List of topics


Wireless Networks

Example of proprietary wireless technologies for Industrial Automation
OPC based Wireless FR management System for Industrial Automation
The Hidden and Exposed Terminal problem in wireless CSMA/CA
Challenges in Next Generation Heterogeneous Network Infrastructures
QoS Provisioning in Wireless Mesh Networks
ISA100 11a Network Layer and 6LowPAN
IEEE 802.11e QoS and packet loss rate
EAP Authentication in Wireless Access Networks
Fast Mobile IPv6 and QoS: Overview and discussion
WiFi and 3G convergence
Caching domain logon credentials for EAP PEAP/MSCHAP authentication: Security considerations
Windows logon in wireless networks implementing 802.11i
Survey on the use of wireless connectivity at work
CVIS: The Collaborative Vehicle Infrastructure System
6710X: Single-core cellular Linux solution by STEricsson
Securing wireless network with PEAP/MSCHAP may require Windows AD
NEtwork MObility support (NEMO) overview
The Kerberized Handover Keying (KHK) protocol
Survey shows 80% of retailers have insecure wireless infrastructures
Handoff delays in 802.11 wireless networks
What top 10 high-tech campuses use for wireless security
Security vulnerabilities in tunneled EAP methods
Access control and Authentication in wireless access networks
Understanding UMTS, HSPA, WCDMA and GSM relationships
Building wpa_supplicant with TLS support in windows using MSVC++ 2005
Building wpa_supplicant in windows using cygwin and mingw
The Pairwise Master Key Security Association (PMKSA)
Opportunistic Pairwise Master Key (PMK) Caching
Wireless Security - WPA2 PSK using wpa_supplicant howto
Security in the WirelessHART networking stack
Security of vehicular communications
Hostapd RADIUS server configuration howto
The lying NAS problem
WPA2 EAP-PEAP using wpa_supplicant and SSL certificates: howto
Wireless Security - WPA2 EAP-TTLS using wpa_supplicant and SSL certificates howto
EAP Extensions for EAP Re-authentication Protocol (ERP): The upcoming wireless security upgrade
IEEE 802.1X pre-authentication: Reducing handoff delays in 802.11 wireless networks
IEEE 802.11r for fast and secure wireless handoffs
Network communication properties and QoS of VoIP
802.11 Handoff performance -- Bibliography
Performance of EAP and RADIUS authentication in roaming scenarios
Combining Kerberos, EAP and RADIUS for better wireless authentication
EAP Wireless authentication: The state of the art
Upgrading Prism II/2.5 wireless cards firmware for hosatp/WPA support: Howto
Buffalo WLI-CB-G54 wireless card on Linux: Howto
Visualizing wireless AAA authentication delays
Cross-compiling wpa_supplicant for windows
Wireless Security - WPA2 EAP-TLS using wpa_supplicant howto
Howto create a FreeBSD wireless router/access point
The 802.11 handoff process
Performance evaluation of wireless security systems and AAA (RADIUS) protocols
On the Inter Access Point Protocol (802.11F) aka IAPP
On the EAP GSSAPI authentication method
Wireless handoff delay and its impact on VoIP performance and QoS
Capture and Analysis of RADIUS traffic using tshark
Automatic Network selection

