This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Network monitoring Tools

Featured Tool: Ping Plotter Ping Plotter is a marvelous tool that pings and graphs an endpoint and all hops in between. It can be useful in troubleshooting packet loss and latency. What is unique about Ping Plotter is it can identify current problems but can also be watchful of new issues that occur. The current version has multiple alert instances and is capable of sending e-mail, logging to a text file, or playing a wav file for specified parameters.

Another is feature is the graphical representation of packet loss and/or latency. You can see the results over any specified time period. Besides the visual graph inside of Ping Plotter, you can export either raw data or have a screen shots saved at automatic time intervals. All ping intervals are completely customizable and any hop can be graphed along with the endpoint.

The Ping Plotter website includes a tutorials and documentation on interpreting the results. There is also a support forum for the product. Ping Plotter is a very affordable at $15 and is available as a 30 day trial. Several websites that rate shareware have given Ping Plotter high marks. It also received an honorable mention in MCP Magazine. Users at Broadband Reports frequently use Ping Plotter to located poor DSL or Cable connections. Gamers are also concerned packet loss and latency and will find this tool invaluable. The beta version of Ping Plotter will be adding more features and better performance.

In our testing, we used Ping Plotter to ping watch the connection to a low traffic website on the end if a dedicated T1. The time interval was set to 1 minute as not to flood the hops or endpoint with packets. The display interval was set for one hour and an image was automatically saved each hour showing the results graphically. The captured results were surprising to say the least. While the cable connection is very good, it isn't perfect. Future plans will include using Ping Plotter with an FTP program to automatically upload the hourly results for everyone to view.





Best Pen Test Linux Distributions

Linux distributions are often customized to perform many specialized tasks cater to a particular industry, hobby or business. Security Penetration testing is one such niche where professional (and hobbyists) use customized Linux distributions with the whole purpose of doing security tests on networks and personal computer (hopefully with permission). Most of these distribution are live CDs which can be used without having to install them to your computer. Today we will take a look at some of best Pen-test distributions out there.



1) BackTrack: Backtrack is the most widely known pen-test distribution out there. The latest release (4 Beta) has been ported to Debian/Ubuntu from Slackware and now can be installed locally as a full distribution and tools can be updated using Backtrack repositories. Backtrack includes more than 300+ security tools.







2) Knoppix STD: As the name suggests this distribution is based on Knoppix and STD stands for Security Tools Distribution. This distribution didn’t get any update (like most pen-test distros) in a long time and might not work on some new hardwares but they have a fairly good collection of tools. xfce fluxbox is used for desktop environment.





3) nUbuntu: Based on Ubuntu and fluxbox, nUbuntu is a fairly new and active pen-test distribution. They have partnered with an Italian IT security company for future nUbuntu certification and training.





4) Network Security Toolkit: NST is a Fedora based Live distribution and unlike some other pen-test distro NST can be used under virtual machine without any network configuration problems (from my experience). NST also have a unique Web User Interface to access tools and manage configurations.





5) PEENTO: A Gentoo based pen-test live cd (you could have guessed) that actually looks very nice. They are using Enlightenment for DE and has quite a few unique pen-test tools including GPU based cracking software pyrit.

Top 10 Black Hat Hackers

black-hat is a term in computing for someone who compromises the security of a system without permission from an authorized party, usually with the intent of accessing computers connected to the network. The term white hat is used for a person who is ethically opposed to the abuse of computer systems. The term cracker was coined by Richard Stallman to provide an alternative to using the existing word hacker for this meaning. The somewhat similar activity of defeating copy prevention devices in software which may or may not be legal in a country’s laws is actually software cracking.

(Source)(In No Particular Order) 1)

jonathan jamesJonathan James: James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, “I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off.”

James’ major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive e-mails and capture employee usernames and passwords.

James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, “The software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, “The code itself was crappy . . .certainly not worth $1.7 million like they claimed.”

Given the extent of his intrusions, if James, also known as “c0mrade,” had been an adult he likely would have served at least ten years. Instead, he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole. Today, James asserts that he’s learned his lesson and might start a computer security company.

