ; Also, the inventor of the #UDP User Datagram Protocol, David P. Reed, appears to share your opinion.
    Source: Public discussion with him yesterday, on the somewhat socially corrupted professional networking site we all know and loathe. cs.utexas.edu/~EWD/transcripti @wdtz

  4. @jik In 1975, Prof. #Dijkstra warned of #complexitygenerators ; Also, the inventor of the #UDP User Datagram Protocol, David P. Reed, appears to share your opinion.
    Source: Public discussion with him yesterday, on the somewhat socially corrupted professional networking site we all know and loathe. cs.utexas.edu/~EWD/transcripti @wdtz

  5. @jik In 1975, Prof. #Dijkstra warned of #complexitygenerators ; Also, the inventor of the #UDP User Datagram Protocol, David P. Reed, appears to share your opinion.
    Source: Public discussion with him yesterday, on the somewhat socially corrupted professional networking site we all know and loathe. cs.utexas.edu/~EWD/transcripti @wdtz

  6. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.

    Pulse ID: 6a0199674dd4cf450633dd32
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:55:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault

  7. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.

    Pulse ID: 6a0199674dd4cf450633dd32
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:55:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault

  8. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.

    Pulse ID: 6a0199674dd4cf450633dd32
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:55:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault

  9. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.

    Pulse ID: 6a0199674dd4cf450633dd32
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:55:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault

  10. Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers

    Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.

    Pulse ID: 6a0199674dd4cf450633dd32
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:55:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault

  11. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  12. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  13. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  14. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  15. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  16. UDP Network Monitoring with C++: A Comprehensive Guide

    In this guide, I demonstrate how to build a UDP packet sniffer in C++ using raw sockets, parse packet headers, and extract key data like source/destination IPs and ports.
    denizhalil.com/2025/07/14/udp-

    #CyberSecurity #NetworkMonitoring #PacketSniffer #UDP #Cpp #NetworkSecurity #InfoSec #BlueTeam #RedTeam #InfoSec #securityengineering #denizhalil

  17. UDP Network Monitoring with C++: A Comprehensive Guide

    In this guide, I demonstrate how to build a UDP packet sniffer in C++ using raw sockets, parse packet headers, and extract key data like source/destination IPs and ports.
    denizhalil.com/2025/07/14/udp-

    #CyberSecurity #NetworkMonitoring #PacketSniffer #UDP #Cpp #NetworkSecurity #InfoSec #BlueTeam #RedTeam #InfoSec #securityengineering #denizhalil

  18. UDP Network Monitoring with C++: A Comprehensive Guide

    In this guide, I demonstrate how to build a UDP packet sniffer in C++ using raw sockets, parse packet headers, and extract key data like source/destination IPs and ports.
    denizhalil.com/2025/07/14/udp-

    #CyberSecurity #NetworkMonitoring #PacketSniffer #UDP #Cpp #NetworkSecurity #InfoSec #BlueTeam #RedTeam #InfoSec #securityengineering #denizhalil

  19. Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign

    Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.

    Pulse ID: 69e2824d25c0dbc3e1de156b
    Pulse Link: otx.alienvault.com/pulse/69e28
    Pulse Author: AlienVault
    Created: 2026-04-17 18:56:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault

  20. Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign

    Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.

    Pulse ID: 69e2824d25c0dbc3e1de156b
    Pulse Link: otx.alienvault.com/pulse/69e28
    Pulse Author: AlienVault
    Created: 2026-04-17 18:56:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault

  21. Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign

    Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.

    Pulse ID: 69e2824d25c0dbc3e1de156b
    Pulse Link: otx.alienvault.com/pulse/69e28
    Pulse Author: AlienVault
    Created: 2026-04-17 18:56:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault

  22. Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign

    Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.

    Pulse ID: 69e2824d25c0dbc3e1de156b
    Pulse Link: otx.alienvault.com/pulse/69e28
    Pulse Author: AlienVault
    Created: 2026-04-17 18:56:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault

  23. Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign

    Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.

    Pulse ID: 69e2824d25c0dbc3e1de156b
    Pulse Link: otx.alienvault.com/pulse/69e28
    Pulse Author: AlienVault
    Created: 2026-04-17 18:56:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault

  24. Ein zentrales Element von Smart Cities sind Urbane Datenplattformen (#UDP), die Daten in verschiedenen Formaten mit unterschiedlichem Inhalt sammeln, zusammenführen und verarbeiten.