Network Security

Example of proprietary wireless technologies for Industrial Automation
Factors inhibiting growth in the industrial automation security market
Industrial automation security market: Growth factors
EAP Authentication in Wireless Access Networks
Derivation and delivery of ECC Implicit Certificates
WiFi and 3G convergence
Caching domain logon credentials for EAP PEAP/MSCHAP authentication: Security considerations
Security of 1024bit RSA cryptography in the mid-term
What is an implicit certificate?
Kerberos/OpenLDAP guides on the net
Denial of service in public key protocols
Windows logon in wireless networks implementing 802.11i
Postfix STARTTLS with SASL authentication how to
OpenSSL RSA sign and verify howto
HOW TO wincvs over ssh with passwordless public key authentication
3 Reasons why network security with SSL may not be for you
Securing wireless network with PEAP/MSCHAP may require Windows AD
Simplified Single Sign-On: Convenience and Security for Enterprise Applications
Introduction to Network Admission Control
The Kerberized Handover Keying (KHK) protocol
Survey shows 80% of retailers have insecure wireless infrastructures
Handoff delays in 802.11 wireless networks
What top 10 high-tech campuses use for wireless security
Security vulnerabilities in tunneled EAP methods
Access control and Authentication in wireless access networks
The Kerberos-on-the-web project
Evolution of network access control standards
Custom pre-logon processing in MS Windows using GINA DLL hooks
Building wpa_supplicant with TLS support in windows using MSVC++ 2005
Building wpa_supplicant in windows using cygwin and mingw
Howto configure SSL support for Apache web server
Handbook of applied cryptography
Three issue in Kerberos cross-realm authentication
Custom transport for Kerberos initial authentication made easy in Heimdal
Howto add new EAP methods to wpa_supplicant and hostapd
Single sign-on e-mail with GSSAPI/Kerberos authentication
Heimdal, MIT and Windows Kerberos howto and documentation
Postfix SMTP GSSAPI authentication howto
DES encryption with OpenSSL: example in C
The Pairwise Master Key Security Association (PMKSA)
Opportunistic Pairwise Master Key (PMK) Caching
Wireless Security - WPA2 PSK using wpa_supplicant howto
Security in the WirelessHART networking stack
Security of vehicular communications
Hostapd RADIUS server configuration howto
RADIUS accounting
The lying NAS problem
WPA2 EAP-PEAP using wpa_supplicant and SSL certificates: howto
Wireless Security - WPA2 EAP-TTLS using wpa_supplicant and SSL certificates howto
EAP Extensions for EAP Re-authentication Protocol (ERP): The upcoming wireless security upgrade
IEEE 802.1X pre-authentication: Reducing handoff delays in 802.11 wireless networks
IEEE 802.11r for fast and secure wireless handoffs
Note on SASL Kerberos5 authentication mechanism
802.11 Handoff performance -- Bibliography
Performance of EAP and RADIUS authentication in roaming scenarios
Building Cyrus IMAP with SASL GSSAPI support
Combining Kerberos, EAP and RADIUS for better wireless authentication
EAP Wireless authentication: The state of the art
Visualizing wireless AAA authentication delays
Kerberos authentication tutorial and howto
WIDE Diameter C API is online
Kerberos vulnerability to dictionary attacks
Cross-compiling wpa_supplicant for windows
Wireless Security - WPA2 EAP-TLS using wpa_supplicant howto
Secure IPv6 over IPv4 IPSec tunnels with racoon2
The 802.11 handoff process
Performance evaluation of wireless security systems and AAA (RADIUS) protocols
On the Inter Access Point Protocol (802.11F) aka IAPP
On the EAP GSSAPI authentication method
RSA keys and certificates with OpenSSL: Frequently used commands
Authorization in Microsoft network security protocols
CVS and Kerberos authentication: Howto
Cyrus IMAP with GSSAPI Kerberos - Configuration Howto
ACLs with Foundry Bigiron
Capture and Analysis of RADIUS traffic using tshark

Network Performance

Policy Based QoS Framework
Example of proprietary wireless technologies for Industrial Automation
OPC based Wireless FR management System for Industrial Automation
The Hidden and Exposed Terminal problem in wireless CSMA/CA
QoS Provisioning in Wireless Mesh Networks
IEEE 802.11e QoS and packet loss rate
Fast Mobile IPv6 and QoS: Overview and discussion
Deploying VoWiFi: Handoff delays and QoS of voice over WiFi
The Kerberized Handover Keying (KHK) protocol
Handoff delays in 802.11 wireless networks
Howto test performance of data alignment
Opportunistic Pairwise Master Key (PMK) Caching
De-Jittering buffers and real time network services
EAP Extensions for EAP Re-authentication Protocol (ERP): The upcoming wireless security upgrade
IEEE 802.1X pre-authentication: Reducing handoff delays in 802.11 wireless networks
IEEE 802.11r for fast and secure wireless handoffs
Codec latency in voice communications over the Internet (VoIP)
Network communication properties and QoS of VoIP
802.11 Handoff performance -- Bibliography
Performance of EAP and RADIUS authentication in roaming scenarios
Netem, tc and qdisc loss and delay emulation examples
EAP Wireless authentication: The state of the art
Tshark byte matching for selective packet capture
Visualizing wireless AAA authentication delays
The 802.11 handoff process
Performance evaluation of wireless security systems and AAA (RADIUS) protocols
Capture and Analysis of RADIUS traffic using tshark
Wireless handoff delay and its impact on VoIP performance and QoS

