LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
2 - 3 min read
IPv6 approach for TCP SYN Flood attack over VoIP, Part II
11 January 2024
There are several general categories of DoS atta
LinuxSecurity.com Feature Articles
2 - 3 min read
IPv6 approach for TCP SYN Flood attack over VoIP, Part III
11 January 2024
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet
LinuxSecurity.com Feature Articles
1 - 2 min read
IPv6 approach for TCP SYN Flood attack over VoIP, Part IV
11 January 2024
Service Providers are scrambling to offer voice, video, data, and innovative services, such as ga
LinuxSecurity.com Feature Articles
1 - 2 min read
IPv6 approach for TCP SYN Flood attack over VoIP, Part V
11 January 2024
In this paper, we describe and analyze a network-based DoS attack for IP-based networks. It is kn
LinuxSecurity.com Feature Articles
1 - 3 min read
IPv6 approach for TCP SYN Flood attack over VoIP, Part I
11 January 2024
In this paper, we describe and analyze a network-based DoS attack for IP-based networks. It is kn
LinuxSecurity.com Feature Articles
1 - 2 min read
Review: The Official Ubuntu Book
30 August 2010
If you haven
LinuxSecurity.com Book Reviews
2 - 4 min read
Review: Zabbix 1.8 Network Monitoring
09 August 2010
If you have anything more than a small home network, you need to be monitoring the status of your sy
LinuxSecurity.com Book Reviews
4 - 6 min read
Review: Hacking: The Art of Exploitation, Second Edition
08 June 2010
If you've ever wondered what a "buffer overflow" was, or how a "denial of service" attack works b
LinuxSecurity.com Book Reviews
1 - 2 min read
Review: Ubuntu Unleased 2010 Edition: Covering 9.10 and 10.4
25 May 2010
Compiling a reference book of more than 800 pages, plus a complete DVD distributed with the book, is
LinuxSecurity.com Book Reviews
1 - 3 min read
Vulnerabilities in Web Applications
17 March 2010
The Internet has made the world smaller. In our routine usage we tend to overlook that "www" real
LinuxSecurity.com Feature Articles
4 - 6 min read
Introduction: Buffer Overflow Vulnerabilities
01 March 2010
Buffer overflows are a leading type of security vulnerability. This paper explains what a buffer ove
LinuxSecurity.com Feature Articles
5 - 7 min read
Buffer Overflow Basics
11 February 2010
A buffer overflow occurs when a program or process tries to store more data in a temporary data stor
LinuxSecurity.com Feature Articles