    Um die #Cybersicherheit Urbaner Datenplattformen zu erhöhen, hat das #BSI die Technische Richtlinie "TR-03187 - Sicherheitsanforderungen an Urbane Datenplattformen" veröffentlicht.

    Nun lädt das BSI ein, die TR-03187 zu kommentieren und aktiv an ihrer Weiterentwicklung mitzuwirken:
    bsi.bund.de/DE/Themen/Unterneh #smartcity

  25. Ein zentrales Element von Smart Cities sind Urbane Datenplattformen (#UDP), die Daten in verschiedenen Formaten mit unterschiedlichem Inhalt sammeln, zusammenführen und verarbeiten.

    Um die #Cybersicherheit Urbaner Datenplattformen zu erhöhen, hat das #BSI die Technische Richtlinie "TR-03187 - Sicherheitsanforderungen an Urbane Datenplattformen" veröffentlicht.

    Nun lädt das BSI ein, die TR-03187 zu kommentieren und aktiv an ihrer Weiterentwicklung mitzuwirken:
    bsi.bund.de/DE/Themen/Unterneh #smartcity

  26. Ein zentrales Element von Smart Cities sind Urbane Datenplattformen (#UDP), die Daten in verschiedenen Formaten mit unterschiedlichem Inhalt sammeln, zusammenführen und verarbeiten.

    Um die #Cybersicherheit Urbaner Datenplattformen zu erhöhen, hat das #BSI die Technische Richtlinie "TR-03187 - Sicherheitsanforderungen an Urbane Datenplattformen" veröffentlicht.

    Nun lädt das BSI ein, die TR-03187 zu kommentieren und aktiv an ihrer Weiterentwicklung mitzuwirken:
    bsi.bund.de/DE/Themen/Unterneh #smartcity

  27. Ein zentrales Element von Smart Cities sind Urbane Datenplattformen (#UDP), die Daten in verschiedenen Formaten mit unterschiedlichem Inhalt sammeln, zusammenführen und verarbeiten.

    Um die #Cybersicherheit Urbaner Datenplattformen zu erhöhen, hat das #BSI die Technische Richtlinie "TR-03187 - Sicherheitsanforderungen an Urbane Datenplattformen" veröffentlicht.

    Nun lädt das BSI ein, die TR-03187 zu kommentieren und aktiv an ihrer Weiterentwicklung mitzuwirken:
    bsi.bund.de/DE/Themen/Unterneh #smartcity

  28. Ein zentrales Element von Smart Cities sind Urbane Datenplattformen (#UDP), die Daten in verschiedenen Formaten mit unterschiedlichem Inhalt sammeln, zusammenführen und verarbeiten.

    Um die #Cybersicherheit Urbaner Datenplattformen zu erhöhen, hat das #BSI die Technische Richtlinie "TR-03187 - Sicherheitsanforderungen an Urbane Datenplattformen" veröffentlicht.

    Nun lädt das BSI ein, die TR-03187 zu kommentieren und aktiv an ihrer Weiterentwicklung mitzuwirken:
    bsi.bund.de/DE/Themen/Unterneh #smartcity

  29. The #syslog_ng April newsletter is now available on-line:

    - #Automatic configuration of the syslog-ng wildcard-file() source

    - What to fix next in syslog-ng?

    - #UDP #reliability improved in syslog-ng #Debian packaging

    Read more at: syslog-ng.com/community/b/blog

  30. The April newsletter is now available on-line:

    - configuration of the syslog-ng wildcard-file() source

    - What to fix next in syslog-ng?

    - improved in syslog-ng packaging

    Read more at: syslog-ng.com/community/b/blog

  31. The #syslog_ng April newsletter is now available on-line:

    - #Automatic configuration of the syslog-ng wildcard-file() source

    - What to fix next in syslog-ng?

    - #UDP #reliability improved in syslog-ng #Debian packaging

    Read more at: syslog-ng.com/community/b/blog

  32. The #syslog_ng April newsletter is now available on-line:

    - #Automatic configuration of the syslog-ng wildcard-file() source

    - What to fix next in syslog-ng?

    - #UDP #reliability improved in syslog-ng #Debian packaging

    Read more at: syslog-ng.com/community/b/blog

  33. The #syslog_ng April newsletter is now available on-line:

    - #Automatic configuration of the syslog-ng wildcard-file() source

    - What to fix next in syslog-ng?

