=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management Dec. 3, 2003 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSOR: META Group White Paper: Managing IP Telephony http://searchNetworking.com/r/0,,22000,00.htm?track=NL-314&concordcommunication ___________________________________________________________________ IN THIS ISSUE | Table of Contents
1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Today's Featured Tip: Network auditing with dsniff 2.3 - Extend your wireless networks - Terminating a system administrator 2. ESSENTIAL LINKS - Article: VoIP call-monitoring a work in progress - Chapter of the Week: Designing Network Security - Budgeting for 2004 - The best and brightest, at your service ___________________________________________________________________ **************>> Sponsored by Concord Communications <<************ Managing IP telephony is a complex but essential endeavor for any organization planning to adopt IP telephony or any VoIP-based service. Detailed planning of the management systems is critical and must be concurrent with the rollout of the telephony technology itself. Download this free white paper and learn how specialized IP telephony management products will be a practical necessity. Click here: http://searchNetworking.com/r/0,,22000,00.htm?track=NL-314&concordcommunication =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP NETWORK AUDITING WITH DSNIFF 2.3 Barrie Sosinsky To audit network traffic you need to employ a program like a sniffer to listen to your traffic and analyze the results. If you've ever used a network monitor such as Windows' or Solaris', then you are familiar with sniffers. Commercial sniffers gather statistics and can work with various threshold and defined events. One collection of tools that has been around a few years is dsniff 2.3 (http://www.monkey.org/~dugsong/dsniff/). This is actually a set of tools that not only audit, but test for network penetration. Read the entire tip here: http://www.searchNetworking.com/tip/1,289483,sid7_gci939442,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= EXTEND YOUR WIRELESS NETWORKS | Barrie Sosinsky So you got a wireless network, (access point, wireless NICs, etc.) and now you find out that not everyone can get onto the network, because the signal strengths just aren't great enough to get through the walls, up to the next floor, and so forth. So? Make the signals stronger. Here's how: http://www.searchNetworking.com/tip/1,289483,sid7_gci914718,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TERMINATING A SYSTEM ADMINISTRATOR | Mike Chapple Terminating an employee is one of management's most unpleasant tasks. It can also be a minefield from an IT perspective. If you're a security professional, you're undoubtedly familiar with your organization's procedures for handling the termination, resignation or reassignment of a non-technical employee. You may even have a checklist in place for when a member of the IT team leaves the organization. But do you have a policy for how to handle the sudden termination of a key system administrator? Let's take a look at a few steps you can follow to ease the process: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci939145,00.html?track=NL-314 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= VoIP CALL-MONITORING A WORK IN PROGRESS | SearchNetworking.com A new generation of products that monitor voice-call quality on IP networks signals the maturity of enterprise VoIP technology. But monitoring voice quality is hardly an exact science. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci939153,00.html?track=NL-314 Read VoIP success stories... http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci938379,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= CHAPTER OF THE WEEK | SearchNetworking.com Chapter 5 - Threats in an enterprise network This chapter from Designing Network Security, written by Merike Kaeo, helps you identify which areas of the network are more susceptible to network intruders and who is the common attacker. The common trend in the past has been to trust users internal to the corporate network and to distrust connections originating from the Internet or from remote access networks using VPNs, dial-in modems, and ISDN lines. It is important to place trust in the employees internal to the network and in authorized people trying to use internal network resources from outside the corporation. However, trust must also be weighed with reality. (This excerpt is reprinted with permission from Cisco Press, copyright 2003.) Click here to download your free chapter: http://searchnetworking.techtarget.com/content/0,290959,sid7_gci913144,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SURVEY: BUDGETING FOR 2004 | SearchNetworking.com It's December already, and we're in the thick of evaluating the past year and preparing for 2004. We're sure you're doing the same, and we'd like to be involved in your planning process. What are the projects you've decided to pursue next year? Are you beefing up security yet again, adding a wireless LAN, or finally finishing your disaster recovery plan? Let us know by taking our two-minute Networking 2004 Survey. The information you provide us with will help us to develop online content that fits your needs. Take the survey here: http://www.insightexpress.com/ix/showSurvey.asp?id=64523&accessCode=1684222091& =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= THE BEST AND BRIGHTEST, AT YOUR SERVICE | SearchNetworking.com experts Need an expert opinion? We've got it! SearchNetworking.com boasts a panel of 17 industry experts that answer your networking questions, write tips and articles, host webcasts, moderate forums and keep us up to date on what's important out in the trenches. With titles like CTO, vice president, director of technology, research director, network consultant, chief security architect and senior network engineer, you can bet that our experts are the best and brightest in the networking world and they're all here willing to help you do the best job possible. Stop by to learn more about our experts and interact with them. Meet all our experts: http://searchnetworking.techtarget.com/ateExpertsBios/0,289621,sid7,00.html?track=NL-314 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314 To sponsor this or any other TechTarget newsletter e-mail Gabrielle DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED] ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This newsletter is published by TechTarget, the most targeted IT media. http://www.techtarget.com?track=NL-314 Copyright 2003 TechTarget. All rights reserved. ____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Reply to this e-mail with REMOVE in the Subject line - OR - Go to unsubscribe: http://SearchTechTarget.com/u?cid=473007&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.