DEV Community

# networksecurity

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
TrafficLLM: Why LLMs Are Becoming Essential for Encrypted Network Traffic Analysis

TrafficLLM: Why LLMs Are Becoming Essential for Encrypted Network Traffic Analysis

Comments
3 min read
Extracting Flow-Level Network Features from PCAPs with Tranalyzer2

Extracting Flow-Level Network Features from PCAPs with Tranalyzer2

Comments
4 min read
OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

OSI Layer 2—The Gatekeeper: Local Adjacency, Framing, and Trust Boundaries

7
Comments 5
4 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

1
Comments
5 min read
How to Create a Secure Subnet and Network Security Group in Azure

How to Create a Secure Subnet and Network Security Group in Azure

10
Comments 1
2 min read
Top 6 Ransomware Defense Tactics You Must Know

Top 6 Ransomware Defense Tactics You Must Know

1
Comments
2 min read
Forward Proxy vs. Reverse Proxy: Understanding the Key Differences

Forward Proxy vs. Reverse Proxy: Understanding the Key Differences

6
Comments
3 min read
Why Should Antivirus Software Integrate Nmap-Level Scanning for Real Internet Security?

Why Should Antivirus Software Integrate Nmap-Level Scanning for Real Internet Security?

5
Comments
3 min read
Getting Started with Kubernetes Network Policies: A Beginner's Guide

Getting Started with Kubernetes Network Policies: A Beginner's Guide

Comments
2 min read
What is User Activity Monitoring?

What is User Activity Monitoring?

3
Comments
3 min read
Let’s Get Into the Weeds: The OSI Model and Why it Still Matters

Let’s Get Into the Weeds: The OSI Model and Why it Still Matters

Comments
3 min read
Securing Edge Devices: Mitigating Brute Force Attacks with Zero Trust

Securing Edge Devices: Mitigating Brute Force Attacks with Zero Trust

Comments
3 min read
The Concept of DMZ in Computer Networks

The Concept of DMZ in Computer Networks

1
Comments
3 min read
Understanding DDoS Attacks and Their Impact on Businesses

Understanding DDoS Attacks and Their Impact on Businesses

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.