Usenet newsgroups within "alt.databasux", contributed courtesy of giganews.com . These captures omit most binary posts.
Topics: alt.databasux.udp-udp-udp.die-die-die.blowinda-bunghole, alt.databasux.udp-udp-udp,...
A very complex problem in the network is –congestion control. It is one of the major problems among top listed network problems. A lot of important data might be àt loss, as a result, resources become wasted. Many TCP models have proposed to protect the loss during data transfer. They differ from each other on the basis of algorithm for congestion control and segment loss recovery technique. TCP NewReno is one of them that we have proposed in our paper, and it is also an analytical model for...
Topics: TCP, Reno, UDP & NewReno
generalmanual 000051755
Topics: usb, server, keyspan, software, user, devices, udp, manual, device, port, usb server, keyspan usb,...
From the bitsavers.org collection, a scanned-in computer-related document. dec :: tech reports :: NSL-TN-2
Topics: screend, host, port, tcp, security, packets, udp, nsl, network, configuration, security policies,...
Virtual Private Networks (VPNs) are designed to use the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) to establish secure communication tunnels over public Internet. Multipath TCP (MPTCP) extends TCP to allow data to be delivered over multiple network paths simultaneously. This thesis first builds a testbed and investigates the potential of using MPTCP tunnels to increase the goodput of VPN communications and support seamless mobility. Based on the empirical results and an...
Topics: MPTCP, multipath TCP, MPUDP, multipath UDP, VPN, OpenVPN, mobility
270
270
movies
eye 270
favorite 0
comment 0
Jose Nazario Packet Mastering some tools/libraries/techniques (presentation material in zip)
Topics: hack, security, conference, vulnerabilities, packet, tcp, udp, ip, security professional
Among the various network protocols that can be used to stream the video data, RTP over UDP is the best to do with real time streaming in H.264 based video streams. Videos transmitted over a communication channel are highly prone to errors; it can become critical when UDP is used. In such cases real time error concealment becomes an important aspect. A subclass of the error concealment is the motion vector recovery which is used to conceal errors at the decoder side. Lagrange Interpolation is...
Topics: Digital Video, Motion Vector, Error Concealment, H.264, UDP, RTP
This study assessed the factors influencing adoption of UDP recommended practices by rice farmers in Niger State, Nigeria. A total of 86 rice farmers were selected for the study using multi-stage sampling procedure. Structured questionnaire was used for data collection. Descriptive statistics and multiple regressions were used for data analysis. Results revealed that majority (60.5%) of the rice farmers were male and the respondents’ mean age was 49 years. The mean household size was 7 people...
Topics: adoption, urea deep placement (UDP) recommended practices, rice farmers, Niger State.
8
8.0
Jun 10, 2021
06/21
by
yohan hong (hmi45)
data
eye 8
favorite 0
comment 0
external size: 25.8mm x 12.3mm x 2.5mm inside(core) size: 24.8mm x 11.3mm x 1.9mm USB TYPE: A double-sided tape: use OR not Thank you. have a good time
Topics: UDP, USB, Chip On Board, Computer, thingiverse, COB, flash_drive, frame, stl
96
96
May 20, 2014
05/14
by
RAMKRISHNA GHOSH & PRANAB GOSWAMI
texts
eye 96
favorite 0
comment 0
Several mechanisms for adaptive transmission of multimedia data, which is based on real time protocols RTP/RTCP.RTCP offers capabilities for monitoring the transmission quality of multimedia data. When multimedia data (audio, video) are transmitted over a network with low Quality of Service Management there is a high possibility of router queue overflow. To overcome this problem Adaptive Transmission Rate Algorithm is used. To do this Packet size of each source is adjusted according to network...
Topics: NS2, JMF, RTP, RTCP, TCL, Adaptive Transmission Rate Algorithm, QOS, TCP, UDP
The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a UDP network. Computers that are connected to IP networks must be configured before they can communicate with other hosts. The most essential information needed is an IP address. DHCP eliminates the manual task by a network administrator. DHCP is based on the Bootstrap Protocol (BOOTP), adding the capability of automatic allocation of reusable network addresses and additional...
Topics: DHCP, BOOTP, DORA, Lease file, security, CUnit, TCP, UDP and IP address
The author examines the incremental costs and benefits associated with a change from six-month unit deployments to one-year unit deployments. The analysis is based primarily on five fighter squadrons participating in the Marine Corps' Unit Deployment Program and takes in the period July 1976 to October 1988. Regression analysis is used to project transportation cost savings of $4 million in real terms from FY 1989 through FY 1993. With a change to a one-year Unit Deployment Program, fighter...
Topics: Unit deployment, UDP, Marine aviation, Transportation cost, Aircraft readiness, Aircrew training,...
