IT Trenches:

Networking


October 15, 2009  6:44 PM

Free Training – Laura Chappell presents: Wireshark 201 Jumpstart – Filtering on the Good, the Bad, the Ugly



Posted by: Troy Tate
analysis, education, ethereal, howto, IT education, Laura Chappell, Metrics, Monitoring, network analysis, Networking, packet analysis, packet capture, performance monitoring, protocol analysis, reporting, tcp/ip, tools, trace files, training, troubleshooting, wireshark

Laura Chappel, the BitGirl, is at it again with another in her series of Wireshark Jumpstart webinars. The next one is called

October 7, 2009  6:38 PM

IT services and The Three Chinese Curses



Posted by: Troy Tate
bot, botnet, career, information security, information technology, infosec, IT, network analysis, professional, Security, service level, support, trojan

In America, October is the time when haunting, evil spirits and curses come to mind. Earlier today I posted a blog entry titled Can IT education bring an end to the...

Bookmark and Share     1 Comment     RSS Feed     Email a friend


September 30, 2009  1:36 PM

I resemble that award winning case study – wait, it IS me!



Posted by: Troy Tate
case study, frame relay, industry award, information security, ipsec, mpls, network management, remote access, Security, security management, SSL, ssl vpn, vpn, WAN

Have you ever wondered if vendor case studies are actually solutions to real life issues or if they are stories about compensated organizations using a particular vendor solution? Well, I am here to tell you that I know of at least one case study that is about an organization addressing real-life...


September 30, 2009  1:06 PM

Where do TCP resets come from?



Posted by: Troy Tate
application performance, network analysis, network management, network monitoring, network performance, packet capture, performance analysis, protocol analysis, tcp, udp

I recently came across an excellent article on the topic of TCP resets. TCP is a connection-oriented protocol as opposed to the connectionless nature of UDP. So, if there are TCP resets on your network, this is not a bad thing and is just inherent in the protocol. Without TCP resets, a host could...


September 30, 2009  12:33 PM

Heard in passing – IT Trenches support at its finest



Posted by: Troy Tate
education, humor, network performance, network support, user education

Okay - if you support networks and have to explain why the network is slow or application performance is not what the users expect, why not use some of the following responses? These statements may or may not have been used in real life. What responses have you given to users when there really...


September 25, 2009  3:15 PM

Performance monitoring dashboard – fping and URL ping



Posted by: Troy Tate
application management, application performance, icmp, network design, network diagnosis, network management, network performance, performance analysis, ping, url ping, web services, webserver

In part one of this series, I discussed ping and pathping. These tools are good for some interactive realtime testing. However, what do you do when you...


September 14, 2009  1:49 PM

Microsoft does not patch vulnerability for supported version of Windows



Posted by: Troy Tate
information security, Microsoft, Microsoft support, patches, risk, risk management, support, tcp, tcp-ip, tcp/ip, threat, vulnerability, Windows, windows 2000

Last week was the September issue of Microsoft "patch Tuesday". The September 2009 Microsoft Security Bulletin lists a number of vulnerabilities. Microsoft held the


August 28, 2009  4:57 PM

Performance monitoring dashboard – designing and instrumentation



Posted by: Troy Tate
application management, application performance, network design, network diagnosis, network management, network performance, pathping, ping

One of my biggest challenges as a network manager is when users cry "the network is slow". Some of you may have tools available to you where you can instantly dig in and see what the user might be seeing. There are some vendors out there with application and network monitoring tools.


July 29, 2009  5:51 PM

Network Computing magazine is BACK! – WAN Optimization issue



Posted by: Troy Tate
Network Computing, online magazine, online publication, optimization, WAN, wan optimization

The Network Computing magazine was always one of my favorite trade publications. It covered a lot of very technical things from basic to advanced levels. I was very disappointed when they stopped publication. So, it is with a lot of excitement that I am sharing with ITKE members that Network...


July 24, 2009  6:03 PM

Using Wireshark to analyze a bot infected host



Posted by: Troy Tate
bot, data capture, education, ethereal, information security, Laura Chappell, network analysis, network security, packet analysis, packet capture, Security, tutorial, wireshark

My favorite Bitgirl (Laura Chappell) is at it again in this 15 minute presentation. She came across a host on a network that appears to be infected with some bot application. Take a few...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: