Whether it’s after a long day at work, a rainy weekend, or when a new season of your favorite TV show is released, we’ve all been on a Netflix bender (*cough* Stranger Things *cough*). What we probably don’t think about is how all of that content is being … [Read more...] about ISPs and Netflix Open Connect
While working with users, I’ve noticed scenarios where filtering traffic based on a CIDR or an IP range just isn’t enough control. I wanted to explore another option—wildcard netmask filters! Let’s walk through how they work, and how they can be applied. … [Read more...] about Wildcard Mask Filters Within Scrutinizer
Did you know that ignorance is bliss? When I was in school, I didn’t think about cybersecurity at all, and had a devil-may-care approach to internet browsing. But since my first day at Plixer a few years ago, I’ve become much more aware of keeping my personal … [Read more...] about Why is My Computer Connecting to amazonaws.com?
In my last post, I discussed how to monitor SSL traffic. Today, I thought I would continue down the road of traffic monitoring by taking a look at FTP traffic. Specifically, I would like to discuss how you can monitor FTP traffic, and how you can use NetFlow … [Read more...] about How to monitor FTP traffic with NetFlow
With today's networks getting larger and larger and with the need to accommodate end-user devices, locking down the network without affecting performance is becoming a major concern. This blog will cover how some malicious end users often try to obfuscate … [Read more...] about Detecting Application Tunneling with NetFlow
With the ever-increasing scope of networks, engineers often need tools to help manage the workload. IPAM systems can organize your address space and DNS, while a network traffic analytics solution like Scrutinizer can help watch all activity. These systems are … [Read more...] about Network Management Integration with Infoblox IPAM
The Digital Millennium Copyright Act (DMCA) was passed on October 12, 1998 as a means to mitigate the effect torrent use was having on the music and film industries. In my opinion, the most famous use of this act was in the year 2000 when A&M Recordings, … [Read more...] about Use Flow Data to Track Down DMCA Violations
We have blogged on topics surrounding the SD WAN industry a few times. In one post, we provided a list of SD WAN vendors and highlighted the companies that are exporting NetFlow and IPFIX. We even built reports for the proprietary exports from both Cisco … [Read more...] about SD WAN Problems with Visibility
One of the greatest benefits of NetFlow collection for traffic analysis, is we’re provided with the ability to visualize the flow of our network traffic. This is a huge improvement over the traditional method of parsing row after row of big data in a … [Read more...] about Sankey Flow Graph
Once in a while, I perform a cleanup of my personal computer that involves removing unnecessary and unwanted applications. It’s a huge headache, because I have to read dozens of names I don’t recognize and somehow distinguish between the crucial processes and … [Read more...] about Why Is My Computer Connecting to Akamai Technologies?