42
42
Jul 9, 2019
07/19
by
Hak5
movies
eye 42
favorite 0
comment 0
This week Shannon Morse discusses several port scanning options you can use in NMap. NMap scans 1000 commonly used ports by default, which include ones like 80 for TCP, and port 25 for SMTP, etc. If you want to scan other ports, these options are for you. Let's start with -F which does a fast scan. Sometimes a scan for the 1000 common ports can still take a while, so you may want to cut that down to only the top 100 ports. It looks like every other scan you do, just add -F after the word NMap....
Topics: Youtube, video, Science & Technology, nmap, port, scanning, target, network mapper, udp, tcp,...
This thesis details the critical need for deployable combat simulations for training in today's surge force environment. To truly realize deployment of these simulations on Naval vessels and in remote theaters, simulations for training must be wireless. Wireless standards 802.11/a/b/g are presented in detail to highlight the strengths and weaknesses of each. This thesis then investigates the viability of deploying combat simulations for training using wireless devices. To this end, the Joint...
Topics: Virtual reality, Combat, Computer simulation, Wireless LANs, Standards, Mathematical models, JSAF,...
Masterkurs Client/Server- Programmierung mit Java: Anwendungen entwickeln mit JDBC, Sockets, XML-RPC, RMI und JMS - Kompakt und praxisnah - Zahlreiche Programmbeispiele und Aufgaben Author: Dietmar Abts Published by Vieweg+Teubner ISBN: 978-3-8348-0322-1 DOI: 10.1007/978-3-8348-9180-8 Table of Contents: Einleitung und Grundlagen Datenbankanwendungen mit JDBC Verbindungslose Kommunikation mit UDP Client/Server-Anwendungen mit TCP Implementierung eines HTTP-Servers XML Remote Procedure Calls...
Topics: Verteiltes System, Client-Server-Konzept, Multi-Tier-Architektur, Middleware, UDP, TCP/IP, Socket,...
25
25
Jul 9, 2019
07/19
by
Hak5
movies
eye 25
favorite 0
comment 0
Jenn Cutter of Open Alpha fame joins us to talk about recent developments in PSP hacking and homebrew. Matt's got answers to your questions about rolling your own Storage Area Network for all your virtualization needs, and Darren's filtering packets in the console with ngrep. -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~- Source: https://www.youtube.com/watch?v=ZeZM22Cl-zQ Uploader: Hak5
Topics: Youtube, video, Howto & Style, open, source, tcp, udp, homebrew, vmware, virtual, machine, vm,...
28
28
Jul 9, 2019
07/19
by
Hak5
movies
eye 28
favorite 0
comment 0
This week we are getting into Netcat the networking utility for use of just about anything with the network. -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~- Source: https://www.youtube.com/watch?v=xjB2nBwzzTk Uploader: Hak5
Topics: Youtube, video, Science & Technology, netcat, network, utility, Linux, terminal, gnu, security,...
The Computer Science Department at the Naval Postgraduate School in Monterey, California has developed a low-cost real-time interactive network based simulation system, known as NPSNET, that uses Silicon Graphics workstations. NPSNET has used non-standard protocols which constrains its participation in distributed simulation. DIS specifies standard protocols and is emerging as the international standard for distributed simulation. This research focused on the development of a robust,...
Topics: Interactive computer systems, Computer simulation, Multiprocessors, DIS, Distributed, Interactive,...
35
35
Jul 9, 2019
07/19
by
Hak5
movies
eye 35
favorite 0
comment 0
This week we are getting into using Netcat to setup an instant chat network. -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~- Source: https://www.youtube.com/watch?v=WuWsawNl0C4 Uploader: Hak5
Topics: Youtube, video, Science & Technology, netcat, network, utility, Linux, terminal, gnu, security,...
This thesis studies and discusses the development of the API, called the persistency API, for supporting the persistent data sessions. Without persistent session support, network applications often need to be restarted from the beginning when intermittent physical connection loss happens. Application programmers can use the persistency API to achieve the service continuity. The persistency API provides the interface that allows a program to continue retrieve data from the point the connection...
Topics: TCP/IP (Computer network protocol), Data transmission systems, File Transfer Protocol (Computer...
21
21
Jul 9, 2019
07/19
by
Hak5
movies
eye 21
favorite 0
comment 0
This week we are getting into using Netcat to file transfer network. -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~- Source: https://www.youtube.com/watch?v=Vh0wXXWZ4kQ Uploader: Hak5
Topics: Youtube, video, Science & Technology, netcat, network, utility, linux, terminal, gnu, security,...
