Wi-Fi technology has resulted in an explosion of connectivity, but this communication medium has some vulnerabilities. If proper...

Top 3 Wi-Fi Security Vulnerabilities

IRC is a wonderful way to get free support, especially for open-source software, but it's often overlooked in favor of newer social media...

Remember IRC? It's Still Around - And It's Still Worth Using

When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity.

Border Gateway Protocol: The Biggest Network Vulnerability Of All?

Patents are meant to protect innovators, but patent trolls are taking advantage of the system by obtaining fraudulent patents and then...

Innovation vs. the Patent Troll

The Diameter Signaling Protocol has numerous advantages over its predecessor, RADIUS, including its support for authentication,...

The Role of Diameter Signaling in Today's Networks

IPv6 infrastructure appears to be on the way, but the switch from IPv4 won't come without obstacles. Find out more here.

The Trouble With IPv6

If you are on the Internet regularly, chances are you have come across a site that uses OAuth. Find out how the newest version of this...

OAuth 2.0 101

Did you know that the successful operation of the internet hinges on DNS and a few other protocols? Find out why this one protocol holds...

DNS: One Internet Protocol to Rule Them All

What's a second or two between friends? When it comes to systems and networks it can mean the difference between success and failure.

How Network Time Protocol Keeps the Internet Ticking

Don't know how to tell a URI from a URL? You're not alone. Learn about these commonly confused terms, as well as the less common URN.

What is the difference between a URL and a URI?

Learn about the new version of Bluetooth, what devices can use the new standard, and potential new applications for the technology.