NetworkNewz About Us iEntry
August 16, 2011
Introduction to Scapy
By Joe Purcell
Scapy may be the most powerful tool available to network admins. It is an interactive program for packet manipulation that uses simple operations like sending and receiving packets or capturing and cloning them as building blocks for creating advanced network management tools.

Scapy is a python program available on any operating system, though it is built to run without modification on Linux. It operates on a number of protocols and can do all the basic tasks that other tools do such as traceroute, scanning, network discovery, and arp modification, as well as other fun things like wake-on-lan. It can also do much more advanced tasks that other tools don't offer such as wireless injection.

Continue Reading


Today's Top Videos:
IHadCancer.com: Connecting Cancer Victims through...
IHadCancer.com is a social network that recently launched in an effort to bring cancer fighters, survivors, and supporters together. The site is similar to Facebook in that it gives users a profile..
Google+: The Potential of the Newest Social Network
Google+, the latest social development from the search giant, is continuing to gain extreme hype. WebProNews recently spoke with several search and social media leaders including...
Affiliates Feel Heat from California's Sales Tax Law
The impact of the California online sales tax law that was recently passed is still being felt. The law nicknamed the "Amazon Tax Law" requires online retailers to pay taxes on their affiliate advertising.
Recent Articles:
Scalability and Fault Tolerance with Link Aggregation
Link aggregation is a great networking trick to achieve network scalability and fault tolerance. Let's take a look at the general concepts of how link aggregation is setup and the benefits and restrictions that apply.

The Link Aggregation Control Protocol (LACP) was established as an open protocol by IEEE 802.3ad in 2000. However, the most popular solutions are proprietary, such as Cisco's EtherChannel. The aggregation technique can be used on the three lower...
Read More...

The Next Generation Cyberthreat
Traditional defenses against malware have been rendered ineffective. Corporations are being breached on a daily basis, and major ones weekly. A FireEye whitepaper states that the average per-incident cost of a breach was...
Read More...
The Indestructible Botnet: TDL-4
As one article cites a report by Symantec which shows that the volume of spam has decreased by 90% over the past year, from 225 billion emails a day to 25 billion, and certainly much of this can be accredited to corporate...
Read More...
The Data Breach Deluge of 2011
Millions of online accounts have been compromised so far this year alone. The growth of data stored online is unprecedented, but data security is not keeping pace. The data breach deluge of 2011 is swelling larger...
Read More...
Other iEntry Business Resources:
- WebProNews.com
- Jayde.com
- MarketingNewz.com
- SalesNewz.com
- CareerNewz.com
- InvestNewz.com
- eCommNewz.com
- WebsiteNotes.com
- AdvertisingDay.com
iEntry
--This email is a service of NetworkNewz--

iEntry, Inc. 2549 Richmond Rd. Lexington KY, 40509
2011 iEntry, Inc. All Rights Reserved Privacy Policy Legal