Several processes control the flow of data through a Samba-managed network connection. Ironically, the most important of them has nothing to do with networking.
A brief, high-level introduction to Linux networking architecture. Explains how the Linux kernel manipulates network traffic using a top-down approach and basic framework to route
This is not common knowledge. Contrary to most literature, you can use SECMARK and CONNSECMARK without SELinux. This article explains what that means and
This article examines the relationship between OpenVPN and OpenSSL, why the former depends on the latter, and why it's important to remain cognizant of software version numbers
I wrote a separate article on versioning errors in Ubuntu (False Version Reporting in Ubuntu 16.04) and used
This article is Part 3 in a series of three (3) articles about how Virtual Private Networks (VPNs) work. While I get into some technical details, the intent is to scratch the surface just enough
This article is Part 2 in a series of articles about how Virtual Private Networks (VPNs) work. Part 1 of the series,
This article explains common network cryptographic concepts in plain-English.
WireGuard is the "new kid on the block" in the world of VPNs.
Protocol adoption in the VPN world is a very slow process. Yet a relatively recent upstart is garnering a lot of attention:
A newly discovered security vulnerability exists in most modern operating systems which allows a malicious actor to hijack an active TCP-based VPN connection, without the need to break its
IKEv2 is a security protocol that facilitates cryptographic symmetric key exchanges between endpoints.
Internet security relies upon a fixed set of principles and tools to make the exchange and storage of data as secure as possible. Which methods are "best" depends on one's priorities. What is