All General

Does the FBI iPhone Hack Fall Under Ethical Hacking?

The Federal Bureau of Investigation recently cracked a locked iPhone in order to procure evidence against one of the San Bernardino shooters.  Now, the...

Juniper MX240 IPFIX Support | Direction Problems

The other day I was helping an engineer who was trying to provide some Juniper MX240 IPFIX support when we ran into some “flow...

Why Is My Computer Connecting to Akamai Technologies?

Once in a while, I perform a cleanup of my personal computer that involves removing unnecessary and unwanted applications.  It’s a huge headache, because...

Cisco Nexus 9000 NetFlow Configuration

Cisco Nexus 9000 NetFlow Configuration Recently I’ve received numerous request for a sample on the Cisco Nexus 9000 NetFlow configuration. This device has a...

Use Your Surveillance Cameras to Investigate Malware

If you suspect a malware breach and want to investigate the history of a specific host, how do you do it? For most of us, the...

VMware DFW IPFIX Support

The VMware DFW (Distributed Firewall) is part of the NSX feature set and provides a way to manage which connections are permitted or denied...

Cisco ASA FireSIGHT Reporting

We will be demonstrating our new Cisco ASA FireSIGHT reporting at CiscoLIVE! in Berlin Germany this month. This appliances provides the deepest and richest...

Find IP Addresses in Seconds across Terabytes of NetFlow and IPFIX

Do you need to search for a single IP address across trillions of flows?  The ideal system for enterprise NetFlow collection should allow you...

LinkedIn Malware : Safe Browsing

As we enter 2016 please remember to browse safely. Many users have a tendency to click on links without considering the risks of their...

ZyXEL sFlow Configuration

Today we’ll focus on  ZyXEL sFlow Configuration, in order for the switch to monitor traffic and export sFlow to a collector for analysis. Supporting our international...