Dear colleagues,
Currently we are looking for a magic tool with which it is possible to
generate specific (realistic) traffic patterns between client and server
to analyze (monitor) traffic characteristics (jitter, delay, inter
arrival times, etc.).
It would be good if that wanted tool is not onl
(KIT)
Institute of Telematics
Matthias Flittner, M.Sc.
Kaiserstr. 12
Building 20.20; Room 365
76131 Karlsruhe, Germany
Phone: +49 721 608-46416
Fax: +49 721 608-46789
Mobile: +49 176 21940967
Email: matthias.flitt...@kit.edu
Web: http://www.kit.edu/
KIT – University of the State of Baden
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello Major,
You could do this easly with http://www.snort.org/ .
regards,
matthias
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQEcBAEBAgAGBQJL0Zg7AAoJEIZn8Rym6s4AzdI
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi there,
I'm not sure if anyone out there has an answer to this insane question:
But is it possible to use my laptop only has power supply via usb for my
mobile phone. Yes you heard right: I don't want to boot an operating
system I only want to charge
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Folks,
I'm searching an fundamental book about how to (inter)connect two
networks. It should be about how to connect your business network in a
secure and reliable way to the internet. The book should contain some
theoretical basics and common used
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hey Jens,
thanks for your fast answer.
> "The Illustrated Network: How TCP/IP Works in a Modern Network"
> (ISBN-13: 978-0123745415) should cover this topic.
Yes this book covers a lot but I need one which should help me to build
an secure transfer poi
Hi folks,
Can someone from amazon dot de or dot com onlineshop
contact me off-list regarding some abuse or rather anomolies with my
account?
Thanks a lot.
I would be appreciate if someone could assist me.
best regards,
-FliTTi
signature.asc
Description: OpenPGP digital signature
Hi,
> Since recently we noticed "Neighbour table overflow" warnings from
> the kernel on a lot of Linux machines. As this was very annoying for
> us and our customers I started to dump traffic and tried to find the
> cause.
sounds for me as an typicall IPv6 DoS attack. (see RFC3756)
Sheng Jiang h
> However this scan was from a external host. The only traffic I saw on
> the subnet was normal/valid NA lookups from the router towards an
> increasing IPv6-address (starting with ::1, then ::2 etc). On the
> router side I clearly saw the icmp traffic from the source doing a
> scan on these destin
9 matches
Mail list logo