2)

adrian-lamoAdrian Lamo: Lamo’s claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the “homeless hacker,” he used Internet connections at Kinko’s, coffee shops and libraries to do his intrusions. In a profile article, “He Hacks by Day, Squats by Night,” Lamo reflects, “I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional.”

Lamo’s intrusions consisted mainly of penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings. His hits include Yahoo!, Bank of America, Citigroup and Cingular. When white hat hackers are hired by companies to do penetration testing, it’s legal. What Lamo did is not.

When he broke into The New York Times’ intranet, things got serious. He added himself to a list of experts and viewed personal information on contributors, including Social Security numbers. Lamo also hacked into The Times’ LexisNexis account to research high-profile subject matter.

For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.

3)

kevin mitnickKevin Mitnick: A self-proclaimed “hacker poster boy,” Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as “the most wanted computer criminal in United States history.” His exploits were detailed in two movies: Freedom Downtime and Takedown.

Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation’s computer network and stealing software.

Mitnick’s mischief got serious when he went on a two and a half year “coast-to-coast hacking spree.” The CNN article, “Legendary computer hacker released from prison,” explains that “he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system.” He then hacked into computer expert and fellow hacker Tsutomu Shimomura’s home computer, which led to his undoing.

Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.

4)

kevin puolsonKevin Poulsen: Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio’s KIIS-FM phone lines, which earned him a brand new Porsche, among other items. Law enforcement dubbed him “the Hannibal Lecter of computer crime.”

Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.

His hacking specialty, however, revolved around telephones. Poulsen’s most famous hack, KIIS-FM, was accomplished by taking over all of the station’s phone lines. In a related feat, Poulsen also “reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency.” Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.

Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 sex offenders with MySpace profiles.

5)

morrisRobert Tappan Morris: Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.

Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years’ probation, 400 hours of community service and a fined $10,500.

Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.

6)

levin2Mass media claimed at the time he was a mathematician and had a degree in biochemistry from Saint Petersburg State Institute of Technology.

According to the coverage, in 1994 Levin accessed the accounts of several large corporate customers of Citibank via their dial-up wire transfer service (Financial Institutions Citibank Cash Manager) and transferred funds to accounts set up by accomplices in Finland, the United States, the Netherlands, Germany and Israel.

In 2005 an alleged member of the former St. Petersburg hacker group, claiming to be one of the original Citibank penetrators, published under the name ArkanoiD a memorandum on popular Provider.net.ru website dedicated to telecom market.[1] According to him, Levin was not actually a scientist (mathematician, biologist or the like) but a kind of ordinary system administrator who managed to get hands on the ready data about how to penetrate in Citibank machines and then exploit them.

ArkanoiD emphasized all the communications were carried over X.25 network and the Internet was not involved. ArkanoiD’s group in 1994 found out Citibank systems were unprotected and it spent several weeks examining the structure of the bank’s USA-based networks remotely. Members of the group played around with systems’ tools (e.g. were installing and running games) and were unnoticed by the bank’s staff. Penetrators did not plan to conduct a robbery for their personal safety and stopped their activities at some time. Someone of them later handed over the crucial access data to Levin (reportedly for the stated $100).

7)

loydIn human terms, it’s a case of a trusted, 11-year employee gone bad. Lloyd built the Novell NetWare computer network at Omega South and then blew it up with a software time bomb after he fell from corporate grace and was ultimately fired for performance and behavioral problems. Today, he faces a sentence of up to five years in prison.

In a business sense, the loss of its key manufacturing programs cost Omega, which builds measurement and instrumentation devices for customers like NASA and the U.S. Navy, more than $10 million, dislodged its footing in the industry and eventually led to 80 layoffs.

The 1996 incident set off an intense investigation that brought together the U.S. Secret Service and one of the world’s top data recovery and forensics experts to piece together the evidence that would ultimately lead to Lloyd’s arrest and conviction

8)

MELIS1David Smith, the author of the Melissa virus, was facing nearly 40 years in jail when he decided to cooperate with the FBI.

Facing jail time, public wrath and a fortune in potential fines, the 30-year-old sender of the fast-spreading Melissa computer virus did what hundreds of criminals have done before. He agreed to go undercover.

Federal court documents unsealed at the request of the Associated Press show that for almost two years, Smith - then out on bail - worked mostly full time cruising the dark recesses of the Internet while the FBI paid his tab.

