Monday, January 19, 2009

Free Network Monitoring Software

From Tony Bradley, CISSP, MCSE2k, MCSA, A+, for About.com
See More About:

* free software
* free network monitoring
* network monitor

Security Ads
Virus Scan AntiVirus Software AntiVirus Freeware Spyware Software Virus Software
Bandwidth Monitor
Daily, weekly, and monthly information logs * Compatible with all versions of windows * Options and graphs for capped users * Multiple users and selectable adapters * Network and dial-up connections * English, Italian, German, and Russian

FREEping - Server Pinging

Do you want to know if all your Windows 2003-XP-2000-NT servers are alive and pinging? Do you want to receive a pop-up message when one of them is not running anymore? FREEping is a free ping software utility which will ping all your IP addresses in free-definable intervals. FREEping automatically pings in the background and shows statistics for each pinged hosts. When a host stops responding, FREEping can send popup messages to a specified destination.

Look@LAN
Auto-Detect of Network Settings * Scanning of one or more Scan-Ranges * Complete Management of Network Profiles * World's Faster Node Discovery Scan * Automatic and Manual Network Configuration * Network Statistics and Graphs * Profile Export (text and HTML) * Advanced Trapping * Network Log * Network Tree View * Proof Single Node Scan * Reporting

Servers Alive

Servers Alive is an end-to-end network monitor program. Among the many checks it can do: it can monitor any Winsock service, ping a host, check if an NT service/process is running, check the available disk space on a server, retrieve a URL, check your database engine, and more.

Sysinternals CPUMon

Use this advanced tool to read the performance counters of Pentium, Pentium Pro and Pentium II processors. Not for the faint of heart, CPUMon is intended for those with a good familiarity of processor architecture. Version 2.0 is integrated with Perfmon.

Sysinternals DebugView
Another first from Sysinternals: This program intercepts calls made to DbgPrint by device drivers and OutputDebugString made by Win32 programs. It allows for viewing and recording of debug session output on your local machine or across the Internet without an active debugger.

Sysinternals DiskMon
This utility captures all hard disk activity or acts like a software disk activity light in your system tray.

Sysinternals FileMon for Linux
This monitoring tool lets you see all file system activity in real-time. Versions exist for all versions of WinNT/2K, Windows 9x/Me, Windows XP 64-bit Edition, and Linux.

Sysinternals FileMon for Windows
This monitoring tool lets you see all file system activity in real-time. It works on all versions of WinNT/2K/XP, Windows 9x/Me, Windows XP 64-bit Edition, and Linux.

Sysinternals Handle
This handy command-line utility will show you what files are open by which processes, and much more.

Sysinternals ListDLLs
List all the DLLs that are currently loaded, including where they are loaded and their version numbers. Version 2.0 prints the full path names of loaded modules.

Sysinternals NTFSInfo Use NTFSInfo to see detailed information about NTFS volumes, including the size and location of the Master File Table (MFT) and MFT-zone, as well as the sizes of the NTFS meta-data files.

Sysinternals PMon This is an NT Gui/device driver program that watches process and thread creation and deletion, as well as context swaps if running on a multiprocessing or checked kernel.

Sysinternals PortMon Monitor serial and parallel port activity with this advanced monitoring tool. It knows about all standard serial and parallel IOCTLs and even shows you a portion of the data being sent and received. Version 3.x has powerful new UI enhancements and advanced filtering capabilities.

Sysinternals Process Explorer Find out what files, registry keys and other objects processes have open, which DLLs they have loaded, and more. This uniquely powerful utility will even show you who owns each process.

Sysinternals PSTools Suite
The PsTools suite includes command-line utilities for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and more.

Sysinternals RegMon

This monitoring tool lets you see all Registry activity in real-time. It works on all versions of WinNT/2K, Windows 9x/Me and Windows 64-bit.

Sysinternals TCPView
See all open TCP and UDP endpoints. On Windows NT, 2000 and XP TCPView even displays the name of the process that owns each endpoint. Full source to the command-line version of this tool, netstatp, is included.

Sysinternals TDIMon
See TCP and UDP activity in real-time with this advanced network API monitoring tool.

Sysinternals TokenMon
Watch security-related activity, including logon, logoff, privilege usage, and impersonation with this monitoring tool. Full source code included.

Sysinternals WinObj
The ultimate Object Manager namespace viewer is here. Version 2.0 has significant UI enhancements, knows about more object types, and is integrated with NT's native security editors.

Go To: http://netsecurity.about.com/cs/hackertools/a/aafreenetmon.htm

Top 100 Network Security Tools

After the tremendously successful 2000 and 2003 security tools surveys, Insecure.Org is delighted to release this 2006 survey. I (Fyodor) asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed me to expand the list to 100 tools, and even subdivide them into categories. Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. I discovered several powerful new tools this way. I also point newbies to this site whenever they write me saying “I don't know where to start”.

Respondents were allowed to list open source or commercial tools on any platform. Commercial tools are noted as such in the list below. No votes for the Nmap Security Scanner were counted because the survey was taken on a Nmap mailing list. This audience also biases the list slightly toward “attack” hacking tools rather than defensive ones.

Each tool is described by one ore more attributes:

Visit to: http://sectools.org

What is 802.1x?

Understanding what the IEEE 802.1x standard is and why you should care means understanding three separate concepts: PPP, EAP and 802.1x itself.

Most people are familiar with PPP - Point-to-Point Protocol. PPP is most commonly used for dial-up Internet access. PPP is also used by some ISPs for DSL and cable modem authentication, in the form of PPP over Ethernet. PPP is part of Layer 2 Tunneling Protocol, a core part of Microsoft's secure remote access solution for Windows 2000 and beyond.

PPP evolved beyond its original use as a dial-up access method and iis now used all over the Internet. One piece of PPP defines an authentication mechanism. With dial-up Internet access, that's the username and password you're used to using. PPP authentication is used to identify the user at the other end of the PPP line before giving them access.

Most enterprises want to do more for security than simply employing usernames and passwords for access, so a new authentication protocol, called the Extensible Authentication Protocol (EAP), was designed. EAP sits inside of PPP's authentication protocol and provides a generalized framework for several different authentication methods. EAP is supposed to head off proprietary authentication systems and let everything from passwords to challenge-response tokens and public-key infrastructure certificates all work smoothly.

With a standardized EAP, interoperability and compatibility of authentication methods becomes simpler. For example, when you dial a remote-access server and use EAP as part of your PPP connection, the RAS doesn't need to know any of the details about your authentication system. Only you and the authentication server have to be coordinated. By supporting EAP authentication a RAS server gets out of the business of acting as middle man, and just packages and repackages EAP packets to hand off to a RADIUS server that will do the actual authentication.

This brings us to the IEEE 802.1x standard, which is simply a standard for passing EAP over a wired or wireless LAN. With 802.1x, you package EAP messages in Ethernet frames and don't use PPP. It's authentication and nothing more. That's desirable in situations in which the rest of PPP isn't needed, where you're using protocols other than TCP/IP, or where the overhead and complexity of using PPP is undesirable.

802.1x uses three terms that you need to know. The user or client that wants to be authenticated is called a supplicant. The actual server doing the authentication, typically a RADIUS server, is called the authentication server. And the device in between, such as a wireless access point, is called the authenticator. One of the key points of 802.1x is that the authenticator can be simple and dumb - all of the brains have to be in the supplicant and the authentication server. This makes 802.1x ideal for wireless access points, which are typically small and have little memory and processing power.

The protocol in 802.1x is called EAP encapsulation over LANs (EAPOL). It is currently defined for Ethernet-like LANs including 802.11 wireless, as well as token ring LANs such as FDDI. EAPOL is not particularly sophisticated. There are a number of modes of operation, but the most common case would look something like this:

The authenticator sends an "EAP-Request/Identity" packet to the supplicant as soon as it detects that the link is active (e.g., the supplicant system has associated with the access point).

1. The supplicant sends an "EAP-Response/Identity" packet to the authenticator, which is then passed on to the authentication (RADIUS) server.
2. The authentication server sends back a challenge to the authenticator, such as with a token password system. The authenticator unpacks this from IP and repackages it into EAPOL and sends it to the supplicant. Different authentication methods will vary this message and the total number of messages. EAP supports client-only authentication and strong mutual authentication. Only strong mutual authentication is considered appropriate for the wireless case.
3. The supplicant responds to the challenge via the authenticator and passes the response onto the authentication server.
4. If the supplicant provides proper identity, the authentication server responds with a success message, which is then passed onto the supplicant. The authenticator now allows access to the LAN- - possibly restricted based on attributes that came back from the authentication server. For example, the authenticator might switch the supplicant to a particular virtual LAN or install a set of firewall rules.

Down and dirty with Wireless LAN security
The 3-year-old Wired Equivalent Privacy (WEP) protocol has been discredited so thoroughly that its authentication and encryption capabilities are not considered sufficient for use in enterprise networks. In response to the WEP fiasco, many wireless LAN vendors have latched onto IEEE 802.1x standard to help authenticate and secure both wireless and wired LANs. The wildcard with 802.1x protocol is interoperability.a particular virtual LAN or install a set of firewall rules.

Down and dirty with Wireless LAN security
The 3-year-old Wired Equivalent Privacy (WEP) protocol has been discredited so thoroughly that its authentication and encryption capabilities are not considered sufficient for use in enterprise networks. In response to the WEP fiasco, many wireless LAN vendors have latched onto IEEE 802.1x standard to help authenticate and secure both wireless and wired LANs. The wildcard with 802.1x protocol is interoperability.

Download PDF:
802.1x Authentication Active Directory.

