Solarwinds and Nagios XI are two SNMP monitoring suites, that offer a wide array of tools and features for making network management simple and efficient. This article will compare the two, and outline performance in key subject areas. The current version of Solarwinds at the time this article is written is 12.2. The current version […]
We’ve compared many programs with each other and we noticed that PRTG vs Nagios is a popular comparison that many are looking to breakdown. Here’s our Analysis of the two network monitoring giants.
Finding Vulnerabilities and Exploits/Holes in your network infrastructure should be something you Do before a Hacker finds them – We’ve highlighted the Top Tools for Network Security Assessment, Vulnerability Scanning and much more!
Generally speaking, one can break down the lifecycle of a Network into three parts: Design Implementation/Configuration Support/Maintenance Network Monitoring falls under the 3rd part of this life-cycle. It allows you to keep an eye on the devices in your network (routers, switches, servers, applications, etc.) so that you can take appropriate actions in the event […]
WordPress is one of the most popular website platforms for bloggers and businesses as of 2017. It is easy to use and flexible as well as highly supported by developers and designers, but its security should also be considered. WordPress Security Issues It is a sad fact that a great many websites have been hacked […]
[Ed. Note: This is a wee bit dated. SSH is widely available for Windows now, and should be used instead of telnet for administration. Still, telnet can be handy for testing. For an updated version of this for Windows 2000, see this article.] We wrote a tip about using IIS and rconsole to remotely manage […]
Two very useful remote administration tools are the Remote Console Server and the Web Administration tool. Both of these tools come on the NT 4.0 Server resource kit CD. To install the Remote Console, go into control panel -> network -> services tab -> add -> remote access service, and point to the ..\..\netadmin\rconsole directory […]
There is a limit on the number of concurrent socket connections that an application can accept in BSD, Windows, and other operating systems. This is set at compile time, but it can be overridden. Here is a discussion of this limitation by Microsoft, and here is further discussion. One application that is sticking this on […]
Here is a diagram of three servers: What we want to do is create a tunnel with SSH so that 10.50.101.100 can go directly to 10.50.100.72. There is no routing between the networks. The box in between is dual-homed and acting as a security buffer between the 10.50.100 and 10.50.101 networks. After we set up […]
Nmap can be used to fingerprint operating systems. Here is a typical session: [root@srv-1 usr-1]# nmap -O –min_rtt_timeout=6000 10.50.100.1-80 Starting nmap 3.70 ( http://www.insecure.org/nmap/ ) at 2006-05-05 12:49 PDT Interesting ports on 10.50.100.1: (The 1656 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 22/tcp open ssh 111/tcp open rpcbind 6000/tcp […]