Blog

Reject versus Drop – Which to use?

Packet filtering firewalls follow a methodology whereby they analyse the source, destination and port numbers of traffic as it arrives …

read more
Kali Linux – What’s new?

Kali Linux released earlier in the year is dubbed the most advanced penetration testing distribution, ever. How does it compare …

read more
Processing of PCAP files with Snort

PCAP files are something which security and network administrators analyse on a regular basis. But how often do you process …

read more