You may need to monitor, or mirror, a port on an Ethernet switch to debug a data protocol, check for inappropriate use of your network or resolve a security breach. Using a monitor port on a network ...
Automated network monitoring involves scanning for device component failures and examining traffic patterns. Learn how to lighten the load of your network management responsibilities. Network device ...
In the cybersecurity world, testing for the existence of exploitable vulnerabilities isn’t always an exact science. Checking for open ports (CIS Control 9 - Limitation and Control of Network Ports, ...
In a previous article, I wrote about/confessed what a mess my home/home lab networking was and discussed various tools I used to discover what devices were connected to my home network and where they ...
The history of TCP port 80 started a long time ago when the IANA assigned TCP port 80 for HTTP activity and TCP port 443 for secure HTTP (HTTPS). HTTP was designed as a protocol to transport requests ...
The Raspberry Pi is an amazing little inexpensive Linux-based computer. It has been remarkably successful and there have been over Raspberry Pi systems sold. The Raspberry Pi can also be a useful tool ...
Does anyone do this? I recently turned this on in my monitoring system, thinking to track down network line issues that I could see in some of the switch logs. Its proven to be a huge source of alerts ...