SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
After installing an OS distribution, a computer is generally not yet properly adapted to go into production at the local site. Security policies must be implemented, local service...
Until now, system administrators have lacked a flexible real-time network traffic flow monitoring package. Such a package must provide a wide range of services but remain flexible ...
David Moore, Ken Keys, Ryan Koga, Edouard Lagache,...
Gossips is a modular client/server based system monitor. It uses distributed monitoring tasks to define and report states of an IT-environment. A monitoring task includes probes t...
We describe active measurements of topology and end-to-end latency characteristics between several of the DNS root servers and a subset of their clients using the skitter tool dev...
Marina Fomenkov, Kimberly C. Claffy, Bradley Huffa...
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...