Archives
- August 2020 (1)
- October 2019 (2)
- September 2018 (1)
- June 2018 (1)
- April 2018 (3)
- January 2018 (2)
- December 2017 (3)
- August 2017 (2)
- July 2017 (1)
- February 2017 (1)
- January 2017 (5)
- September 2016 (2)
- January 2016 (1)
- November 2015 (1)
- September 2015 (2)
- October 2014 (1)
- April 2014 (1)
- March 2014 (2)
- December 2013 (1)
- November 2013 (1)
- October 2013 (3)
- September 2013 (2)
- July 2013 (3)
- May 2013 (2)
- March 2013 (2)
- February 2013 (2)
- January 2013 (1)
- December 2012 (5)
- November 2012 (5)
- October 2012 (4)
- September 2012 (3)
- August 2012 (7)
- July 2012 (8)
- June 2012 (2)
- May 2012 (2)
- April 2012 (4)
- March 2012 (1)
- January 2012 (1)
- December 2011 (1)
- November 2011 (1)
- October 2011 (2)
- September 2011 (1)
- August 2011 (3)
- July 2011 (4)
Monthly Archives: July 2012
Capture Files from Data Streams with Wireshark
Most networkers are familiar with the basic capabilities available in Wireshark. Packet captures are very helpful when troubleshooting a host of network problems. One feature folks may be less familiar with in Wireshark is it’s ability to actually save files that were seen as part of a packet capture. Continue reading
Disable Domain Lookup on Typos
Don’t you hate when you type a command incorrectly and your Cisco IOS device seems to take forever to time out and give you back control? There is a way around this without fully disabling domain lockups! Continue reading
Routing Protocol Basics
I wanted to take the opportunity to post some core basics for those of you just getting started with Cisco and routing protocols. The table below shows the protocol, the type of routing protocal and the default administrative distance of that protocol.
Matching Processes to Listening Ports on Windows
Do you really know what is running in the background on your Windows PC or server? Not knowing is how security holes perpetuate themselves into serious issues. While ignorance may be blissful someone else may be poking around your networking looking for a way in. With Windows systems it’s easy to list listening sockets that could present a risk. Once you know what’s listening on your system you can then hunt down the process and validate its existence. In many cases the services are part of windows or otherwise acceptable services or applications. To start issue a “netstat” command with … Continue reading