Voice and Video IP Communication

Press Room
Voice and Video IP Communication technology and solutions
Global IP Solutions’ products are the world’s most widely-deployed technology for processing real-time voice and video over IP communication. The company is the recognized leader in delivering world-class voice and video processing technology for IP networks. GIPS software has been downloaded more than 800 million times and delivers the right amount of functionality for voice and video IP communication, with enough flexibility to be easily integrated in virtually any solution. By leveraging GIPS’ cutting-edge technology, service providers, applications developers and hardware manufacturers can bring to market highly-differentiated products to reduce churn and increase customer satisfaction.
Voice and Video IP Communication Feature Articles
GIPS Inks Agreement with Saba SoftwareGlobal IP Solutions (GIPS) has announced that it has signed an agreement with Saba Software, a global provider of strategic human capital management (HCM) software and services.11.19.2008GIPS Publishes Desktop Video Conferencing White PaperGlobal IP Solutions (GIPS), a provider of IP multimedia processing solutions, has released a new white paper outlining the complex challenges around desktop video conferencing.11.3.2008Global IP Solutions and RADVISION to Discuss Video ConferencingVideo conferencing is a technology that has been toyed around with for years, and until recently received little recognition. Living and working in the business world today, is not as affordable or easy as it used to be. Over the summer, as gas prices hovered around $5 a gallon across the country, everyone was forced to take a second look at their spending and look for ways to dramatically cut back.10.29.2008Global IP Solutions Releases New White Paper on Desktop Video ConferencingGlobal IP Solutions, a provider of IP multimedia processing solutions, today revealed its most recent white paper, "Desktop Video Conferencing: Better Than You Think - Ready For Every Desktop Today and in High Definition Tomorrow."10.29.2008Analog Devices Intros Blackfin BF51x SeriesAnalog Devices has introduced the Blackfin BF51x series, the latest addition to its low-power convergent-processor family. The new Blackfin processors include the BF512, BF514, BF516 and BF518.10.28.2008Global IP Solutions' VoiceEngine to Power Locaweb SoftphonesReinforcing its market strength as an IP multimedia processing solutions provider, Global IP Solutions today announced that its GIPS VoiceEngine technology will power Locaweb softphones.10.28.2008

AdvancedVoIP

Welcome to Advanced VoIP - your one stop shop for a wide range of telecom billing and OSS products ideally suited for telecommunication service providers, Internet telephony service providers and ISPs. Our high-end solutions are designed with business model flexibility and are tested at various levels to ensure reliability and accuracy for the most important element of your business - your billing. With over 300 satisfied customers worldwide, we offer you a complete suite of billing solutions catering the whole range of your requirements.

If you are an enterprise level company and looking for solutions for your medium sized telecom business, you can take a look at Enterprise Solutions. For large sized companies such as telecom operators, we offer Carrier Class Telecom Billing Solutions.

Advanced VoIP offers Partnership Opportunities for telecom systems integrators, resellers and turn key solution providers.

You can always contact us for further information regarding our products. Advanced VoIP believes in highest levels of customer satisfaction and has therefore imparted state-of-the-art technical support facilities for its valuable customers. If you are a returning customer or looking for support, please visit Technical Support. Advanced VoIP offers 24/7 technical support to its valued customers.

VoIP billing,Billing system,VoIP Billing Solution,VoIP OSS,VoIP Solution with Asterisk,
VoIP and Telecom Billing, Prepaid calling card, Hotspot,Asterisk, Interconnect Billing,
ISP billing, Hotspot software, Wifi Billing solution ,broadband Billing, Internet Billing
, DSL Billing, Wireless Billing,Call shop billing solution,CDMA Solution, CDMA SMSC,
Local Loop Billing,LDI billing,CDR monitoring,WiMax Billing,Wifi Billing,
Triple Play,radius billing server and AAA,carrier grade billing solution,
Interconnect Billing software,H.323 VoIP Dialer,SIP software, Radius Server,
VoIP Radius,Telecom Solution, OSS and BSS

Related Link:http://www.advancedvoip.com/

What is Microsoft Office SharePoint Server?

Microsoft Office SharePoint Server 2007 is a new server program that is part of the 2007 Microsoft Office system. Your organization can use Office SharePoint Server 2007 to facilitate collaboration, provide content management features, implement business processes, and supply access to information that is essential to organizational goals and processes.
You can quickly create SharePoint sites that support specific content publishing, content management, records management, or business intelligence needs. You can also conduct effective searches for people, documents, and data, participate in forms-driven business processes, and access and analyze large amounts of business data.
Microsoft Office SharePoint Server 2007 Capabilities
Microsoft Office SharePoint Server 2007 provides a single, integrated location where employees can efficiently collaborate with team members, find organizational resources, search for experts and corporate information, manage content and workflow, and leverage business insight to make better-informed decisions.

Collaboration Allow teams to work together effectively, collaborate on and publish documents, maintain task lists, implement workflows, and share information through the use of wikis and blogs.

Portals Create a personal MySite portal to share information with others and personalize the user experience and content of an enterprise Web site based on the user’s profile.

Enterprise Search Quickly and easily find people, expertise, and content in business applications.

Enterprise Content Management Create and manage documents, records, and Web content.

Business Process and Forms Create workflows and electronic forms to automate and streamline your business processes.

Business Intelligence Allow information workers to easily access critical business information, analyze and view data, and publish reports to make more informed decisions.

BlogCatalog

Technology Blogs - BlogCatalog Blog Directory