In August 2011, probably while procrastinating learning for my university admission exams, with one mouldy foot still in my IT-past, I signed up for Security Override, an online game designed to turn network security n00bs such as myself into novices.
By Rowan Rodrik, 2 years ago, on March 14, 2015, at 16:03 |
Aaron Clauset, Cristopher Moore and M.E.J. Newman published a paper in Nature about the automatic extraction of hierarchical structure of networks: Hierarchical structure and the prediction of missing links in networks. There's a free PDF of the paper on Mark Newman's personal website.
By Rowan Rodrik, 7 years ago, on June 29, 2010, at 11:06 |
When clustering machines, you make it possible for a failover node to be accessible on the same address as the primary node by having a virtual network interface. In Debian, you can add one like this:
By halfgaar, 7 years ago, on March 26, 2010, at 17:03 |
You can easily scan the entire network for machine presence with nmap: nmap -sP -v -v 192.168.1.*
By halfgaar, 7 years ago, on January 13, 2010, at 17:01 |
I'm always confused about which wiring scheme to use for UTP cables. After doing some research, it seems T568B is what you need. Wikipedia says that is doesn't really matter, but crosstalk can be a problem for T568A in some esoteric situations:
By halfgaar, 7 years ago, on December 30, 2009, at 11:12 |
When you run virtual machines, the most convenient network setup is having a bridge between the virtual machine and your normal ethernet network. In Debian, I use the following config in /etc/network/interfaces to have such a bridge:
By halfgaar, 7 years ago, on December 09, 2009, at 13:12 |