Can exponential back-off be abused to "knock off" a station off a network?

In my Cryptography & Network Security course, my professor mentioned that you can "knock off" a station of a network by abusing the timings of the exponential off algorithm used in CSMA/CD and CSMA/CA. He explains that the at… Continue reading Can exponential back-off be abused to "knock off" a station off a network?

Maximizing security visibility on a budget

In this Help Net Security interview, Barry Mainz, CEO at Forescout, discusses the obstacles organizations encounter in attaining security visibility, particularly within cloud and hybrid environments. He explains why asset intelligence—going beyond bas… Continue reading Maximizing security visibility on a budget

IPv6 May Already Be Irrelevant – But So is Moving Off IPv4, Argues APNIC’s Chief Scientist

The chief scientist of the Asia Pacific Network Information Center has a theory about why the world hasn’t moved to IPv6. From a report: In a lengthy post to the center’s blog, Geoff Huston recounts that the main reason for the development of IPv6 was … Continue reading IPv6 May Already Be Irrelevant – But So is Moving Off IPv4, Argues APNIC’s Chief Scientist