September 2015

Upcoming SHA-256 SSL Certificate Requirements

Most web sites, e-mail servers, database servers, and other internet services protect their data with SSL (Secure Socket Layer) certificates to ensure the confidentiality and authenticity of the site and its data. An SSL certificate is a small data file that associates a cryptographic key to an organization or end user. Any time you use a browser to access a web site with the https:// protocol, the server is using an SSL certificate to authenticate the identity of the server and secure that connection.

One of the recent security shifts in the IT industry is the transition from

Read more about Upcoming SHA-256 SSL Certificate Requirements

TACC Services for CNS Faculty

The Texas Advanced Computing Center, or TACC, offers training, consulting, and resources to faculty and researchers of the University of Texas at Austin. These resources include: storage (high-performance storage on Corral and archival storage on Ranch), and time on high-performance compute clusters (the 6400 compute-node Stampede and the 1888 compute-node Lonestar), scientific visualization (Stallion and Maverick, both 132 compute-node clusters with 132 NVIDIA GPUs), and a 96-node data analytics cluster (Wrangler).

Read more about TACC Services for CNS Faculty

Dangers of Peer-to-Peer Networking

What is Peer-to-Peer Networking?

Peer-to-Peer (P2P) networking refers to networks in which peer machines distribute tasks or workloads among themselves. P2P networks are commonly used on the Internet to directly share files or content between two or more machines. Content-sharing P2P networks include BitTorrent, Gnutella2, and eDonkey. P2P applications often, but don't always, take the same names as the networks they run on. These include BitTorrent, PopcornTime, and eMule.

Content-sharing P2P networks are used to share music and videos over the

Read more about Dangers of Peer-to-Peer Networking

How to Monitor Network Traffic On an OS X Mac

nettop is a command-line program that displays updated information about network traffic. In this article we will cover how to run nettop, how to read its output, and how to format that output.

This article is intended for the Mac user who wants to learn more about which applications are accessing the network, what state the network traffic is in, and the amount of consumed resources. The reader can be at a beginning or intermediate level of computer knowledge and skills. The article covers the command-line program nettop

Read more about How to Monitor Network Traffic On an OS X Mac