LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
2 - 3 min read
IPv6 approach for TCP SYN Flood attack over VoIP, Part II
11 January 2024
There are several general categories of DoS atta
LinuxSecurity.com Feature Articles
2 - 3 min read
IPv6 approach for TCP SYN Flood attack over VoIP, Part III
11 January 2024
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet
LinuxSecurity.com Feature Articles
1 - 2 min read
IPv6 approach for TCP SYN Flood attack over VoIP, Part IV
11 January 2024
Service Providers are scrambling to offer voice, video, data, and innovative services, such as ga
LinuxSecurity.com Feature Articles
1 - 2 min read
IPv6 approach for TCP SYN Flood attack over VoIP, Part V
11 January 2024
In this paper, we describe and analyze a network-based DoS attack for IP-based networks. It is kn
LinuxSecurity.com Feature Articles
1 - 3 min read
IPv6 approach for TCP SYN Flood attack over VoIP, Part I
11 January 2024
In this paper, we describe and analyze a network-based DoS attack for IP-based networks. It is kn
LinuxSecurity.com Feature Articles
1 - 3 min read
Vulnerabilities in Web Applications
17 March 2010
The Internet has made the world smaller. In our routine usage we tend to overlook that "www" real
LinuxSecurity.com Feature Articles
4 - 6 min read
Introduction: Buffer Overflow Vulnerabilities
01 March 2010
Buffer overflows are a leading type of security vulnerability. This paper explains what a buffer ove
LinuxSecurity.com Feature Articles
5 - 7 min read
Buffer Overflow Basics
11 February 2010
A buffer overflow occurs when a program or process tries to store more data in a temporary data stor
LinuxSecurity.com Feature Articles
1 - 2 min read
Black Hat DC: Researchers To Release Web Development Platform Hacking Tool
29 January 2010
A technique used in Web application development platforms that provides a constant look-and-feel acr
Organizations/Events
1 - 2 min read
DDoS attacks are bigger threat than hackers planned
14 January 2010
Distributed denial of service (DDoS) attack are certainly nothing new. Companies have suffered the s
Network Security
1 - 2 min read
'Jester' ex-military hacker takes the distributed out of DDOS attacks
13 January 2010
A politically-motivated hacker has apparently developed a multi-thread, thin-client denial of servi
Network Security
1 - 2 min read
Quick way to stop apache and connect floods with csf
31 May 2007
Well first off this will only stop http or connect floods if you are having a real ddos problem you
Network Security