RFC 3552: Guidelines for Writing RFC Text on Security Considerationshttps://www.rfc-editor.org/rfc/rfc3552.html
to compromise the routing infrastructure to specifically arrange that traffic passes through a compromised machine. This might involve an active attack on the routing infrastructu
Differentiated Services on Linuxhttps://diffserv.sourceforge.net/
Linux 2.4 Advanced Routing & Traffic Control HOWTO ITTC IP QoS research tcng , a gradual revision of the traffic control infrastructure Diffserv in general: TF-TANT: Different
Blog @ tonsky.mehttps://tonsky.me/
Pedestal and routing 6/13 Grumpy chronicles: deps and uberdeps 6/3 ★ How NOT to hire a software engineer 3/11 ★ Redesigning Github repository page 2/28 2018 It is fast or it is wr
Linux parancsok, kezdőknekhttp://www.letix.hu/#rsync/
gjelenítése (Routing table) route add -net 192.168.10.0 netmask 255.255.255.0 eth0 # A 192.168.10.0-s hálózatra menő csomagokat az eth0-ra irányítja a rendszer # A hálót így már lá
Linux parancsok kezdőknek
Linux parancsok, kezdőknekhttp://letix.hu/
gjelenítése (Routing table) route add -net 192.168.10.0 netmask 255.255.255.0 eth0 # A 192.168.10.0-s hálózatra menő csomagokat az eth0-ra irányítja a rendszer # A hálót így már lá
Linux parancsok kezdőknek
COS 461, Spring 2006: Home Pagehttps://www.cs.princeton.edu/courses/archive/spring06/cos461/index.php
15: Shortest-Path Routing Lecture 16: Policy-Based Path-Vector Routing Week 9: 4/10 - 4/14 Reading: Sections 9.2.2 and 9.4.3, and handout about the Web Lecture 17: Adapting Routin
Find more...