How do you monitor your network traffic? Of course using MRTG, you might say. Yes, that’s true, MRTG does an excellent job of monitoring traffic across networks and devices (router/switches). But when you see an abnormal traffic in MRTG, how…
How do you monitor your network traffic? Of course using MRTG, you might say. Yes, that’s true, MRTG does an excellent job of monitoring traffic across networks and devices (router/switches). But when you see an abnormal traffic in MRTG, how…
I was surprised to read this (Nepali), it says that Ram Bahadur Bomjon, the Buddha Boy attacked and injured a guy with his sword. The blog entry refers to a Nepalese newspaper “Naya Patrika”, according to which Bomjon attacked and…
After switching to a mac, I tried many desktop password managers, and had written about Password Managers for OS X, which got a lot of attention. It’s needless to mention the importance of using a password manager since we use…
I remember being admitted to a boarding school when I was in class 6 (around 12 years old). From that time I’ve been living away from home (most of the time). Trying to make new homes, a home away from…
The benefits of designing and testing complex networks in simulated environments are obvious to network professionals and companies. It lets them test the network configurations before implementing it in the real world, and the good thing is that, they can…
There are many things you can and should do to keep your system and network secure. As the saying goes — “Security is not a single event or a product, it’s a process”. So, you’ve to keep up with all…
Recent Comments