IT Trenches:

Networking


August 26, 2010  6:08 PM

Online devices, applications and threats grow – predictions for 2013



Posted by: Troy Tate
analysis, application, application development, application management, Cisco, device management, information security, mobile devices, mobility, social networking, threats, trends, vulnerability, vulnerability assessment

The Cisco 2010 Midyear Security Report shows some staggering statistics about the number of online devices, mobile applications and security threats projected to be around in 2013.

  • In 2007...

March 29, 2010  2:14 PM

Wireshark Book – Coffee & a Quickie



Posted by: Troy Tate
ethereal, Laura Chappell, network, network analysis, packet analysis, packet capture, protocol analysis, technology reference, wireshark

Laura Chappell,


January 26, 2010  1:28 PM

Nmap 5.20 released – 150+ improvements



Posted by: Troy Tate
fingerprinting, information security, information security administration, network administration, network scanning, network toolkit, nmap, os fingerprinting, os identification, penetration testing, Security

In July 2009, Fyodor released Nmap 5.0 with over 600 changes.This was the first major release since 1997. On January 20, 2010, Nmap 5.20 was released with an additional


December 18, 2009  8:33 PM

Broadcast traffic told me the network was contaminated



Posted by: Troy Tate
broadcast, network analysis, packet capture, protocol analysis, troubleshooting

If you don't know what's broadcasting on your network, you don't know your network! I recently discovered a rogue network cross-connection on a network. The cross connect was from an unmanaged internet connection to a private LAN. The way I discovered this was using Wireshark and listening for all...


December 18, 2009  7:58 PM

Search engine for telnet, ftp, ssh and http brings hackers closer to your doorstep



Posted by: Troy Tate
ftp, http, information security, infosec, malware, network, network protection, reconnaisance, scanning, search, search engine, ssh, telnet, web

Google is obviously a great tool for everyone including hackers. If you have never heard of Google Hacking, then I highly recommend you take a look at what might be exposed and found through a Google search. This

Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 15, 2009  9:38 PM

Use NMap to quickly scan a large subnet for MAC or IP addresses – even firewalled systems!



Posted by: Troy Tate
ARP, arp scan, education, network scan, network tool, nmap, ping, tool, utility

One of my favorite tools to manage a population of network hosts is the excellent tool NMap. It can easily and quickly be used to scan a large subnet for live hosts. I recently scanned a /16 or 65,535 hosts subnet in about 30 minutes with NMap detecting...


November 30, 2009  4:03 PM

Check your IT environment health using this FREE Microsoft tool



Posted by: Troy Tate
Active Directory, dns, domain controller, event logs, file replication, free tool, Microsoft, Microsoft Windows, network health, small enterprise, troubleshooting, Windows

Microsoft has an excellent free tool for checking the health of your IT environment in small to medium size networks (up to 20 servers and 500 clients). This tool will scan the environment and report on health items such as:

  • Network connectivity between servers
  • Active...


November 19, 2009  3:21 PM

Online Nmap video training – scan your network



Posted by: Troy Tate
blackhat, education, free training, hacker, host identification, network analysis, network testing, nmap, online training, penetration testing, scanning, training, training resources, vulnerability scanning, whitehat

Nmap has been around a long time. It has become an indispensable tool for identifying systems, services and vulnerabilities on a network. It has also been featured in movies like The Matrix...


November 11, 2009  6:31 PM

Free online IT education resource



Posted by: Troy Tate
Adobe, certification, Database, information technology reference, information technology tutorial, IT education, Linux, MAC OS, Macromedia, Microsoft, Microsoft education, network technology education, Networking, programming, sql, technology education, tutorial, XML

I recently came across an excellent IT education resource that is free. It is the eTutorials.org website. According to the website it is a source of  thousands online tutorials, useful tips, articles, and researched...


October 23, 2009  6:40 PM

Stuck on a blacklist? Sue the big guys! Cisco, Microsoft, Comcast, TRUSTe



Posted by: Troy Tate
blacklist, Cisco, Comcast, eavesdropping, lawsuit, Microsoft, net neutrality, privacy, TRUSTe, wiretapping

A web based tool I frequently use is called Network-Tools.com. I frequently use the site to lookup names associated with IP addresses and whois information and ping to the addresses. A recent notice on the page raised my concern. The notice...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: