The most recent content from our members.
A fiery debate arises when discussing flow technologies i.e. NetFlow vs. sFlow. As we all know, existing flow technologies act as a vital and viable solution to troubleshoot network and bandwidth issues. While network engineers contemplate which one is better, NetFlow and sFlow serve as an example of how flow technologies…
Providing access from nearly anywhere, Wireless Local Area Networks (WLANs) deliver a great deal of flexibility to business networks and their applications. It’s important to note that WLANs are also susceptible to vulnerabilities, misuse, and attacks from unauthorized devices known as rogue wireless devices. To safeguard…
As a network administrator, you are more likely to generate custom reports on network usage frequently. Even though traditional tools provides basic functionalities, you still need to retrieve any network statistic from your device. Seasoned network administrators use OIDs, MIB browsers, and SNMP poll to get custom data…
In the spirit of the year-end listing ritual, here are Top 5 web services outages in order of magnitude. * GoDaddy * Amazon Web Services (December 24) * Amazon Web Services (October 22) * Amazon Web Services (June 29) * Google App Engine (October 26) Yes, the list seems to pose the question of what’s going on with the AWS…
Got any zombies on your network? That probably depends on how you define “zombie,” right? Virtual Machine Zombies A zombie could be a lost, lone virtual machine languishing on your network. Or a zombie might be a dummy machine, taken over by a spammer, sending out spam messages whenever it’s ordered to. Whether you’re…
One of the great benefits of using CatTools is its ability to roll out changes to multiple devices at once. A typical example of this would be to change the passwords of all of your network devices on a regular basis. There are several ways in which to make multiple device changes like this: To change the Enable, the…
Shellshock is the name given to a vulnerability detected in the Bash which allows attackers to remotely compromise vulnerable systems allowing for unauthorized disclosure of information. Ever since news of the bug came out and the original fix actually not fixing the issue, attackers have been using ‘masscan’ to find…
In my Linkedin Profile, I write that I’m a fan of “elaborate IT Metaphors” yet, in a very literal way, I’ve never actually written a list of my favorites. Listing out my favorite IT metaphors, sayings, aphorisms and such is risky. Too much pithiness, and I risk not being taken seriously. Too much cynicism and no one wants…
I've had the opportunity over the past couple of years to work with a large customer of mine on a refresh of their entire infrastructure. Network management tools were one of the last pieces to be addressed as emphasis had been on legacy hardware first and the direction for management tools had not been established. This…
Has this situation happened to you? You've dedicated your professional career -- and let's be honest -- your life, on a subject, only to find “that's not good enough.” Maybe it comes from having too many irons in the fire, or it could be that there are just too many fires to be chasing. Ericsson (1990) says that it takes…
It looks like you're new here. Sign in or register to get started.