If you’re working in the small world of Internet Providers or perform any other business related to Internet, you are for sure aware of the major outage affecting Colt since yesterday in Europe (or you’re living on the moon!) Checkout the article on theregister.co.uk. I received feedback from several customers
In the long list of new features brought by the new iPhone firmware 3.0 comes “tethering” in my personal top-ten! What’s this? Tethering means a way to connect to the Internet from a device (usually a laptop computer using a mobile device as modem/router. More info are available on Wikipedia.
The Internet is a wonderful media, based on strong routing protocols like BGP. Originally, the Internet was designed to be “unbreakable” (of course, it is not): If a path to a network is unavailable, an alternative (or backup) path will be used. BGP is designed in this way: based on
“Know your Network!” All network administrators have to know what append on their networks: what are the flows of information between hosts, to Internet, between VLANs. This is a requirement for security or provisioning purposes but also for business when the amount of IP traffic has to be billed to
SIP (or Session Initiation Protocol is a protocol commonly used in VoIP applications. Here is a good introduction of SIP (within a funny context): VoIP Demystified: SIP.
NMon provides a new appliance ‘nBox Recorder‘ or ‘The Packet-to-Disk Recorder‘. The goal is simple: lot of security analyzis are based on packet captures. This box just performs a simple but critical tasks: It captures the traffic and stores it under the pcap format. Then? Just take your time to
The Organization for Economic Co-operation and Development (OECD) published a document to warn goverments and business about the near-future IPv4 addresses shortage. Actually 85% of the IPv4 address space of already assigned (total space is 2^32 == 4,294,967,296) and should be fully assigned by 2011! Of course, a lot of
Are you multi-homed? In short terms, are you connected to the Internet via more than one Internet Service Provider? Today, more and more business activities rely on Internet: corporabe website, emails, online shopping. Loosing your Internet connectivity is a major risk. Could you evaluate it? What will happen if your
Not a very long time ago, security was still focussed on the external side of networks and all bad guys playing on the Internet. Now, the perimeter security (DMZ, firewalls, IDS and other toys) is performed by mature technologies and devices to protect your network against external attacks (but never
A new free service is available to analysts, network administrators, students or any other people involved in security: openpacket.org. The goal of this new service is to provide network traces for further analyze. This can be very useful to analyze how work well-known worms or any other kind of attack.