#udp — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #udp, aggregated by home.social.
-
@jik In 1975, Prof. #Dijkstra warned of #complexitygenerators ; Also, the inventor of the #UDP User Datagram Protocol, David P. Reed, appears to share your opinion.
Source: Public discussion with him yesterday, on the somewhat socially corrupted professional networking site we all know and loathe. https://www.cs.utexas.edu/~EWD/transcriptions/EWD04xx/EWD480.html @wdtz -
@jik In 1975, Prof. #Dijkstra warned of #complexitygenerators ; Also, the inventor of the #UDP User Datagram Protocol, David P. Reed, appears to share your opinion.
Source: Public discussion with him yesterday, on the somewhat socially corrupted professional networking site we all know and loathe. https://www.cs.utexas.edu/~EWD/transcriptions/EWD04xx/EWD480.html @wdtz -
@jik In 1975, Prof. #Dijkstra warned of #complexitygenerators ; Also, the inventor of the #UDP User Datagram Protocol, David P. Reed, appears to share your opinion.
Source: Public discussion with him yesterday, on the somewhat socially corrupted professional networking site we all know and loathe. https://www.cs.utexas.edu/~EWD/transcriptions/EWD04xx/EWD480.html @wdtz -
@jik In 1975, Prof. #Dijkstra warned of #complexitygenerators ; Also, the inventor of the #UDP User Datagram Protocol, David P. Reed, appears to share your opinion.
Source: Public discussion with him yesterday, on the somewhat socially corrupted professional networking site we all know and loathe. https://www.cs.utexas.edu/~EWD/transcriptions/EWD04xx/EWD480.html @wdtz -
@jik In 1975, Prof. #Dijkstra warned of #complexitygenerators ; Also, the inventor of the #UDP User Datagram Protocol, David P. Reed, appears to share your opinion.
Source: Public discussion with him yesterday, on the somewhat socially corrupted professional networking site we all know and loathe. https://www.cs.utexas.edu/~EWD/transcriptions/EWD04xx/EWD480.html @wdtz -
Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers
Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.
Pulse ID: 6a0199674dd4cf450633dd32
Pulse Link: https://otx.alienvault.com/pulse/6a0199674dd4cf450633dd32
Pulse Author: AlienVault
Created: 2026-05-11 08:55:03Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault
-
Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers
Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.
Pulse ID: 6a0199674dd4cf450633dd32
Pulse Link: https://otx.alienvault.com/pulse/6a0199674dd4cf450633dd32
Pulse Author: AlienVault
Created: 2026-05-11 08:55:03Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault
-
Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers
Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.
Pulse ID: 6a0199674dd4cf450633dd32
Pulse Link: https://otx.alienvault.com/pulse/6a0199674dd4cf450633dd32
Pulse Author: AlienVault
Created: 2026-05-11 08:55:03Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault
-
Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers
Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.
Pulse ID: 6a0199674dd4cf450633dd32
Pulse Link: https://otx.alienvault.com/pulse/6a0199674dd4cf450633dd32
Pulse Author: AlienVault
Created: 2026-05-11 08:55:03Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault
-
Honeypot reveals botnet exploiting scriptText to launch DDoS attacks on game servers
Analysts observed attackers exploiting a Jenkins honeypot to deploy a new DDoS botnet targeting video game servers. Leveraging Jenkins scriptText abuse, the threat actors achieved remote code execution by sending malicious Groovy scripts to intentionally misconfigured instances with weak passwords. The multi-platform payload targets both Windows and Linux systems, deploying malware that evades detection through process renaming and daemonization. The botnet supports multiple attack vectors including UDP floods, TCP attacks, HTTP requests, and game-specific techniques targeting Valve Source Engine servers. Infrastructure hosted in Vietnam serves dual purposes for payload distribution and command-and-control communications. The campaign demonstrates continued opportunistic exploitation of internet-facing services, with gaming industry servers being primary targets for distributed denial-of-service attacks.
Pulse ID: 6a0199674dd4cf450633dd32
Pulse Link: https://otx.alienvault.com/pulse/6a0199674dd4cf450633dd32
Pulse Author: AlienVault
Created: 2026-05-11 08:55:03Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DDoS #DoS #HTTP #HoneyPot #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Password #Passwords #RAT #RCE #RemoteCodeExecution #TCP #UDP #Vietnam #Windows #Word #bot #botnet #AlienVault
-
DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure
A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.
Pulse ID: 69f735ac2403f4a4cb9ca4c3
Pulse Link: https://otx.alienvault.com/pulse/69f735ac2403f4a4cb9ca4c3
Pulse Author: cryptocti
Created: 2026-05-03 11:46:52Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti
-
DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure
A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.
