Latest Posts

Address Resolution Protocol – ARP


On a network both physical and logical addresses play a role in communication.   The use of logical addresses allows for the communication between more than one single network and also access to devices that may not be directly connected to that network.  Whereas Physical addresses are primarily used to facilitate communication on the single…

Read More

Learning to Dissect Packets


For many years if you wanted to analyse the data on your network you needed expensive tools and software.  However nowadays this isn’t the case, there are now a whole host of free tools which you can use in addition or even instead of the commercial options.  It might sounds a little unnecessary to actually…

Read More

Using TCPdump with NIDS


There’s little point setting up some complicated and expensive NIDS (Network Intrusion Detection System) if you don’t analyse the information it provides.  One of then most popular and useful tools to help with this task is that of TCPdump which provides a host of uses especially when used alongside a signature base detection system.  When…

Read More

Using Quantitative Risk Assessment


One of the most difficult questions that has to be answered in implementing anything new in an IT infrastructure is what is the risk.  It doesn’t matter if it’s a few lines of code, a new server or a complete new department – there is a risk and assessing this is crucial to any implementation….

Read More

SNMP – the Management Protocol


SNMP (Simple Network Management Protocol) is very easy, yet powerful however once demystified it is far more accessible. SNMP was originally created back in 1988. The truth is that originally it was simply considered to be a fundamental method by which you can ascertain the use of bandwidth in addition to network data. Notwithstanding its name,…

Read More

Why You Should Use a VPN


There is one piece of software that almost every single global company installs on their laptops and mobile devices, it’s the VPN client software.   A Virtual Private Network is effectively an encrypted tunnel which operates between the client and a VPN server.   The reason that they are considered essential in the corporate world…

Read More

Using TCPdump on your Network


Tcpdump gives a review of the form of protocol related at a certain time to ping peaks, it works with most popular network cards(in regard to usage and options). At length, tcpdump prints some information concerning the packet and it’s content. TCPdump even displays the sequence numbers of the packets which is essential for being able…

Read More

Syn Flood – Simple DDoS Attacks


In case you are likely to protect against an attack, you first must understand how it works. It’s quite straightforward to detect SYN attacks. Since many logic attacks are strategic, it is feasible for an attacker to randomly select a server with software to find exploits on the net. The important thing to keep in…

Read More

Session Control Protocols – SCP


This degree of performance is accomplished by modifying the conventional TCP flow control systems in quite a few ways. It remains to be viewed whether the utility supplied by this protocol will wind up widely deployed within the online environment, or whether it is going to function as a catalyst for more growth of transport…

Read More

Protocol Verification Techniques


Any generic tunneling which happens at the circuit level such as SOCKS and SSL will allow any protocol to pass through proxies and VPN server gateways.   The implication is though that the proxy server itself does not either understand the protocol or how it actually works.  One important example is the SSL tunneling protocol,…

Read More

← OLDER POSTS