What did the FBI get? A windfall of information about malicious code senders, leading directly to two major international arrests and pre-empting other attacks, according to federal prosecutors.

What did Smith get? Just 20 months in federal prison, which was about two years less than the minimum sentencing requirement, and about 38 years less than he faced when initially charged.

Sometimes it takes a thief to catch a thief, said former federal prosecutor Elliot Turrini, who handled Smith’s case and agreed to the reduced sentence.

About 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage, but Smith is the only person to go to federal prison in the United States for sending one.

9)

mafiaThe computer hacker known as “Mafiaboy,” who crippled several major Internet sites including CNN, arrives in court Thursday, Jan. 18, 2001 in Montreal, Canada. He pleaded guilty on Thursday to 55 charges of mischief. The trial of the 16-year-old Montrealer, who can not be identified under Canadian law, was set to begin Thursday on 66 charges relating to attacks last year on several major Web sites, as well as security breaches of other sites at institutions such as Yale and Harvard.

10)

Abene9_2005Mark Abene (born 1972), better known by his pseudonym Phiber Optik, is a computer security hacker from New York City. Phiber Optik was once a member of the Hacker Groups Legion of Doom and Masters of Deception. In 1994, he served a one-year prison sentence for conspiracy and unauthorized access to computer and telephone systems.

Phiber Optik was a high-profile hacker in the early 1990s, appearing in The New York Times, Harper’s, Esquire, in debates and on television. Phiber Optik is an important figure in the 1995 non-fiction book Masters of Deception — The Gang that Ruled Cyberspace

Sources:

http://en.wikipedia.org/wiki/Main_Page

http://eyeball-series.org/hacker/hacker-eyeball.htm

http://www.itsecurity.com/features/top-10-famous-hackers-042407/

how to Use your Mobile Phone as a Boarding Pass

I don’t know about you, but every time I’m in an airport I find it almost impossible to keep up with all of the necessary paperwork: my passport, tickets, itinerary, boarding passes, etc. It would sure be great if someone would invent a simple electronic method of capturing all this information — something that could be easily carried in a coat pocket, with no paperwork, no tickets or boarding passes.



Wait a minute; they already have. It’s called your cell phone.

According to news.com, Continental airlines is currently experimenting with a new system that allows passengers to check in using their cell phone, and have an electronic boarding pass sent directly to their phones, allowing them to pass through airport security and board their flight without using any paper tickets or passes whatsoever.

boardingpass.jpgOf course ticketless flights had been around for a long time, mostly using a passenger’s credit card as identification. But using a mobile phone as your ticket and boarding pass has never been tried before. That is, until Continental began experimenting with the procedure this year.

Other airlines, including Continental, Delta, and American have already allowed passengers to check in the other cell phone, but they were still required to print out a ticket or boarding pass before being allowed through security and onto the plane. Continental’s new strategy is an entirely electronic ticketing and boarding process, that will use no paper at all.

So far, Continental’s passengers seem to be responding very favorably to the cell phone check-in and boarding pass process. Research shows that more and more travellers have been printing their boarding passes from their home computers to avoid the long flight check-in lines. But for those traveling on business or in a strange town for the first time, it is not always easy to access a printer.

By digitizing the entire process, and having both your ticket and your boarding pass linked to your cell phone, passengers can simply arrive at the airport and go directly to security. After that, they simply board the plane using the electronic boarding pass on their cell phone. It certainly sounds like a much quicker process than most of us go through when trying to make a flight.

So far, Continental is only using the cell phone ticket and boarding pass procedure on flights from the airline’s hub in Houston. But the results so far been very positive, so the airline will likely expand the service to other airports by late spring.

owTo Use your mobile phone as a remote control for your Ubuntu system

Have you ever been attending presentations envying all the time the guy in front using his mobile phone to switch the slides? Or dreamed of sitting on the sofa and controlling your music player without having to go to the computer?

At least I did and so I searched on the net for possible solutions. Most of the projects are either outdated, only work for certain phones or certain software on the computer. Finally I discovered anyremote from Mike Fedotov, which you can download from the project's site at sourceforge:



http://sourceforge.net/projects/anyremote/



The great thing is that it works for different connections like bluetooth, infrared or serial cable (though I only tested bluetooth) and, according to the project notes, for all kinds of phones. Several configuration files for different software, e.g. amarok, xmms, etc. are included, and it is easy to write new ones.



NB:

  • This was tested on Ubuntu 6.10 (32bit).

  • There is also the KDE version kAnyRemote, which provides a little panel applet to change configuration files. I also tried this flavor, as I have KDE installed. But I'll focus on anyremote, the CLI version, as it has the same functionality, and you don't need to install any KDE libraries.

  • I only describe using bluetooth and assume you have already set up a bluetooth connection between your computer and your phone.

  • I assume you have a java enabled phone (JSR-82), I haven't investigated yet how this works if your phone doesn't support java.

  • This post will be edited if questions or suggestions come up.

Steps to take:
  1. Install dependencies

    I can't tell you exactly what you need, because I encountered only one missing package, and that was libbluetooth-dev. I guess you need the bluetooth libraries for compilation even if you'll use another kind of connection. So I'll simply list all the blue* packages that are installed on my system. Corrections considering unnecessary packages or missing packages are welcome! You can either use synaptic or aptitude or apt-get on the command line to install the packages, so for instance you have to enter:
    Code:
    $ sudo aptitude install checkinstall gcc build-essential other_missing_packages
    • gcc

    • build-essential

    • bluetooth

    • bluez-cups

    • bluez-hcidump

    • bluez-passkey-gnome

    • bluez-pin

    • bluez-utils

    • gnome-bluetooth

    • libbluetooth2

    • libbluetooth2-dev


  2. Install anyremote

    In case you have already compiled from source code before, this is nothing new to you. If not: Don't be afraid, there is no dark magic involved After downloading anyremote-*.tar.gz, go to the download directory, decompress the file, change to the now extracted directory and prepare for installation:

    Code:
    $ tar xvzf anyremote-*.tar.gz
    $ cd anyremote-*
    $ ./configure
    $ make
    Now, I advise you to have checkinstall installed, this will allow you to easily remove anyremote later on.
    Code:
    $ sudo aptitude install checkinstall
    We install it:

    Code:
    $ sudo checkinstall
    or, if checkinstall is not available
    $ sudo make install

  3. Install the Java client

    The anyremote directory we extracted earlier contains the phone client file anyRemote.jar. Install this on your phone, either by sending it via bluetooth or by using a data cable.

Now, using an existent bluetooth connection, we can start anyremote and indicate which configuration file to use:

Code:
$ anyremote -f  anyremote-2.6/cfg-examples/Server-style/adminExample.cfg &
Finally we start the java application on the phone, connect to the computer, and have fun!

The author is very cooperative and likes to hear from you if you used his program successfully with a phone not yet on his list on this page: http://anyremote.sourceforge.net/doc-html/intro.html. But let's try to keep questions concerning installation and such here in the forum.

how to Use your mobile phone to check your impact on climate change

The news

mobGAS©® is a new mobile phone application available in 21 European languages that allows users to see how their daily choices are impacting on climate change. This smart technology is fun to use, offers practical tips and demonstrates to users that climate change is not just a distant issue for others to tackle, but something that they too can really influence.

The background

Although easy to download and use, mobGAS is a sophisticated application that calculates an individual's emissions of the three main greenhouse gases - carbon dioxide CO2, methane CH4, and nitrous oxide N2O. It does so by compiling basic information inputted by the user on, for example, how they regulated their heating, what means of transport they took or the household appliances they used. Calculations of individual emissions of greenhouse gases can be accessed by users at the touch of a button at any time of the day. A users-diary of daily, weekly and yearly emissions can be securely registered on a dedicated website that allows them to compare their results with other country or world averages. The application also includes an animation reflecting the user's contribution to the Kyoto Protocol target.

