enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Snort (software) - Wikipedia

    en.wikipedia.org/wiki/Snort_(software)

    The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, semantic URL attacks, buffer overflows, server message block probes, and stealth port scans. [11] Snort can be configured in three main modes: 1. sniffer, 2. packet logger, and 3. network intrusion detection. [12]

  3. TCP tuning - Wikipedia

    en.wikipedia.org/wiki/TCP_tuning

    TCP tuning techniques adjust the network congestion avoidance parameters of Transmission Control Protocol (TCP) connections over high-bandwidth, high-latency networks. Well-tuned networks can perform up to 10 times faster in some cases. [1]

  4. Nagle's algorithm - Wikipedia

    en.wikipedia.org/wiki/Nagle's_algorithm

    A solution recommended by Nagle, that prevents the algorithm sending premature packets, is by buffering up application writes then flushing the buffer: [1] The user-level solution is to avoid write–write–read sequences on sockets. Write–read–write–read is fine. Write–write–write is fine. But write–write–read is a killer.

  5. Deep packet inspection - Wikipedia

    en.wikipedia.org/wiki/Deep_packet_inspection

    Deep Packet Inspection is able to detect a few kinds of buffer overflow attacks. DPI may be used by enterprise for Data Leak Prevention (DLP). When an e-mail user tries to send a protected file, the user may be given information on how to get the proper clearance to send the file.

  6. Bufferbloat - Wikipedia

    en.wikipedia.org/wiki/Bufferbloat

    Bufferbloat is the undesirable latency that comes from a router or other network equipment buffering too many data packets.Bufferbloat can also cause packet delay variation (also known as jitter), as well as reduce the overall network throughput.

  7. Traffic shaping - Wikipedia

    en.wikipedia.org/wiki/Traffic_shaping

    Traffic shaping is a bandwidth management technique used on computer networks which delays some or all datagrams to bring them into compliance with a desired traffic profile.

  8. Common Log Format - Wikipedia

    en.wikipedia.org/wiki/Common_Log_Format

    For computer log management, the Common Log Format, [1] also known as the NCSA Common log format, [2] (after NCSA HTTPd) is a standardized text file format used by web servers when generating server log files. [3] Because the format is standardized, the files can be readily analyzed by a variety of web analysis programs, for example Webalizer ...

  9. NetFlow - Wikipedia

    en.wikipedia.org/wiki/NetFlow

    NetFlow is a feature that was introduced on Cisco routers around 1996 that provides the ability to collect IP network traffic as it enters or exits an interface. By analyzing the data provided by NetFlow, a network administrator can determine things such as the source and destination traffic, class of service, and the causes of congestion.