Sciweavers

LISA
2001
14 years 27 days ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
LISA
2001
14 years 27 days ago
TemplateTree II: The Post-Installation Setup Tool
After installing an OS distribution, a computer is generally not yet properly adapted to go into production at the local site. Security policies must be implemented, local service...
Tobias Oetiker
LISA
2001
14 years 27 days ago
The CoralReef Software Suite as a Tool for System and Network Administrators
Until now, system administrators have lacked a flexible real-time network traffic flow monitoring package. Such a package must provide a wide range of services but remain flexible ...
David Moore, Ken Keys, Ryan Koga, Edouard Lagache,...
LISA
2001
14 years 27 days ago
Gossips: System and Service Monitor
Gossips is a modular client/server based system monitor. It uses distributed monitoring tasks to define and report states of an IT-environment. A monitoring task includes probes t...
Victor Götsch, Albert Wuersch, Tobias Oetiker
LISA
2001
14 years 27 days ago
Macroscopic Internet Topology and Performance Measurements from the DNS Root Name Servers
We describe active measurements of topology and end-to-end latency characteristics between several of the DNS root servers and a subset of their clients using the skitter tool dev...
Marina Fomenkov, Kimberly C. Claffy, Bradley Huffa...
LISA
2001
14 years 27 days ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett