Comments
-
Thank you for including the links. Delve sounds very useful.
-
Well written Dez. Another item that can help at work is a Passive Vulnerability scanner. It is a Snort like sniffer that can catch old, insecure protocols being used on the network. It then can reset the communications path and alert on it.
-
We been using NPM for quite a while. We have approval SAM, finally. Can't wait.
-
The business jargon phrases would lend themselves well to catch phrase bingo.
-
Good read.
-
Couldn't agree more.
-
Stories about finding problems and removing them from the network. Even is that problem is of the human variety. Please read and enjoy.
-
Most public cloud providers have the ability to analyze traffic within the cloud. Having SolarWinds monitor the traffic to/from the cloud would be great!
-
There are already hacks that allow criminals encrypt your hard drives and hold them at ransom. What if these same criminals were in control of your home security system? How about your automobile? The temperature of your home? Each of these conveniences adds another attack vector that can be exploited. The convenience of…
-
Still happy to be in an organization that doesn't allow any wireless devices.
-
Passing this article on to our SQL bubba's. Good read.
-
Always have an end goal in mind. Just like writing code, have an end product in mind.
-
best of show
-
Well said, straight forward and to the point.
-
I feel your pain. Some the e-mails from our younger crowd already reflect this. Is it too much to proof read your work?
-
Agreed. At least an understanding of scripting, whether it be LINUX/UNIX, Cisco, or Windows.
-
I wonder if they would provide a "loaner" for "testing purposes?
-
As a security nerd, I couldn’t wait to read this. Yes, I am actually salivating. I found the article on the NSA breach a really good read. Focus used to be on the boundary security tools. That focus shifted to the endpoint security with some folk saying that boundary systems were passé and were no longer needed. I have…
-
These are great
-
I agree with having the visual tools at your disposal, so long as you understand the what those tools are showing you. Understanding how ICMP and SNMP actually work. Understanding netflow and how to interpret a TCPdump. Visual is great, so long as you truely understand what you are seeing.
-
Hi tinmann0715 I am Tregg Hartley and I am a Network Monitoring & Management Addict and a TCPDump junkie. Ahh...the scrolling green text on a black background.
-
Clear in house first!
-
In the Incident Handling world, if you are moving too fast to take good notes, then you are moving too fast. I learned my troubleshooting techniques as an Electronics Technician for the US Navy. We were taught the six step troubleshooting technique. 1. Symptom recognition 2. Symptom elaboration 3. Listing of probable…
-
I maintain a classified network. We don't share.
-
Congratulations to mimcginnis and esecola !!!
-
I like Pi
-
Yes, I do remember that commercial. I was a sub-contractor for EDS at one point, oh the stories.
-
Same day?
-
I hadn't really thought about it, but our network admin team is our tools team. We implemented various SolarWinds products for ourselves, replacing HP OpenView and Cisco Works. We then worked with our other teams, showing them the many benefits of SolarWinds.
-
Yes. Actually I have worked on NT 3.5, Novell 5.5, HPUX 7, Thicknet, and Unisys mainframes. Old school nerd.