Latest Posts

Authentication Systems and Techniques


Authentication is one of the most important parts of any computer system, application or network.  Without an adequate authentication method a network operating system will quickly become overloaded and insecure.  In the early days of computers a simple username and password would be sufficient, and although this is still the case in many networks more…

Read More

Capacity Planning for Proxy Servers


There is one factor which is crucial when we are considering capacity planning for a proxy server and that is the ‘peak load’.  This point will vary greatly between organisations or companies yet it is essential that it is first identified and measured correctly.  For some networks it might be first thing in the morning…

Read More

Network Troubleshooting – TCP Flow Control


This is the 2nd article in our series on troubleshooting network performance problems, in it we are going to look at another area which will help this function. Retransmissions and duplicate ACKs are part of TCPs functionality which helps prevent packet loss.  If you have network or server performance problems then it’s likely you will…

Read More

Troubleshooting a Slow Network – Introduction


Over the years I’ve worked in IT, this is probably the most common and frustrating issue I’ve seen in corporate networks. It’s often extremely hard to solve and often has a huge impact on all aspects of an organisation. When you sit and watch a domain logon take over twenty minutes regularly on a state…

Read More

Address Resolution Protocol – ARP


On a network both physical and logical addresses play a role in communication.   The use of logical addresses allows for the communication between more than one single network and also access to devices that may not be directly connected to that network.  Whereas Physical addresses are primarily used to facilitate communication on the single…

Read More

Learning to Dissect Packets


For many years if you wanted to analyse the data on your network you needed expensive tools and software.  However nowadays this isn’t the case, there are now a whole host of free tools which you can use in addition or even instead of the commercial options.  It might sounds a little unnecessary to actually…

Read More

Using TCPdump with NIDS


There’s little point setting up some complicated and expensive NIDS (Network Intrusion Detection System) if you don’t analyse the information it provides.  One of then most popular and useful tools to help with this task is that of TCPdump which provides a host of uses especially when used alongside a signature base detection system.  When…

Read More

Using Quantitative Risk Assessment


One of the most difficult questions that has to be answered in implementing anything new in an IT infrastructure is what is the risk.  It doesn’t matter if it’s a few lines of code, a new server or a complete new department – there is a risk and assessing this is crucial to any implementation….

Read More

SNMP – the Management Protocol


SNMP (Simple Network Management Protocol) is very easy, yet powerful however once demystified it is far more accessible. SNMP was originally created back in 1988. The truth is that originally it was simply considered to be a fundamental method by which you can ascertain the use of bandwidth in addition to network data. Notwithstanding its name,…

Read More

Why You Should Use a VPN


There is one piece of software that almost every single global company installs on their laptops and mobile devices, it’s the VPN client software.   A Virtual Private Network is effectively an encrypted tunnel which operates between the client and a VPN server.   The reason that they are considered essential in the corporate world…

Read More

← OLDER POSTS