86
86
Jul 9, 2019
07/19
by
Hak5
movies
eye 86
favorite 0
comment 0
Shannon Morse shows off several advanced scanning techniques you can use while working within NMap. -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~- Source: https://www.youtube.com/watch?v=lXK5j2nRuv8 Uploader: Hak5
Topics: Youtube, video, Science & Technology, nmap, network mapper, snubs, shannon morse, hak5, haktip,...
77
77
Jul 8, 2019
07/19
by
Hak5
movies
eye 77
favorite 0
comment 0
On this week's episode of HakTip, Shannon Morse describes TCP Streams and how to decode packets in several formats. While running a packet capture in Wireshark, you may find that although the packets are all in one nice long list, some of them match up with others. An ex: would be if a user is visiting multiple sites, then you'll have a whole series of packets dedicated to one site, and another series dedicated to another site. They'll both end up in this long list depending one when they're...
Topics: Youtube, video, Science & Technology, gadgets, Hack, hack tip, hack tips, hacks, hak5,...
CHIP Special Issue 2004 08
Topics: hto, npm, freebsd, kak, ero, bbi, bce, kotopbie, chip, nomoiabfo, chip special, add pass, pass tcp,...
85
85
Jul 8, 2019
07/19
by
Hak5
movies
eye 85
favorite 0
comment 0
Today on HakTip, Shannon Morse explains the User Datagram Protocol and the Internet Control Message Protocol with Wireshark. UDP stands for User Datagram Protocol. This is another layer 4 protocol, commonly called a 'connectionless protocol', that is used on lots of modern networks to make the transmission of data fast! The weird thing about UDP is it doesn't have a start handshake and a cutoff process like with TCP. Since UDP doesn't have the whole packet handshake that TCP does, you'd think...
Topics: Youtube, video, Science & Technology, gadgets, Hack, hack tip, hack tips, hacks, jailbreak,...
90
90
Jul 9, 2019
07/19
by
Hak5
movies
eye 90
favorite 0
comment 0
Today on HakTip, Shannon Morse discusses the OSI Model and how it relates to Wireshark for packet analysis. Today we're checking out more Wireshark - understanding protocols and the OSI model. If you're still wondering why the heck one would use Wireshark, now is the time to pay attention. We're having some fun with packet sniffing and analysis. But what is that? Packet sniffing is pretty self-descriptive. You're digging under the applications on your computer or network and looking through the...
Topics: Youtube, video, Science & Technology, gadgets, Hack, hack tip, hack tips, hacks, hak5,...
44
44
Jul 8, 2019
07/19
by
Hak5
movies
eye 44
favorite 0
comment 0
On this week's episode of HakTip, Shannon Morse gives several expression examples that you can use when working within the Display Filter Box. Today is all about expression examples. It's a little weird to work within the boundaries of this little text box, and what it'll accept. Throughout the years, Wireshark has been updated and so has the syntax of the expressions it'll accept. Today, I'm using Wireshark v. 1.12.1. I'll start with some hostname and addressing filters. I ran a Wifi Packet...
Topics: Youtube, video, Science & Technology, gadgets, Hack, hack tip, hack tips, hacks, hak5,...
244
244
movies
eye 244
favorite 0
comment 0
News/Business. (2010)
Topics: kylie, sally, sally massagee, udp, nih, sally, gina, gahl, steven, maryland, bethesda, the web,...
Source: Comcast Cable
Since the advent of Naval Warfare, Tactical Knowledge Management (KM) has been critical to the success of the On Scene Commander. Today's Tactical Knowledge Manager typically operates in a high stressed environment with a multitude of knowledge sources including detailed sensor deployment plans, rules of engagement contingencies, and weapon delivery assignments. However the WarFighter has placed a heavy reliance on delivering this data with traditional messaging processes while focusing on...
Topics: XML (Document markup language), Knowledge management, Naval battles, Decision making, Resource...
0
0.0
movies
eye 0
favorite 0
comment 0
Breaking down the latest reporting to provide context and clarity to complex issues in the news.
Topics: pennsylvania, michigan, mastriano, doug mastriano, doj, joe biden, trump, mitch mcconnell, gop,...
Source: Comcast Cable
37
37
Jul 9, 2019
07/19
by
Hak5
movies
eye 37
favorite 0
comment 0
Metasploit Minute - the break down on breaking in. Join Mubix (aka Rob Fuller) every Monday here on Hak5. Thank you for supporting this ad free programming. Sponsored by Hak5 and the HakShop - http://hakshop.com :: Subscribe and learn more at http://metasploitminute.com :: Follow Rob Fuller at http://room362.com and http://twitter.com/mubix -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~- Source:...
Topics: Youtube, video, Science & Technology, metasploit minute, github, framework, metasploit, mubix,...