Pulse ID: 69f735ac2403f4a4cb9ca4c3
Pulse Link: https://otx.alienvault.com/pulse/69f735ac2403f4a4cb9ca4c3
Pulse Author: cryptocti
Created: 2026-05-03 11:46:52Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti
-
DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure
A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.
Pulse ID: 69f735ac2403f4a4cb9ca4c3
Pulse Link: https://otx.alienvault.com/pulse/69f735ac2403f4a4cb9ca4c3
Pulse Author: cryptocti
Created: 2026-05-03 11:46:52Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti
-
DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure
A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.
Pulse ID: 69f735ac2403f4a4cb9ca4c3
Pulse Link: https://otx.alienvault.com/pulse/69f735ac2403f4a4cb9ca4c3
Pulse Author: cryptocti
Created: 2026-05-03 11:46:52Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti
-
DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure
A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.
Pulse ID: 69f735ac2403f4a4cb9ca4c3
Pulse Link: https://otx.alienvault.com/pulse/69f735ac2403f4a4cb9ca4c3
Pulse Author: cryptocti
Created: 2026-05-03 11:46:52Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti
-
UDP Network Monitoring with C++: A Comprehensive Guide
In this guide, I demonstrate how to build a UDP packet sniffer in C++ using raw sockets, parse packet headers, and extract key data like source/destination IPs and ports.
https://denizhalil.com/2025/07/14/udp-network-monitoring-cpp-packet-sniffer/#CyberSecurity #NetworkMonitoring #PacketSniffer #UDP #Cpp #NetworkSecurity #InfoSec #BlueTeam #RedTeam #InfoSec #securityengineering #denizhalil
-
UDP Network Monitoring with C++: A Comprehensive Guide
In this guide, I demonstrate how to build a UDP packet sniffer in C++ using raw sockets, parse packet headers, and extract key data like source/destination IPs and ports.
https://denizhalil.com/2025/07/14/udp-network-monitoring-cpp-packet-sniffer/#CyberSecurity #NetworkMonitoring #PacketSniffer #UDP #Cpp #NetworkSecurity #InfoSec #BlueTeam #RedTeam #InfoSec #securityengineering #denizhalil
-
UDP Network Monitoring with C++: A Comprehensive Guide
In this guide, I demonstrate how to build a UDP packet sniffer in C++ using raw sockets, parse packet headers, and extract key data like source/destination IPs and ports.
https://denizhalil.com/2025/07/14/udp-network-monitoring-cpp-packet-sniffer/#CyberSecurity #NetworkMonitoring #PacketSniffer #UDP #Cpp #NetworkSecurity #InfoSec #BlueTeam #RedTeam #InfoSec #securityengineering #denizhalil
-
Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign
Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.
Pulse ID: 69e2824d25c0dbc3e1de156b
Pulse Link: https://otx.alienvault.com/pulse/69e2824d25c0dbc3e1de156b
Pulse Author: AlienVault
Created: 2026-04-17 18:56:13Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault
-
Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign
Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.
Pulse ID: 69e2824d25c0dbc3e1de156b
Pulse Link: https://otx.alienvault.com/pulse/69e2824d25c0dbc3e1de156b
Pulse Author: AlienVault
Created: 2026-04-17 18:56:13Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault
-
Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign
Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.
Pulse ID: 69e2824d25c0dbc3e1de156b
Pulse Link: https://otx.alienvault.com/pulse/69e2824d25c0dbc3e1de156b
Pulse Author: AlienVault
Created: 2026-04-17 18:56:13Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault
-
Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign
Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.
Pulse ID: 69e2824d25c0dbc3e1de156b
Pulse Link: https://otx.alienvault.com/pulse/69e2824d25c0dbc3e1de156b
Pulse Author: AlienVault
Created: 2026-04-17 18:56:13Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault
-
Tracking Mirai Variant Nexcorium: A Vulnerability-Driven IoT Botnet Campaign
Nexcorium is a multi-architecture Mirai variant exploiting CVE-2024-3721 in TBK DVR devices to build a botnet for distributed denial-of-service attacks. The campaign, attributed to Nexus Team based on custom HTTP headers, uses OS command injection to deliver malware across ARM, MIPS, and x86-64 architectures. The malware implements multiple persistence mechanisms including init configuration, startup scripts, systemd services, and cron jobs. It features XOR-encoded configurations, self-integrity checks, and self-replication capabilities. Attack capabilities include UDP flood, TCP SYN flood, TCP ACK flood, and VSE query flood among others. The botnet spreads through brute-force attacks using default credentials and exploits CVE-2017-17215 targeting Huawei HG532 devices, demonstrating typical IoT-focused botnet characteristics.