Press release

European Commission scientists launch first mobile application that uses your mobile phone to track your carbon footprint DE EN FR IT PT

Background documents

mobGAS©®: presentation of the application

Pictures

mobile phone with mobGAS application
mobGAS©: mobile climate change control© JRC (2007)

Zoom - Download hi-res

mobile phone display with mobGAS application, PC screen
mobGAS©: mobile climate change control© EC (2007)

Zoom - Download hi-res

Graphical material

how to Use your mobile phone as a wireless modem

Did you know you can use a mobile telephone as a wireless modem? If your phone and computer can connect over IrDA or Bluetooth, you're well on your way.
You can connect your Macintosh to the Internet using a GPRS (General Packet Radio Service) mobile telephone as a modem. To do so, you should first make sure that you can:

  • Connect to the Internet over GPRS using the WAP browser in your telephone

  • Connect your Macintosh to your mobile phone over IrDA or Bluetooth.



Once you can do these two things, you can set up your computer to use the telephone as a wireless modem to connect to the Internet.



Important: GPRS data services and Internet access are typically optional offerings. Ask your mobile phone operator about GPRS availability in your area, and what the subscription fees and service charges are.





Using your mobile phone as a wireless modem



Once you have made the appropriate network settings on your Mac, you can use your mobile phone as a wireless modem.

  1. Ask your mobile phone operator for the network settings necessary to use your GPRS mobile phone as a modem. In some cases, you'll use the same network settings that your phone uses. In others, you may need to get network settings specific for computers. Typically, these settings include:

    • GPRS dial-up number

    • User ID

    • Password

    • IP Address

    • DNS Address

    • other advanced settings such as authentication, data compression, header compression, and quality of service


  2. From the Apple menu, choose System Preferences.

  3. From the View menu, choose Network.

  4. Choose New Location from the Location pop-up menu.

  5. Type a name for the new location such as "Wireless Modem".

  6. Choose "Network Port Configurations" from the Show pop-up menu.

  7. Make sure the "USB Bluetooth Modem Adapter" is enabled. Deselect the ports or interfaces you aren't using in this location, such as "Built-in Ethernet", and "Internal Modem".

  8. Click Apply Now.

  9. Choose "USB Bluetooth Modem Adapter" from the Show pop-up menu.

  10. Click the TCP/IP tab, if necessary. Choose "Using PPP" from the configure pop-up menu, and enter the DNS numbers and search domains as provided by your mobile phone operator.

  11. Click the PPP tab, and enter the account name, password, and telephone number as provided by your mobile phone operator.

  12. Click PPP Options. A sheet appears. Click "Use TCP header compression" to disable this option, and click OK. Your operator may be able to tell you if you can leave this option turned on or not.

  13. Click the Bluetooth Modem tab, and choose a mobile phone model that closely resembles yours from the Modem pop-up menu. In some cases, your mobile phone operator may provide a specific modem script for you to use.

  14. Click Apply Now.

  15. From the View menu, choose Bluetooth.

  16. Click the Settings tab, and select "Show Bluetooth status in the menu bar" to enable that option, if necessary.

  17. Make your mobile phone "discoverable" to other Bluetooth devices, or turn on Bluetooth communication. See the documentation that came with your phone for instructions.

  18. Choose "Search for phones" from the Bluetooth menu bar item, and select your phone, which you have already paired.

  19. Once your phone and Mac are connected, open the Internet Connect application.

  20. Click connect. Your telephone should connect to your mobile phone operator, and in 10 to 20 seconds, you should be able to use the Internet.

 
Ping Tools

Free Ping - This IP ping software tool allows for visual notification along with Windows Pop Ups to notify you of a downed device.
Windows Status Network Reporting Tool - Simple to configure monitoring tool that provides a webpage of device status. Lacks any alerting features but does run as a Windows NT/2000/XP service.

Servers Alive - Fully mature commercial product that can monitor devices, NT Services and performance counters and includes Netware monitoring. Runs as a service on Windows NT/2000/XP, web interface and multiple alerting capabilities. Free for 10 devices. <$$>

IP Sentry - Runs as a Windows NT/2000/XP/2003 service or network monitoring software package. Web interface, monitors Windows shares and services. Lots of optional plug ins. Free for 2 devices. <$$ - $$$>

WhatsUp - The standard against all others are judged. Full package of monitoring and alerting capabilities. Can monitor services, web pages, up/down dependencies, and runs as a service on Windows NT/2000/XP. It has a web interface that includes multiple levels of security. WhatsUp FT Premium adds Fault Tolerance and application monitoring for Microsoft Exchange and Microsoft SQL Servers to good old WhatsUp Gold. WhatsUp Professional suits larger networks.<$$$>

Network Sniffers
Wireshark - Network protocol analyzer (successor to Ethereal). Free does not mean a product is lacking in features or maturity. This is a full feature packet sniffer that can be used capture traffic in real time and identify everything behind the scenes in network traffic. Filtering, DNS resolution of clients and select between TCP/UDP/ICMP traffic.

