April 2006

  • Keep an eye on the sky: WLAN usage monitoring

    In this tip, Lisa Phifer demonstrates how to monitor 802.11 network usage for accounting, capacity planning, and compliance reporting by combining traditional network and session monitoring techniq...

  • Network monitoring with Nagios, part one

    Bernard Golden discusses the usefulness and architecture of open source network monitoring tool Nagios.

  • Wireless IDS/IPS thwarts mall intruders

    Siemens yesterday announced the addition of IDS/IPS and location services to its HiPath wireless line, which the largest shopping mall in the world will use to secure its WLAN.

  • TCPdump: Qualify traffic and create a traffic collection statement

    In this excerpt from The router is the firewall, part 3 -- Configuring CBAC, router expert Michael J. Martin explains how to use the popular open source tool TCPdump to audit network traffic.

  • Multi Router Traffic Grapher (MRTG) - Open Source Network Administration, Chapter 3

    The Multi Router Traffic Grapher (MRTG) is an open source tool used to monitor the traffic load on network links. In this chapter James Kretchmar tells us how MRTG produces Web pages containing PNG...

  • A router by any other name is still a router

    While many articles discuss what makes a switch a switch and a router a router, this article focuses on delineating the characteristics between enterprise and home devices.

  • Splunk + Nagios = quick data center troubleshooting

    A lack of prescience in Splunk's spunky search-based troubleshooting tool limited its usage to after-the-fact diagnosis. Adding Nagios, the mighty open source monitoring tool, puts Splunkers one step ahead...

  • Prevent network spoofing: Policies and ACLs

    Network spoofing occurs when the attacker forges the source or destination address in the IP header, ultimately causing a Denial of Service. In this tip, security expert Michael Gregg explains how ...

  • isochronous

    In information technology, isochronous (from the Greek "equal" and "time"; pronounced "eye-SAH-krun-us") pertains to processes that require timing coordination to be successful, such as voice and d...

  • New products, standards help boost wireless security

    New products and standards will help boost wireless security.

  • Network security 1-2-3

    Network security is more than just firewall protection. This tip offers the basics on services and strategies for securing networks on a small budget.

  • Introduction to Ethical Hacking - from Hacking For Dummies

    This chapter from Hacking For Dummies by Kevin Beaver helps security professionals understand how malicious users think and work, enabling them to defend their systems against attacks and to identi...

  • Nessus: Vulnerability scanning in the enterprise

    General advice for building an enterprise scanning program with the open source vulnerability scanner Nessus.

  • Wireless networks are watching you

    Location-based technology promises great boons for business and the public good -- but some consumers are still concerned about it infringing on their privacy.

  • Getting started with Nessus: How to install and configure the open source vulnerability scanner

    Nessus, an open source vulnerability scanner, can scan a network for potential security risks and provide detailed reporting that enables you to remediate gaps in your corporation's security postur...

  • Managing Nessus reports

    Vulnerability scanning with Nessus can produce mountains of data. Learn three tips for getting the most out of the open source vulnerability scanner and managing the data produced by this valuable ...

  • H.323

    H.323 is a standard approved by the International Telecommunication Union (ITU) in 1996 to promote compatibility in videoconference transmissions over IP networks.

  • multicast

    Multicast is communication between a single sender and multiple receivers on a network.

  • orthogonal frequency-division multiplexing (OFDM)

    Orthogonal frequency-division multiplexing (OFDM) is a method of digital modulation in which a signal is split into several narrowband channels at different frequencies.

  • 802.11a

    802.11a is one of several specifications in the 802.11 family applicable to wireless local area networks (wireless LANs or WLANs).