How to Create Reverse Shells with Netcat Full Tutorial: http://bit.ly/NetcatNC Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Netcat and Ncat are two useful tools for copying data across a network. To a hacker, the only limit to these tools utility is your imagination, and we'll demonstrate the ability to do everything from copying data across a local network to remotely controlling a computer with a reverse shell. Follow Null Byte on: Twitter:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
131
131
movies
eye 131
favorite 0
comment 0
News/Business. (2010)
Topics: kylie, hayes, sally, jackson, chicago, jesse jackson, washington, george bush, george soros, ms....
Source: Comcast Cable
53
53
Nov 26, 2021
11/21
by
klaatu
audio
eye 53
favorite 0
comment 0
Summary: Klaatu presents his fourth episode on networking basics--covering the UDP and TCP protocols Source: http://hackerpublicradio.org/eps.php?id=0394 Klaatu continues his Network Basics series. This episode covers TCP and UDP. You can download the ogg version of this episode, or if you are using Firefox 3.5 then you can just listen to it right in your browser, by clicking here.
Topics: networking, TCP, TCP/IP, UDP, Internet Protocol (IP), protocols, protocol, virtual circuit
13
13
Jun 22, 2021
06/21
by
Comer, Douglas
texts
eye 13
favorite 0
comment 0
xxi, 608 pages ; 23 cm
Topics: TCP/IP (protocole de réseaux d'ordinateurs), RFC, IPv6, IPNG, sécurité, administration...
110
110
movies
eye 110
favorite 0
comment 0
News/Business. (2010) New. (CC)
Topics: kylie, sally, michigan, sally massagee, hayes, ms. whitman, udp, anderson cooper, steven hayes,...
Source: Comcast Cable
45
45
Nov 24, 2021
11/21
by
Kevin Benko
audio
eye 45
favorite 0
comment 0
Summary: Kevin Benko gives an introduction to Linux iptables and packet filtering Source: http://hackerpublicradio.org/eps.php?id=0398 Just a brief and basic overview of IPtables with some mad ramblings about network packets, pornography, and ramen noodles.
Topics: iptables, packet, packets, networking, ipfw, ipchains, netfilter, IP filter, Linux, kernel, TCP,...
139
139
movies
eye 139
favorite 0
comment 0
News/Business. (2010) New. (CC)
Topics: kylie, hayes, jackson, sally, jesse jackson, chicago, christine o'donnell, george bush, george...
Source: Comcast Cable
In This Episode: Google dumped its "Don't Be Evil" promise years ago, but can a new idea to "decentralize the web" work, and keep its promise forever? The Facebook breach affects more than your Facebook account. Tim Berners-Lee's Inrupt project. And game streaming? This Week's Hosts Randy Cassingham, founder of This is True. Leo Notenboom, "Chief Question Answerer," at tech education site Ask Leo! Gary Rosenzweig host and producer of MacMost, and mobile game...
Topics: 2FA, AdBuddies, AOL, Apple I computer, Archiving, Authentication, Bicycles, Big Brother, Blackouts,...
Source: https://tehpodcast.com/teh-043-dont-be-evil-forever/
0
0.0
data
eye 0
favorite 0
comment 0
266
266
texts
eye 266
favorite 0
comment 0
168
168
audio
eye 168
favorite 0
comment 0
289
289
texts
eye 289
favorite 0
comment 0
informe derechos humanos 2009 UDP
Topic: ddhh UDP
324
324
texts
eye 324
favorite 0
comment 0
48
48
texts
eye 48
favorite 0
comment 0
Informe derechos humanos Univerisidad Diego Portales 2009
Topics: derechos humanos, UDP
71
71
Nov 13, 2008
11/08
by
Cristian Costa
audio
eye 71
favorite 0
comment 0
PUBLICIDAD C.COSTA
Topics: frugo, acechi, udp
32
32
texts
eye 32
favorite 0
comment 0
UDP 49200 config files
Topics: vpn, udp 49200
7
7.0
audio
eye 7
favorite 0
comment 0
audios clase de segmentación del martes 22 de junio profesor bracey
Topic: MDM UDP segmentacion
53
53
texts
eye 53
favorite 0
comment 0
UDP Spoofing with OSC, Discussion from http://opensoundcontrol.org/topic/42 Cached by google, printed to PDF
Topics: UDP, SPoofing, OSC
8
8.0
movies
eye 8
favorite 0
comment 0
Implement a four node point to point network with links n0-n2, n1-n2 and n2-n3. Apply TCP agent between n0-n3 and UDP between n1-n3. Apply relevant applications over TCP and UDP agents changing the parameter and determine the number of packets sent by TCP/UDP.
Topics: CCN, TCP, UDP