    - #UDP #reliability improved in syslog-ng #Debian packaging

    Read more at: syslog-ng.com/community/b/blog

  34. Go, TUN и UDP: пишем сетевой relay с гибкой конфигурацией

    Продолжаю пилить на Go утилиту для работы с TUN-интерфейсами. В предыдущей версии пакеты проходили путь system <-> tun10 <-> go app <-> tun11 <-> inet . Основная цель тогда была одна — разобраться с TUN-интерфейсами и сетевыми настройками. В текущей версии я добавил простейший udp relay , вынес сложность в конфиг и в целом переработал проект .

    habr.com/ru/articles/1016296/

    #golang #go #udp #ip #linux #macos

  35. Go, TUN и UDP: пишем сетевой relay с гибкой конфигурацией

    Продолжаю пилить на Go утилиту для работы с TUN-интерфейсами. В предыдущей версии пакеты проходили путь system <-> tun10 <-> go app <-> tun11 <-> inet . Основная цель тогда была одна — разобраться с TUN-интерфейсами и сетевыми настройками. В текущей версии я добавил простейший udp relay , вынес сложность в конфиг и в целом переработал проект .

    habr.com/ru/articles/1016296/

    #golang #go #udp #ip #linux #macos

  36. Go, TUN и UDP: пишем сетевой relay с гибкой конфигурацией

    Продолжаю пилить на Go утилиту для работы с TUN-интерфейсами. В предыдущей версии пакеты проходили путь system <-> tun10 <-> go app <-> tun11 <-> inet . Основная цель тогда была одна — разобраться с TUN-интерфейсами и сетевыми настройками. В текущей версии я добавил простейший udp relay , вынес сложность в конфиг и в целом переработал проект .

    habr.com/ru/articles/1016296/

    #golang #go #udp #ip #linux #macos

  37. Go, TUN и UDP: пишем сетевой relay с гибкой конфигурацией

    Продолжаю пилить на Go утилиту для работы с TUN-интерфейсами. В предыдущей версии пакеты проходили путь system <-> tun10 <-> go app <-> tun11 <-> inet . Основная цель тогда была одна — разобраться с TUN-интерфейсами и сетевыми настройками. В текущей версии я добавил простейший udp relay , вынес сложность в конфиг и в целом переработал проект .

    habr.com/ru/articles/1016296/

    #golang #go #udp #ip #linux #macos

  38. 📉 Oh, sweet mother of packet-sniffing, another "UDP Story" where the protagonist heroically descends into the #OSI #model like it's some kind of #networking Dante's Inferno. 🤯 Spoiler alert: it's just a lot of #soldering and TCPdumping—because what could be more thrilling than that? 🙄
    mattkeeter.com/blog/2022-08-11 #UDP #Story #packet #sniffing #TCPdump #HackerNews #ngated

  39. 📉 Oh, sweet mother of packet-sniffing, another "UDP Story" where the protagonist heroically descends into the #OSI #model like it's some kind of #networking Dante's Inferno. 🤯 Spoiler alert: it's just a lot of #soldering and TCPdumping—because what could be more thrilling than that? 🙄
    mattkeeter.com/blog/2022-08-11 #UDP #Story #packet #sniffing #TCPdump #HackerNews #ngated

  40. 📉 Oh, sweet mother of packet-sniffing, another "UDP Story" where the protagonist heroically descends into the #OSI #model like it's some kind of #networking Dante's Inferno. 🤯 Spoiler alert: it's just a lot of #soldering and TCPdumping—because what could be more thrilling than that? 🙄
    mattkeeter.com/blog/2022-08-11 #UDP #Story #packet #sniffing #TCPdump #HackerNews #ngated

  41. 📉 Oh, sweet mother of packet-sniffing, another "UDP Story" where the protagonist heroically descends into the #OSI #model like it's some kind of #networking Dante's Inferno. 🤯 Spoiler alert: it's just a lot of #soldering and TCPdumping—because what could be more thrilling than that? 🙄
    mattkeeter.com/blog/2022-08-11 #UDP #Story #packet #sniffing #TCPdump #HackerNews #ngated

  42. 📉 Oh, sweet mother of packet-sniffing, another "UDP Story" where the protagonist heroically descends into the #OSI #model like it's some kind of #networking Dante's Inferno. 🤯 Spoiler alert: it's just a lot of #soldering and TCPdumping—because what could be more thrilling than that? 🙄
    mattkeeter.com/blog/2022-08-11 #UDP #Story #packet #sniffing #TCPdump #HackerNews #ngated