Show Traffic - Real-time network traffic sniffer on any given interface. Resolves names to IP addresses. Can be used to identify unwanted traffic. It does not capture traffic for later analysis.

Network Probe - Network monitor and protocol analyzer. Unbelievable tool to identify almost any specific network traffic including peer to peer applications and instant messaging software. Filter by hosts per protocol. You will be surprised at the traffic types on your network.

Web Log Analyzers

IIS Log File Analyzer - Simple interface and reporting capabilities provide information such as number of visitors, NS Lookups of visitors, simple filter, and referrers.

Web Log Expert (Full & Lite) - Support for IIS and Apache Logs. Both versions can identify referring traffic, entry page, page stats, search engines, and traffic by the hour of the day and week. The full version can give detailed error reports, exit pages weekly and monthly traffic and much more detailed reporting and filtering.

Mach 5 Analyzer - This is a solid mature product that offers full reporting capabilities and exporting to Word, Excel, and HTML. Extensive filters and tracking and errors. Supports most log file formats. <$$>

Who's-On - Unlike traditional analyzers while report after the fact, this tool reports access in real time. Track visitors activity, set alerts for exceptions and undesirable traffic. This tool is both useful and addictive. Several versions available including one that runs as a service. Web interface for remote monitoring also available. <$$>

Miscellaneous Tools

CoolMon - This tool can provide information about your system in a transparent pane on your desktop. (My Desktop & Config File) There are a variety of scripts and extensions that do everything from gather the weather to create a webpage of multiple systems. (Think servers!)

VNC - Need to remote control a desktop across the room or across the world? This is a stable product that will run as a service or from a floppy and is available for almost any platform.

Event Sentry - Monitor Windows NT/2000/XP Event Logs with this tool that runs as a service. It send e-mail alerts of events specified by type (Warning, Information...) or as defined by the filter.

GFi LANguard Network Security Scanner - Identify security risks on you servers and workstations. Find unauthorized/unexpected services and shares. The product can be used to push patches and updates to equipment for the first 30 days and for a modest fee after thirty days. The scanning ability continues to work for free forever. <$$$>

Sysinternals - There are a wide variety of tools to assist in management or troubleshooting of Windows systems and servers. The tools are well respected with many of them free.

Directory & File Monitor - This small utility monitors files or directories for changes including add/deletion of files, renaming or attribute changes. Has the ability to log activity to a webpage. Excellent to monitor a server or workstation for unauthorized or malicious activity.

GFi LANguard System Integrity Monitor - Monitor files for unauthorized or malicious activity. It runs as a service on Windows NT/2000/XP and can send e-mail alerts. It is an excellent way to protect your web server.

Who's On Proxy/ISA Server - If you has a Microsoft Proxy or ISA Server, watch the actual traffic in real time. See where your users are visiting at any given moment. Web interface for remote monitoring. <$$>

Netbotz/Rackbotz - Hardware devices to monitor critical system areas. Besides security cameras that can detect motion, there are sensors for sound (fire alarm), moisture, temperature, and airflow. These can be a lifesaver for mission critical equipment. <$$$$>

Helper Applications

Hermes Mail Server - Excellent SMTP/POP3 mail server that can be used to relay alerts from your network monitoring station or tools. The source code is included. It can run as a service on Windows NT/2000/XP.

VNC - Remote control of almost any desktop from anywhere. VNC (Virtual Network Computing) allows you to view and interact with one computer (the "server") using a simple program (the "viewer") on another computer anywhere on the Internet. The software is open source and has been ported to almost any platform ever used. VNC runs a service on Windows NT/2000/XP.

Network Notepad - It should come as no surprise that proper network diagrams are an important tool in monitoring your network. Network Notepad is a freeware alternative to more expensive diagramming programs. Network Notepad is a program for creating interactive network diagrams with user definable management features such as point and click telnet