Recent content by kyisoethin

  1. K

    Object storage and block storage

    Hi I want to know about these two technic. I have read that block storage have durability issues.Why? And object storage cannot mount to os directly .Why ? Please answer me.
  2. K

    Which rpm based distro does dell support

    Hi My laptop is dell 5458 i5. I want to install RPM based linux distro on my laptop. But I found that most rpm based distro are not supported for dell laptop. Please guide me which rpm based distro is suited for my laptop.
  3. K

    How SSH work

    Thanks I found that signature generated using private key can be verified with public key. But how could this be? Private key is not for encryption and public key not for decryption. So how does it verify?
  4. K

    How SSH work

    Thank . My question is that in the first stage, we get public key each other.But how are they used to provide authenticity during DH key exchange process?
  5. K

    How SSH work

    Hi I want to verify my understanding about SSH . SSH process steps begin -exchange public key in order to use for authencity in DH key exchange process (at this point I want to know how it give authenticity in detail) -DH key exchange process.From this step, it get secret key and exchange key...
  6. K

    Why SIP and H.323 does not support PAT

    I want to know why VOIP protocol such as SIP, H.323 does not work with PAT. Thank.
  7. K

    what is srackops

    Hi I want to know what is StackOps. Is it a distribition? If so, can it be installed like any other distribution such as ubuntu? Thank
  8. K

    Stackops download link

    I want to download stackops freely. Can I know to download link. Thank .
  9. K

    Virtualization of network

    I am a little confused with the term 'isolation' in network virtualization. I have heard that virtual networks are isolated from each other. How are they isolated? If they are isolated from each other, how can they communicate? Help me my confusion.
  10. K

    UDP and NAT

    Hi I want to know why tunnel encapsulation with udp can go through NAT and why Tcp cannot. I am a little confused with difference between NAT action upon udp and tcp. Please help me. Thank .
  11. K

    Host attack definition

    Hi I am a universery student.And I had to explain other students about host attack. They gave me only 4 words 'Explain about host attack' .No specification. So I want to know what is host attack. Please help me.
  12. K

    Redundancy for NIC

    Thank very much for your answers
  13. K

    Redundancy for NIC

    Hi I want to implement for redundancy of Network interface card of my server. How can having two NIC for one pc be implemented for redundancy. I have heard nic teaming work for that.What about for linux? And how to implement that for both window and linux. Thank a lot
  14. K

    Dos attack with python

    Hi I want to ask how to program dos attacking eg. Tcp syn attack Can you guide me tcp syn attack programming . Thanks
  15. K

    some steps to reduce ddos attack in window

    Hi I am Kyi Soe Thin I just want to know some prevention from ddos attack. Something such as adding rule to registry or modifying builtin firewall for both window and linux. Guide me to defend the best way to ddos. Thank you