-
Keep an eye on the sky: WLAN usage monitoring
In this tip, Lisa Phifer demonstrates how to monitor 802.11 network usage for accounting, capacity planning, and compliance reporting by combining traditional network and session monitoring techniq...20 Apr 2006
-
Network monitoring with Nagios, part one
Bernard Golden discusses the usefulness and architecture of open source network monitoring tool Nagios.20 Apr 2006
-
Wireless IDS/IPS thwarts mall intruders
Siemens yesterday announced the addition of IDS/IPS and location services to its HiPath wireless line, which the largest shopping mall in the world will use to secure its WLAN.19 Apr 2006
-
Splunk + Nagios = quick data center troubleshooting
A lack of prescience in Splunk's spunky search-based troubleshooting tool limited its usage to after-the-fact diagnosis. Adding Nagios, the mighty open source monitoring tool, puts Splunkers one step ahead...18 Apr 2006
-
Multi Router Traffic Grapher (MRTG) - Open Source Network Administration, Chapter 3
The Multi Router Traffic Grapher (MRTG) is an open source tool used to monitor the traffic load on network links. In this chapter James Kretchmar tells us how MRTG produces Web pages containing PNG...18 Apr 2006
-
TCPdump: Qualify traffic and create a traffic collection statement
In this excerpt from The router is the firewall, part 3 -- Configuring CBAC, router expert Michael J. Martin explains how to use the popular open source tool TCPdump to audit network traffic.18 Apr 2006
-
A router by any other name is still a router
While many articles discuss what makes a switch a switch and a router a router, this article focuses on delineating the characteristics between enterprise and home devices.18 Apr 2006
-
Prevent network spoofing: Policies and ACLs
Network spoofing occurs when the attacker forges the source or destination address in the IP header, ultimately causing a Denial of Service. In this tip, security expert Michael Gregg explains how ...17 Apr 2006
-
isochronous
In information technology, isochronous (from the Greek "equal" and "time"; pronounced "eye-SAH-krun-us") pertains to processes that require timing coordination to be successful, such as voice and d...15 Apr 2006
-
New products, standards help boost wireless security
New products and standards will help boost wireless security.14 Apr 2006
-
Introduction to Ethical Hacking - from Hacking For Dummies
This chapter from Hacking For Dummies by Kevin Beaver helps security professionals understand how malicious users think and work, enabling them to defend their systems against attacks and to identi...12 Apr 2006
-
Network security 1-2-3
Network security is more than just firewall protection. This tip offers the basics on services and strategies for securing networks on a small budget.12 Apr 2006
-
Nessus: Vulnerability scanning in the enterprise
General advice for building an enterprise scanning program with the open source vulnerability scanner Nessus.11 Apr 2006
-
Wireless networks are watching you
Location-based technology promises great boons for business and the public good -- but some consumers are still concerned about it infringing on their privacy.11 Apr 2006
-
Managing Nessus reports
Vulnerability scanning with Nessus can produce mountains of data. Learn three tips for getting the most out of the open source vulnerability scanner and managing the data produced by this valuable ...11 Apr 2006
-
Getting started with Nessus: How to install and configure the open source vulnerability scanner
Nessus, an open source vulnerability scanner, can scan a network for potential security risks and provide detailed reporting that enables you to remediate gaps in your corporation's security postur...11 Apr 2006
-
H.323
H.323 is a standard approved by the International Telecommunication Union (ITU) in 1996 to promote compatibility in videoconference transmissions over IP networks.10 Apr 2006
-
multicast
Multicast is communication between a single sender and multiple receivers on a network.10 Apr 2006
-
orthogonal frequency-division multiplexing (OFDM)
Orthogonal frequency-division multiplexing (OFDM) is a method of digital modulation in which a signal is split into several narrowband channels at different frequencies.10 Apr 2006
-
802.11a
802.11a is one of several specifications in the 802.11 family applicable to wireless local area networks (wireless LANs or WLANs).10 Apr 2006
Network Management Strategies for the CIO