Pulse ID: 69e2824d25c0dbc3e1de156b
Pulse Link: https://otx.alienvault.com/pulse/69e2824d25c0dbc3e1de156b
Pulse Author: AlienVault
Created: 2026-04-17 18:56:13Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #ELF #GRIT #HTTP #ICS #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #RCE #SMS #TCP #UDP #Vulnerability #bot #botnet #AlienVault
-
Ein zentrales Element von Smart Cities sind Urbane Datenplattformen (#UDP), die Daten in verschiedenen Formaten mit unterschiedlichem Inhalt sammeln, zusammenführen und verarbeiten.
Um die #Cybersicherheit Urbaner Datenplattformen zu erhöhen, hat das #BSI die Technische Richtlinie "TR-03187 - Sicherheitsanforderungen an Urbane Datenplattformen" veröffentlicht.
Nun lädt das BSI ein, die TR-03187 zu kommentieren und aktiv an ihrer Weiterentwicklung mitzuwirken:
https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03187/tr-03187.html #smartcity -
Ein zentrales Element von Smart Cities sind Urbane Datenplattformen (#UDP), die Daten in verschiedenen Formaten mit unterschiedlichem Inhalt sammeln, zusammenführen und verarbeiten.
Um die #Cybersicherheit Urbaner Datenplattformen zu erhöhen, hat das #BSI die Technische Richtlinie "TR-03187 - Sicherheitsanforderungen an Urbane Datenplattformen" veröffentlicht.
Nun lädt das BSI ein, die TR-03187 zu kommentieren und aktiv an ihrer Weiterentwicklung mitzuwirken:
https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03187/tr-03187.html #smartcity -
Ein zentrales Element von Smart Cities sind Urbane Datenplattformen (#UDP), die Daten in verschiedenen Formaten mit unterschiedlichem Inhalt sammeln, zusammenführen und verarbeiten.
Um die #Cybersicherheit Urbaner Datenplattformen zu erhöhen, hat das #BSI die Technische Richtlinie "TR-03187 - Sicherheitsanforderungen an Urbane Datenplattformen" veröffentlicht.
Nun lädt das BSI ein, die TR-03187 zu kommentieren und aktiv an ihrer Weiterentwicklung mitzuwirken:
https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03187/tr-03187.html #smartcity -
Ein zentrales Element von Smart Cities sind Urbane Datenplattformen (#UDP), die Daten in verschiedenen Formaten mit unterschiedlichem Inhalt sammeln, zusammenführen und verarbeiten.
Um die #Cybersicherheit Urbaner Datenplattformen zu erhöhen, hat das #BSI die Technische Richtlinie "TR-03187 - Sicherheitsanforderungen an Urbane Datenplattformen" veröffentlicht.
Nun lädt das BSI ein, die TR-03187 zu kommentieren und aktiv an ihrer Weiterentwicklung mitzuwirken:
https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03187/tr-03187.html #smartcity -
Ein zentrales Element von Smart Cities sind Urbane Datenplattformen (#UDP), die Daten in verschiedenen Formaten mit unterschiedlichem Inhalt sammeln, zusammenführen und verarbeiten.
Um die #Cybersicherheit Urbaner Datenplattformen zu erhöhen, hat das #BSI die Technische Richtlinie "TR-03187 - Sicherheitsanforderungen an Urbane Datenplattformen" veröffentlicht.
Nun lädt das BSI ein, die TR-03187 zu kommentieren und aktiv an ihrer Weiterentwicklung mitzuwirken:
https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03187/tr-03187.html #smartcity -
The #syslog_ng April newsletter is now available on-line:
- #Automatic configuration of the syslog-ng wildcard-file() source
- What to fix next in syslog-ng?
- #UDP #reliability improved in syslog-ng #Debian packaging
Read more at: https://www.syslog-ng.com/community/b/blog/posts/the-syslog-ng-insider-2026-04-wildcard-file-fix-udp
-
The #syslog_ng April newsletter is now available on-line:
- #Automatic configuration of the syslog-ng wildcard-file() source
- What to fix next in syslog-ng?
- #UDP #reliability improved in syslog-ng #Debian packaging
Read more at: https://www.syslog-ng.com/community/b/blog/posts/the-syslog-ng-insider-2026-04-wildcard-file-fix-udp
-
The #syslog_ng April newsletter is now available on-line:
- #Automatic configuration of the syslog-ng wildcard-file() source
- What to fix next in syslog-ng?
- #UDP #reliability improved in syslog-ng #Debian packaging
Read more at: https://www.syslog-ng.com/community/b/blog/posts/the-syslog-ng-insider-2026-04-wildcard-file-fix-udp
-
The #syslog_ng April newsletter is now available on-line:
- #Automatic configuration of the syslog-ng wildcard-file() source
- What to fix next in syslog-ng?
