Linux : Configuring a network bridge for your Virtual Machines

My new center of interest those days being virtualization, I tried quite a few software starting with Xen, then QEMU, then KVM, and finally VirtualBox. But as far as giving a network access to the VM is concerned, I’ve always sticked to a network bridge for the reason that this makes the VM appear on the network just like any other computer of your network.

This post provided a sample script to setup a bridge suitable to use with all of the named virtualization softwares.

Continue reading Linux : Configuring a network bridge for your Virtual Machines

Network Security : Being the Man In The Middle using ARP

This post presents what is the attack known as “ARP Man in the Middle” which is basically a way for a malicious user to sniff network traffic on a fully switched network. If you don’t know this attack yet, go on reading.

Continue reading Network Security : Being the Man In The Middle using ARP