Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
networksecurity
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
TrafficLLM: Why LLMs Are Becoming Essential for Encrypted Network Traffic Analysis
Ritwick Mondal
Ritwick Mondal
Ritwick Mondal
Follow
Dec 27 '25
TrafficLLM: Why LLMs Are Becoming Essential for Encrypted Network Traffic Analysis
#
cybersecurity
#
networksecurity
#
ai
#
largelanguagemodel
Comments
Add Comment
3 min read
Extracting Flow-Level Network Features from PCAPs with Tranalyzer2
Ritwick Mondal
Ritwick Mondal
Ritwick Mondal
Follow
Dec 26 '25
Extracting Flow-Level Network Features from PCAPs with Tranalyzer2
#
networksecurity
#
trafficanalysis
#
machinelearning
#
encryptedtraffic
Comments
Add Comment
4 min read
OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Feb 12
OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries
#
cybersecurity
#
osi
#
networksecurity
#
aiml
7
 reactions
Comments
5
 comments
4 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
Mark0
Mark0
Mark0
Follow
Jan 30
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
#
cybersecurity
#
infosec
#
malware
#
networksecurity
Comments
Add Comment
1 min read
Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project
Samuel Adeduntan
Samuel Adeduntan
Samuel Adeduntan
Follow
Aug 29 '25
Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project
#
networksecurity
#
cybersecuritytools
#
ethicalhacking
#
infosec
1
 reaction
Comments
Add Comment
5 min read
How to Create a Secure Subnet and Network Security Group in Azure
PETER Samuel
PETER Samuel
PETER Samuel
Follow
Aug 3 '25
How to Create a Secure Subnet and Network Security Group in Azure
#
networksecurity
#
subnet
#
virtualnetwork
#
azure
10
 reactions
Comments
1
 comment
2 min read
Top 6 Ransomware Defense Tactics You Must Know
Donnie Alonte
Donnie Alonte
Donnie Alonte
Follow
May 16 '24
Top 6 Ransomware Defense Tactics You Must Know
#
threatdetection
#
networksecurity
#
databackup
#
cybersecurity
1
 reaction
Comments
Add Comment
2 min read
Forward Proxy vs. Reverse Proxy: Understanding the Key Differences
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Jan 29 '25
Forward Proxy vs. Reverse Proxy: Understanding the Key Differences
#
proxyservers
#
networksecurity
#
forwardproxy
#
reverseproxy
6
 reactions
Comments
Add Comment
3 min read
Why Should Antivirus Software Integrate Nmap-Level Scanning for Real Internet Security?
Muhammed Shafin P
Muhammed Shafin P
Muhammed Shafin P
Follow
Jul 23 '25
Why Should Antivirus Software Integrate Nmap-Level Scanning for Real Internet Security?
#
cybersecurity
#
securitytools
#
systemsecurity
#
networksecurity
5
 reactions
Comments
Add Comment
3 min read
Getting Started with Kubernetes Network Policies: A Beginner's Guide
Akhilesh
Akhilesh
Akhilesh
Follow
Feb 10
Getting Started with Kubernetes Network Policies: A Beginner's Guide
#
kubernetes
#
cloudnative
#
networksecurity
#
devops
Comments
Add Comment
2 min read
What is User Activity Monitoring?
swetha suresh
swetha suresh
swetha suresh
Follow
Feb 28 '25
What is User Activity Monitoring?
#
networksecurity
3
 reactions
Comments
Add Comment
3 min read
Let’s Get Into the Weeds: The OSI Model and Why it Still Matters
Derryn Edwards
Derryn Edwards
Derryn Edwards
Follow
Oct 23 '24
Let’s Get Into the Weeds: The OSI Model and Why it Still Matters
#
ebpf
#
kubernetes
#
whatis
#
networksecurity
Comments
Add Comment
3 min read
Securing Edge Devices: Mitigating Brute Force Attacks with Zero Trust
Avni Shyam
Avni Shyam
Avni Shyam
Follow
Mar 18 '25
Securing Edge Devices: Mitigating Brute Force Attacks with Zero Trust
#
cybersecurity
#
networksecurity
#
bruteforce
#
threatdetection
Comments
Add Comment
3 min read
The Concept of DMZ in Computer Networks
Boris Gigovic
Boris Gigovic
Boris Gigovic
Follow
Nov 11 '24
The Concept of DMZ in Computer Networks
#
networksecurity
#
networksegmentation
#
computersecurity
#
networkscreening
1
 reaction
Comments
Add Comment
3 min read
Understanding DDoS Attacks and Their Impact on Businesses
Anupriya
Anupriya
Anupriya
Follow
Oct 4 '24
Understanding DDoS Attacks and Their Impact on Businesses
#
ddos
#
cyberattack
#
networksecurity
#
digitaldefense
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account