- #UDP #reliability improved in syslog-ng #Debian packaging
Read more at: https://www.syslog-ng.com/community/b/blog/posts/the-syslog-ng-insider-2026-04-wildcard-file-fix-udp
-
The #syslog_ng April newsletter is now available on-line:
- #Automatic configuration of the syslog-ng wildcard-file() source
- What to fix next in syslog-ng?
- #UDP #reliability improved in syslog-ng #Debian packaging
Read more at: https://www.syslog-ng.com/community/b/blog/posts/the-syslog-ng-insider-2026-04-wildcard-file-fix-udp
-
Reverse-Engineering The Holy Stone H120D Drone
-
Reverse-Engineering The Holy Stone H120D Drone
-
Go, TUN и UDP: пишем сетевой relay с гибкой конфигурацией
Продолжаю пилить на Go утилиту для работы с TUN-интерфейсами. В предыдущей версии пакеты проходили путь system <-> tun10 <-> go app <-> tun11 <-> inet . Основная цель тогда была одна — разобраться с TUN-интерфейсами и сетевыми настройками. В текущей версии я добавил простейший udp relay , вынес сложность в конфиг и в целом переработал проект .
-
Go, TUN и UDP: пишем сетевой relay с гибкой конфигурацией
Продолжаю пилить на Go утилиту для работы с TUN-интерфейсами. В предыдущей версии пакеты проходили путь system <-> tun10 <-> go app <-> tun11 <-> inet . Основная цель тогда была одна — разобраться с TUN-интерфейсами и сетевыми настройками. В текущей версии я добавил простейший udp relay , вынес сложность в конфиг и в целом переработал проект .
-
Go, TUN и UDP: пишем сетевой relay с гибкой конфигурацией
Продолжаю пилить на Go утилиту для работы с TUN-интерфейсами. В предыдущей версии пакеты проходили путь system <-> tun10 <-> go app <-> tun11 <-> inet . Основная цель тогда была одна — разобраться с TUN-интерфейсами и сетевыми настройками. В текущей версии я добавил простейший udp relay , вынес сложность в конфиг и в целом переработал проект .
-
Go, TUN и UDP: пишем сетевой relay с гибкой конфигурацией
Продолжаю пилить на Go утилиту для работы с TUN-интерфейсами. В предыдущей версии пакеты проходили путь system <-> tun10 <-> go app <-> tun11 <-> inet . Основная цель тогда была одна — разобраться с TUN-интерфейсами и сетевыми настройками. В текущей версии я добавил простейший udp relay , вынес сложность в конфиг и в целом переработал проект .
-
📉 Oh, sweet mother of packet-sniffing, another "UDP Story" where the protagonist heroically descends into the #OSI #model like it's some kind of #networking Dante's Inferno. 🤯 Spoiler alert: it's just a lot of #soldering and TCPdumping—because what could be more thrilling than that? 🙄
https://www.mattkeeter.com/blog/2022-08-11-udp/ #UDP #Story #packet #sniffing #TCPdump #HackerNews #ngated -
📉 Oh, sweet mother of packet-sniffing, another "UDP Story" where the protagonist heroically descends into the #OSI #model like it's some kind of #networking Dante's Inferno. 🤯 Spoiler alert: it's just a lot of #soldering and TCPdumping—because what could be more thrilling than that? 🙄
https://www.mattkeeter.com/blog/2022-08-11-udp/ #UDP #Story #packet #sniffing #TCPdump #HackerNews #ngated -
📉 Oh, sweet mother of packet-sniffing, another "UDP Story" where the protagonist heroically descends into the #OSI #model like it's some kind of #networking Dante's Inferno. 🤯 Spoiler alert: it's just a lot of #soldering and TCPdumping—because what could be more thrilling than that? 🙄
https://www.mattkeeter.com/blog/2022-08-11-udp/ #UDP #Story #packet #sniffing #TCPdump #HackerNews #ngated -
📉 Oh, sweet mother of packet-sniffing, another "UDP Story" where the protagonist heroically descends into the #OSI #model like it's some kind of #networking Dante's Inferno. 🤯 Spoiler alert: it's just a lot of #soldering and TCPdumping—because what could be more thrilling than that? 🙄
https://www.mattkeeter.com/blog/2022-08-11-udp/ #UDP #Story #packet #sniffing #TCPdump #HackerNews #ngated -
📉 Oh, sweet mother of packet-sniffing, another "UDP Story" where the protagonist heroically descends into the #OSI #model like it's some kind of #networking Dante's Inferno. 🤯 Spoiler alert: it's just a lot of #soldering and TCPdumping—because what could be more thrilling than that? 🙄
https://www.mattkeeter.com/blog/2022-08-11-udp/ #UDP #Story #packet #sniffing #TCPdump #HackerNews #ngated