IT Trenches:

Networking


March 10, 2009  4:47 PM

Saving Money & Stopping spam – change domain names



Posted by: Troy Tate
cost reduction, cost savings, domains, email, internet, operations, planning, spam, WAN

Are you getting lots of SPAM? Is your organization's internet link being saturated due to tons of inbound spam and maybe outbound non-delivery notices for invalid addresses? About 3 years ago, ours was too.

March 6, 2009  4:45 PM

Network speed & capacity are NOT the same



Posted by: Troy Tate
bandwidth, capacity, network band, network speed, throughput

There is often a misunderstanding of what network speed is versus capacity. The speed of data transfer is not just a function of the capacity (bandwidth) of the link, but of the distance between the endpoints. To find distances: Go to


February 23, 2009  4:20 PM

IP address / Identity management & protecting youth from exploitation by adults



Posted by: Troy Tate
House, identity management, IP address management, ISP, Law, logging, Security, Senate, service providers

There is a recent bill introduced in both the House and Senate to strengthen current legislation addressing online child...


February 19, 2009  1:47 PM

Is protocol analysis or network management your thing?



Posted by: Troy Tate
education, ethereal, network analysis, packet analysis, packet capture, protocol analysis, tcp/ip, trace files, training, wireshark

Laura Chappell (the Viral Bitgirl) has announced that Sharkfest 09 registration is open and all registered attendees get a FREE AIRPCAP ADAPTER (US $198)! Sharkfest is the...


January 29, 2009  9:13 PM

Nifty tools for tracking down that “interesting” network traffic



Posted by: Troy Tate
Cisco, LAN, malware, Microsoft, network analysis, network monitor, network troubleshooting, pstools, Routers, Security, Sysinternals, toolkit, troubleshooting, WAN

My previous posting was meant to help you determine the source of potentially dangerous...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


January 26, 2009  7:14 PM

Do you manage a firewall and want to find the source of malicious network activity? – Check out the Internet Malicious Activity Map



Posted by: Troy Tate
activity, Firewalls, graph, internet, malicious activity, malware, network, network security, research, Security, Subnet, WWW

For those of you who manage your own network, you have to consider the strength of the firewall at your network perimiter, the knowledge and skills of those who manage it. You also have to provide technology that can help protect your mobile users. Part of building that secure environment is...


January 9, 2009  4:38 PM

PROTOCOL analysis vs protocol analysis (with a small p)



Posted by: Troy Tate
Microsoft, Microsoft Exchange, network monitor, OSI model, patches, protocol analysis, SMTP, tcp, wireshark

Recently we had an issue at a site where outbound messages larger than 1MB were backing up in the outbound message queue. The messages were tagged with a 421 4.4.2 Connection dropped error. This was a puzzling issue since the smart relay host was on the local LAN, and in fact, on...


January 6, 2009  4:45 PM

Swiss-army knife for public network testing



Posted by: Troy Tate
connectivity testing, crypto, crypto testing, cryptography, dns, hash, icmp, ping, public network, ssh, SSL, tcp, testing, toolkit, tools, tracert, typosquatting, udp, website

Sometimes it is necessary to test connectivity outside of your private company network. There are several resources I use. I will share a couple of those with you in this posting. One of my favorite and most frequently used sites is

Bookmark and Share     1 Comment     RSS Feed     Email a friend


December 10, 2008  1:33 PM

Did you see this? – Latest Laura Chappell Newsletter



Posted by: Troy Tate
analysis, education, howto, IT education, Metrics, Monitoring, network analysis, Networking, packet capture, performance monitoring, reporting, tools, troubleshooting, wireshark


December 10, 2008  1:19 PM

The larger world of free technical support – Craigslist computer forum



Posted by: Troy Tate
anti-virus, awareness, documentation, education, howto, IT education, malware, Networking, online identity, patching, professional, risk, tools, troubleshooting, web, website

I recently came across the computer forums on Craigslist. I had heard of Craigslist previously but was not aware of the significant scope of what it offers besides classified ads. I'm not suggesting that folks leave ITKE to the Craigslist computer forums for support - far from that. I have been...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: