Unchanging Internet Concepts

Internet technology continues to change at a rapid pace, but the fundamentals are the same. Most networks are still using TCP/IP. Networks are designed and analyzed using protocol stacks. And data packet switching is still the lifeblood of the network. In this post, we take a look at some fundamental concepts in networking that the […]

Top External Monitoring Tools in 2020

What is external monitoring? In a general sense, it means regularly checking on something to find out what is happening. It’s a way to gather information. In a large network, it means observing and recording data from a wide variety of devices and applications. We should clarify that monitoring and management are not the same […]

What Is Load Balancing — And Do I Need It?

Unless your job encompasses application availability or delivery, you may not be aware of what load balancing is, what it does, or whether it is even a necessary component. As to the last part of that statement, the answer is simple:  It is absolutely necessary. In today’s demanding online world, load balancing helps to ensure […]

What is an Application Delivery Network?

Today’s networks are focused on results. It’s not enough to have active connections with no errors. Customers expect that IT management teams do their best to deliver the applications that are essential to the success of the enterprise. The goal is complete service assurance. The environment in which these efforts at faultless application delivery take […]

How to create an SPF record

What is SPF? Sender Policy Framework (SPF) is a protocol designed to help combat forged email. It allows the owner of a domain to specify which hosts are authorized to send email from that domain. Full details can be found in RFC 7208. How does SPF work? Domain owners publish SPF records in the Domain […]

The Basics of DCIM

We have remarked several times in this space about the tremendous changes in the data center in such a short period of time. Not only are device footprints shrinking and functionalities converging, but the way that hardware and software are managed has become more comprehensive and streamlined. Now the same thing that has happening to […]

What You Should Know About APIs

We all know how a computer user interface (UI) works — at least in general terms. Humans interact with digital machines using input devices, and we watch everything real-time on computer monitors. When we think of user input, we usually think of Input devices like a mouse, keyboard, touchscreen, trackball, or pointing stick. But we […]

And You Thought Your Transactions Were Safe: SSL Based Attacks

Your plaintext internet traffic is subject to attack. You already knew this.  And it probably won’t surprise you to learn that your encrypted internet traffic is also vulnerable. It’s an unfortunate situation. Carl Herberger, Radware’s VP for Security Solutions, says that the prospect of SSL-based attacks “makes a folly of our existing security infrastructure”. The […]

Cookie Manipulation and Poisoning

Everybody loves cookies. They’re hard to resist — sweet and delicious. So why is something as flavorless as a computer cookie blessed with the same name? You can blame Lou Monulli. He created the technology for Netscape Communications and received a patent for it in 1998. In the beginning, nobody knew that cookies were being […]

Attack of the Botnet Zombies

There have been plenty of zombie movies over the past few years. The plots are similar — the undead stalk the living — and the productions are generally not Oscar material. But somehow the threat hits a nerve with the general public. To illustrate a threat of a different kind, let’s come up with a […]