Coding

Using the Gtags source code tag system with vim
Using vim file buffers
Declaring and initializing an array of structures in C
Buffered (fread,fwrite) Vs non buffered (read, write) i/o
Code review utility for software porting projects
Essential GDB debugging commands
Computing number of data blocks using bitwise operations
Array of strings example in C
Simple makefile example using built-in default rules
Difference between signed char and unsigned char
Conditional Inclusion of C functions
Perl http post example
Program memory usage
The GCC pre-processor
How to create a new MySQL database in Debian/Ubuntu
How to reduce a library size using etrace
Method for studying keyword density in top ranking pages
Parsing XML files in Perl using XML::Simple
5 Essential vim plugins for programmers
Using mingw and libtool to cross-compile static libraries
Browse Kerberos source in HTML
Howto test performance of data alignment
Memory management mistakes to avoid
Howto extract e-mail MIME attachments using Perl and uudecode
Vim auto-completion howto
ASN.1 DER encoding and decoding in C - example/tutorial
How to print binary to stdout in C
Custom transport for Kerberos initial authentication made easy in Heimdal
How to implement state-machine / automata in C
Libxml2 example for howto parse XML files in C
Advanced Network Programming
Howto add new EAP methods to wpa_supplicant and hostapd
Script for creating Perl CPAN packages
FreeBSD divert sockets
Why you should use stdint.h
Perl server sockets example
Error handling paradigm for C programs
Autoconf and automake for libraries
DES encryption with OpenSSL: example in C
Javascript example using flickr api to fetch random images with tags
10 essential tools for Ph.D students in Information Science
gettimeofday and localtime millisecond timestamps example
Syslog simple example
Howto create Debian/Ubuntu (.deb) packages with dpkg
Password-less Rsync over ssh howto
Release engineering and methodology with CVS branching and merging
Autotools by example

Network Services


Unix

Kerberos/OpenLDAP guides on the net
Postfix STARTTLS with SASL authentication how to
Replace strings in multiple files using find and sed
Simple makefile example using built-in default rules
OpenSSL RSA sign and verify howto
xargs command line examples
How to configure SSL for Apache
How to install Cyrus in Linux
Program memory usage
The GCC pre-processor
How to create a new MySQL database in Debian/Ubuntu
How to reduce a library size using etrace
Method for studying keyword density in top ranking pages
5 Essential vim plugins for programmers
Howto create a Hotline bot in Perl using Net::Hotline::Client
GNATS issue tracking system configuration howto
Howto send e-mails from command-line using msmtp
Roundup e-mail interface: howto add/update issues by e-mail
Howto Install and use the Roundup issue tracker
Using mingw and libtool to cross-compile static libraries
Write and map vim macros/functions (howto and example)
Vim auto-completion howto
Libxml2 example for howto parse XML files in C
Process scheduling in the linux kernel
Script for creating Perl CPAN packages
Single sign-on e-mail with GSSAPI/Kerberos authentication
Scalability of enterprise unix/linux servers
Finding external dependencies in a Perl project
Howto filter and forward e-mail with procmail: example
Alter out-going and in-coming e-mail with postfix: Howto
Screen split window howto
Embedded linux emulator with qemu
Pushd and popd for easy shell navigation
Postfix SMTP GSSAPI authentication howto
Perl server sockets example
Autoconf and automake for libraries
AWK scripting examples
10 essential tools for Ph.D students in Information Science
gettimeofday and localtime millisecond timestamps example
Syslog simple example
Renaming network interfaces using udev
Tshark examples: howto capture and dissect network traffic
Howto create Debian/Ubuntu (.deb) packages with dpkg
Buffalo WLI-CB-G54 wireless card on Linux: Howto
Howto create a FreeBSD wireless router/access point
Howto setup IPv6 DNS zones with bind
Secure IPv6 over IPv4 IPSec tunnels with racoon2
Password-less Rsync over ssh howto
Mounting and Accessing Windows/Samba shares in Unix/Linux with Sharity
RSA keys and certificates with OpenSSL: Frequently used commands
Linux NAT
Cyrus IMAP with GSSAPI Kerberos - Configuration Howto
Automatic Network selection
Autotools by example

IPv6


Routing



Wireless Internet Security Performance RADIUS server Wireless Internet Security Performance RADIUS server