=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
Dec. 3, 2003
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSOR:
META Group White Paper: Managing IP Telephony
http://searchNetworking.com/r/0,,22000,00.htm?track=NL-314&concordcommunication
___________________________________________________________________
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Today's Featured Tip: Network auditing with dsniff 2.3 
   - Extend your wireless networks
   - Terminating a system administrator

2. ESSENTIAL LINKS
   - Article: VoIP call-monitoring a work in progress
   - Chapter of the Week: Designing Network Security
   - Budgeting for 2004
   - The best and brightest, at your service
___________________________________________________________________ 
**************>> Sponsored by Concord Communications <<************ 

Managing IP telephony is a complex but essential endeavor for any
organization planning to adopt IP telephony or any VoIP-based
service. Detailed planning of the management systems is critical and
must be concurrent with the rollout of the telephony technology
itself.  Download this free white paper and learn how specialized IP
telephony management products will be a practical necessity.  Click
here:
http://searchNetworking.com/r/0,,22000,00.htm?track=NL-314&concordcommunication 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

NETWORK AUDITING WITH DSNIFF 2.3 
Barrie Sosinsky
 
To audit network traffic you need to employ a program like a sniffer
to listen to your traffic and analyze the results. If you've ever
used a network monitor such as Windows' or Solaris', then you are
familiar with sniffers. Commercial sniffers gather statistics and can
work with various threshold and defined events. One collection of
tools that has been around a few years is dsniff 2.3
(http://www.monkey.org/~dugsong/dsniff/). This is actually a set of
tools that not only audit, but test for network penetration.
 
Read the entire tip here: 
http://www.searchNetworking.com/tip/1,289483,sid7_gci939442,00.html?track=NL-314

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
EXTEND YOUR WIRELESS NETWORKS | Barrie Sosinsky
 
So you got a wireless network, (access point, wireless NICs, etc.)
and now you find out that not everyone can get onto the network,
because the signal strengths just aren't great enough to get through
the walls, up to the next floor, and so forth. So? Make the signals
stronger. 

Here's how:
http://www.searchNetworking.com/tip/1,289483,sid7_gci914718,00.html?track=NL-314

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TERMINATING A SYSTEM ADMINISTRATOR | Mike Chapple

Terminating an employee is one of management's most unpleasant tasks.
It can also be a minefield from an IT perspective. If you're a
security professional, you're undoubtedly familiar with your
organization's procedures for handling the termination, resignation
or reassignment of a non-technical employee. You may even have a
checklist in place for when a member of the IT team leaves the
organization. But do you have a policy for how to handle the sudden
termination of a key system administrator?

Let's take a look at a few steps you can follow to ease the process:
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci939145,00.html?track=NL-314
  

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
VoIP CALL-MONITORING A WORK IN PROGRESS | SearchNetworking.com

A new generation of products that monitor voice-call quality on IP
networks signals the maturity of enterprise VoIP technology. But
monitoring voice quality is hardly an exact science.
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci939153,00.html?track=NL-314
 

Read VoIP success stories...
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci938379,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
CHAPTER OF THE WEEK | SearchNetworking.com

Chapter 5 - Threats in an enterprise network 

This chapter from Designing Network Security, written by Merike Kaeo,
helps you identify which areas of the network are more susceptible to
network intruders and who is the common attacker. The common trend in
the past has been to trust users internal to the corporate network
and to distrust connections originating from the Internet or from
remote access networks using VPNs, dial-in modems, and ISDN lines. It
is important to place trust in the employees internal to the network
and in authorized people trying to use internal network resources
from outside the corporation. However, trust must also be weighed
with reality. (This excerpt is reprinted with permission from Cisco
Press, copyright 2003.)

Click here to download your free chapter:
http://searchnetworking.techtarget.com/content/0,290959,sid7_gci913144,00.html?track=NL-314

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SURVEY: BUDGETING FOR 2004 | SearchNetworking.com

It's December already, and we're in the thick of evaluating the past
year and preparing for 2004. We're sure you're doing the same, and
we'd like to be involved in your planning process. 

What are the projects you've decided to pursue next year? Are you
beefing up security yet again, adding a wireless LAN, or finally
finishing your disaster recovery plan? Let us know by taking our
two-minute Networking 2004 Survey. The information you provide us
with will help us to develop online content that fits your needs. 

Take the survey here:
http://www.insightexpress.com/ix/showSurvey.asp?id=64523&accessCode=1684222091&;

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
THE BEST AND BRIGHTEST, AT YOUR SERVICE | SearchNetworking.com
experts

Need an expert opinion? We've got it! SearchNetworking.com boasts a
panel of 17 industry experts that answer your networking questions,
write tips and articles, host webcasts, moderate forums and keep us
up to date on what's important out in the trenches. With titles like
CTO, vice president, director of technology, research director,
network consultant, chief security architect and senior network
engineer, you can bet that our experts are the best and brightest in
the networking world and they're all here willing to help you do the
best job possible. Stop by to learn more about our experts and
interact with them.

Meet all our experts:
http://searchnetworking.techtarget.com/ateExpertsBios/0,289621,sid7,00.html?track=NL-314



___________________________________________________________________
****************  CONTACT SEARCHNETWORKING.COM   *****************

E-mail us at mailto:[EMAIL PROTECTED]

Click here for specific contact information and to meet our editorial
team:
http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314

To sponsor this or any other TechTarget newsletter e-mail Gabrielle
DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED]

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media.  http://www.techtarget.com?track=NL-314

Copyright 2003 TechTarget. All rights reserved.
____________________________________________________________________

To unsubscribe from "Network and Systems Management Tip":

Reply to this e-mail with REMOVE in the Subject line
 - OR -
Go to unsubscribe:
http://SearchTechTarget.com/u?cid=473007&track=NL-314
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.


Reply via email to