Search:

Type: Posts; User: Tech Manager; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.00 seconds.

  1. The Cheap Way to Keep Spoofed Email Out of Your Inbox

    Email spoofing is on the rise. Country IP Blocks estimates that spoofing may account for more than 80% of all spam and malicious email traffic. Email spoofing is defined as the forgery of an email...
  2. Replies
    0
    Views
    1,331

    Create Your Own Security Logs

    Here is a tutorial I wrote about creating a custom security log using PHP. It includes definitions for all the terms, $_SERVER, REMOTE_ADDR, REQUEST_METHOD, PHP_SELF, QUERY_STRING,REQUEST_TIME fopen,...
  3. Identifying the Network and Broadcast Address of a Subnet

    For those of you learning networking, I've written a tutorial called Identifying the Network and Broadcast Address of a Subnet. In it I provide the basic steps to identify the Network and Broadcast...
  4. It certainly wasn't meant to be condescending. As...

    It certainly wasn't meant to be condescending. As for being misleading, may I ask you how it is misleading?
  5. Replies
    0
    Views
    1,868

    Random Password Generation

    I've just completed the programming of a webform that generates random passwords (for those of us concerned about security).

    The page offers the following choices:

    Number of passwords: 1-99
    ...
  6. Replies
    0
    Views
    2,103

    I am looking for a PHP algorithm/script

    I am a professional PHP programmer experiencing brain freeze.

    I am looking for a script/algorithm that I can interface with a database to create consolidated/aggregated IP blocks.

    Here is the...
  7. Latest Injection Attack: Declare, Set and Cast

    I have been monitoring one of the latest injection hack attempts since early July. The attack is pervasive and appears to be powered through one or several of the larger Botnets. The attack, whether...
  8. Use Server Log Data to Improve Your Security

    With the escalating tide of targeted website attacks, server administrators and webmasters would be well advised to examine their logs to predict, prevent and interdict enemy attacks. These attacks...
  9. Want to Know the country origin of your website and network traffic?

    Have you ever wanted to know where the IP traffic in your logfiles originates? I am developing an IP log submission tool to provide users with the global origins of their traffic. This tool is...
  10. Replies
    8
    Views
    2,043

    Joe: What media are you using to connect? Cat5,...

    Joe: What media are you using to connect? Cat5, Cat6, fiber...?
  11. Improved Access to Country IP Blocks Data

    We've just completed round one of the Country IP Blocks web redesign and would love to have some feedback.

    In a nutshell, Country IP Blocks is a set of tools for webmasters, network and server...
  12. There is also a tutorial available called:...

    There is also a tutorial available called: Converting Octets to Binary and Decimal
  13. Easily Convert IP Address into Binary and Decimal

    Country IP Blocks is proud to announce the release of their new IPv4 Octet to binary to decimal calculator. This easy to use IP calculator allows a user to submit an IP address and then view a full...
  14. The United States has more computers and networks...

    The United States has more computers and networks than any other country, but per capita sends out less spam than most.

    Among the several networks/servers I manage, the spam volume is highest from...
  15. Russia and China the new Spam Superpowers

    I made an outlandish statement more than a year ago. I said Russia is one of the most prolific countries at spewing out spam, malware and other serious threats to the sanity of the internet. SOPHOS...
  16. Your type of connection, whether Synchronous or...

    Your type of connection, whether Synchronous or Asynchronous is only one aspect of your download speeds. Bandwidth/trasnfer data can be affected by your OS, NIC, firewall, router, cable/dsl modem,...
  17. Thank you.

    Thank you.
  18. Here's the rest of the article: Proactive Network...

    Here's the rest of the article: Proactive Network Security: Blocking Bogons

    You can subscribe to my Information Technology Manager RSS Feed here.

    And of course, you can get the latest Bogon...
  19. Proactive Network Security: Blocking Bogons

    Network security is a never ending process of staying in touch and in tune with inbound and outbound traffic. Network administrators have their hands so full reacting to the latest security threats...
  20. Replies
    12
    Views
    1,423

    Freejoy: I am not seeing major issues in the...

    Freejoy:

    I am not seeing major issues in the traceroute you provided. The route looks fairly clean with the possible exception of some minor slowdown where I would expect some slowdown. Your...
  21. Replies
    2
    Views
    10,678

    Cooldude911, as an I.T. Manager and Network...

    Cooldude911, as an I.T. Manager and Network Manager/admin, I would be more than a little perturbed to discover that some little weasel (generically speaking/nothing personal intended) was attempting...
  22. It is possible that you are holding on to a...

    It is possible that you are holding on to a previous DSL settings. Are you doing a release and renew through ipconfig?
  23. Replies
    3
    Views
    2,886

    There are several issues that could be causing...

    There are several issues that could be causing the problems you describe. But, I'll focus on one clue you provided:



    Assuming you have the exact same problem with both machines, at the same...
  24. Replies
    5
    Views
    942

    In general I agree with YeOldeStonecat but more...

    In general I agree with YeOldeStonecat but more information is required.

    I have a few questions for you:

    1.) Is the network you descrive part of a commercial/business operation.
    2.) Please...
  25. Replies
    2
    Views
    5,318

    Your question is a bit vague. You will experience...

    Your question is a bit vague. You will experience an incoming and outgoing slowdown whenever you cross your firewall boundary (assuming your firewall is positioned between your router and ISP)...
  26. Replies
    2
    Views
    560

    There are some significant differences between...

    There are some significant differences between switches and hubs. While I grant you most home users could probably get away with using them interchangeably, a larger network would be more restrictive...
  27. Replies
    1
    Views
    572

    The network you are talking about is a reserved...

    The network you are talking about is a reserved network held by IANA. In other words it is not available for public consumption. I would suggest you do a little bit of network research before you...
  28. Replies
    6
    Views
    1,971

    There are several different ways of capturing the...

    There are several different ways of capturing the data related to "the bloke." The data is available in the server and firewall (if you have one) logs. You can also add some ASP or PHP capture...
  29. Replies
    3
    Views
    501

    You are exactly right on.

    You are exactly right on.
  30. The 192.168.0.0/16 is reserved for private...

    The 192.168.0.0/16 is reserved for private networks. A good example of a private network is one, two, three or more home computers connected to DSL or Cable through a cheap router.

    While it is...
Results 1 to 30 of 31
Page 1 of 2 1 2