September 18, 2015
News roundup: Additional research shows a Cisco router implant affects more devices than originally reported. Plus: Let's Encrypt's first cert issued; Tor in the library; the mitigated (but not fixed) iOS AirDrop vulnerability.
April 14, 2015
The new 'Redirect to SMB' vulnerability is an update to an 18-year-old flaw that can lead to man-in-the-middle attacks on all versions of Windows.
August 14, 2014
MultiPath TCP security is nonexistent today. Firewalls and DPI can't recognize it, let alone inspect it. As the protocol powers IoT and mobility, the security industry will need to respond.
March 28, 2014
The bundle of IOS security patches addresses a total of six denial-of-service vulnerabilities in Cisco's enterprise networking products.
TCP Get Started
Bring yourself up to speed with our introductory content
VMware's vSphere 6 is one of the first major products to support NFS 4.1, but the benefits may not outweigh the risks to use this storage protocol. Continue Reading
Windows Sysinternals can help admins manage, diagnose, troubleshoot and monitor a Windows environment. Here's a look at the different utilities. Continue Reading
UC expert Carrie Higbie explains the purpose of Port 9875 and why a network manager would need to direct traffic to this port in a VoIP setup. Continue Reading
Evaluate TCP Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert David Jacobs discusses whether software-defined networking will render application delivery controllers obsolete or complement evolving SDN. Continue Reading
Evaluating intrusion detection technology requires an understanding of its capabilities. Get help with getting started on an intrusion system program design and uncover technical considerations your enterprise needs to know. Continue Reading
Multipath TCP could soon bring improved redundancy and uptime to a network near you, but what does it mean for network security? Expert Kevin Beaver explains. Continue Reading
Learn to apply best practices and optimize your operations.
The QUIC protocol may or may not become a standard, but either way, use of the protocol could provide a performance boost for Web and mobile apps. Continue Reading
TCP offloads and backups can create issues during a Hyper-V live migration if not addressed. Here’s how to avoid running into problems. Continue Reading
In today's competitive world, application performance is more important than ever. Enterprises are relying on a new generation of tools designed to let them diagnose application performance management issues -- identifying whether performance problems stem from the network or the application itself. As mobile and the cloud become more pervasive, engineers and network administrators are also using APM platforms and software to ensure that voice, video and data traffic meet strict performance guidelines.
This technical guide reviews the key features enterprises need in their application performance management (APM) tools. These tools today must be able to cope with a hybrid service-delivery environment that is heavily dependent on east-west flows among clouds of service components. To do this requires that the tools be located near the services; this guide explains how to accomplish that, and also reviews other key features of modern APM tools. In addition, other chapters delve deeply into what can go wrong in app performance and ways to troubleshoot when they do.
In this guide, networking pros will find answers to many of their app performance problems, as well as detailed, actionable advice.Continue Reading
Problem Solve TCP Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Learn how to determine if quality of service will handle a congested link or if the capacity of your network must be increased. Continue Reading
TCP port 445 -- a traditional Microsoft networking port -- is a common attack vector. Network security expert Kevin Beaver explains how to detect and defend against port 445 attacks. Continue Reading
By investing in new technology, a research consortium avoids the big headache caused by big data in transit. Continue Reading