Protocol
Top 3 Wi-Fi Security Vulnerabilities
Wi-Fi technology has resulted in an explosion of connectivity, but this communication medium has some vulnerabilities. If proper...
Remember IRC? It's Still Around - And It's Still Worth Using
IRC is a wonderful way to get free support, especially for open-source software, but it's often overlooked in favor of newer social media...
Border Gateway Protocol: The Biggest Network Vulnerability Of All?
When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity.
Innovation vs. the Patent Troll
Patents are meant to protect innovators, but patent trolls are taking advantage of the system by obtaining fraudulent patents and then...
The Role of Diameter Signaling in Today's Networks
The Diameter Signaling Protocol has numerous advantages over its predecessor, RADIUS, including its support for authentication,...
The Trouble With IPv6
IPv6 infrastructure appears to be on the way, but the switch from IPv4 won't come without obstacles. Find out more here.
OAuth 2.0 101
If you are on the Internet regularly, chances are you have come across a site that uses OAuth. Find out how the newest version of this...
DNS: One Internet Protocol to Rule Them All
Did you know that the successful operation of the internet hinges on DNS and a few other protocols? Find out why this one protocol holds...
How Network Time Protocol Keeps the Internet Ticking
What's a second or two between friends? When it comes to systems and networks it can mean the difference between success and failure.
What is the difference between a URL and a URI?
Don't know how to tell a URI from a URL? You're not alone. Learn about these commonly confused terms, as well as the less common URN.
From Bluetooth to New Tooth: A Look at Bluetooth 4.0
Learn about the new version of Bluetooth, what devices can use the new standard, and potential new applications for the technology.