-
flyingroutes: a faster alternative to traceroute
16/12/2022 (updated on 13/09/2024) · 12 min read · cybersecurity networking flyingroutes traceroute ·In this article, I introduce a network diagnostic tool I developed: flyingroutes. The goal is to provide an efficient way to determine the nodes located on a network communication path through a faster alternative to the well-known traceroute tool. Introduction Diagnostics is a crucial part of a network …
Read More -
Choosing a block cipher mode of operation
In this article, I propose to give you some guidance in choosing the mode of operation for a block cipher. The aim here is to highlight the essential elements to know which mode to use, taking into account security properties as well as performance criteria, and in particular with the help of a little tool I have …
Read More -
In this article, I will dissect the concept of Virtual Private Network (VPN) using the Internet Protocol security (IPsec) protocol. The goal is to help you better understand the various steps involved in setting up an IPsec tunnel, which relies on different protocols, and then to show you a concrete step-by-step …
Read More -
In this article, I introduce a network authentication protocol, namely Tunnel Extensible Authentication Protocol (TEAP), a method that allows multiple authentication mechanisms within a secure tunnel. The principle is to be able to combine authentication methods and thus increase the security level of a communication. …
Read More -
In this article, I demystify the HyperText Transfer Protocol (HTTP) security response headers. The objective is to provide you with the basics in order to understand what these headers are, what they are used for, and how to use them. This article is mainly intended for Web hosts and Website developers who wish to …
Read More