Go Premium for a chance to win a PS4. Enter to Win

x

Networking

91K

Solutions

66K

Contributors

Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.

Share tech news, updates, or what's on your mind.

Sign up to Post

Is there any downloadable software for Windows or for other devices connected to our network (such as cell phones)that would detect devices that are sending out SPAM.  Our internet provider has suspended our outbound email services until they know that we've fixed the problem.  I'd like to test all devices on the network to find out the source of the spamming.  Any ideas?  
0
 
LVL 26

Expert Comment

by:Fred Marshall
My first thought would be to set up the following if you don't already have it:

- Create a mirror port on your most central switch - or the equivalent on your firewall.  Connect this to a workstation or laptop for monitoring.
- Install Wireshark on the monitoring computer.
Monitor the traffic on the outgoing port of the switch or the incoming port (LAN) on the firewall.
This should determine the IP addresses that are generating traffic of the sort you are interested in.
Perhaps off-hours logging would be the most revealing.
I've run logs like this with round-robin log file creation for days on end.
0
 
LVL 14

Expert Comment

by:Ben Personick (Previously QCubed)
Setup an SMTP server (such as the free one included in windows under IIS) to act as a relay.

Point all of your actual applications that sdnd mail to this relay.

block all devices (except the IP pf the mail relay) from having port 25 ourbound.

Now you can be pretty muxh assured that anything else which is sending email is blocked, and you can review the smtp logs of all devices which de relay through your local smtp relay server, allowing tou to troubleshoot connectivity and locate any abusive systems.
0
Microsoft Certification Exam 74-409
LVL 1
Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Cyber News Rundown: Edition 11/10/17

CyberNewsRundown.jpg
UK-Based Cryptocurrency Hit By Cyberattack

Prior to the official launch of Electroneum, a UK-based cryptocurrency that uses smartphones for its mining process, was targeted by a DDoS attack that shut down both the website and the app for several days. The attack effectively blocked all users from accessing their accounts, as the entire network was forced offline, to ensure the safety of investors’ funds.

Canadian University Held for Ransom

In the past week, officials have been working with affected students to secure their personal information after hackers breached the university’s systems and gained access to student records. The university has since taken its email system offline, as the hackers were spreading the leaked information throughout the email lists. Along with the data circulation, the hackers also demanded the university pay a large ransom of roughly 23,000 USD within 48 hours, though officials are still uncertain when the breach itself occurred.

WaterMiner Cryptocurrency Mod for GTA 5

As more cryptocurrency miners are embedded in software, one Russian hacker has gone a step further by exploiting a mod for the popular game Grand Theft Auto 5. The exploit silently uses a computer’s power to mine digital currency and, with the help of a modified version of the XMRig miner, can hide itself if it suspects monitoring software is active.

More on the Webroot blog here.
0
Network Operation Center equipment? How to turn on and what he needs. Please let me know in detail.
0
 
LVL 25

Expert Comment

by:Brian B
You have entered this as a post, but it looks like it is a question. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the screen, or this link: https://www.experts-exchange.com/askQuestion.jsp

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
0
Cpa Network Spiroox
0
 
LVL 25

Expert Comment

by:Brian B
Could you please clarify what you are asking about? If you are trying to ask a question that requires a response from the Experts, please use the "Ask a question" button at the top of the screen.
0
Webroot Protects You Against Bad Rabbit

Webroot customers are protected from the Bad Rabbit malware that is affecting computers across Russia, Ukraine, Bulgaria, a few surrounding Eastern-European countries, as well as Japan.

What we know about Bad Rabbit thus far:

Bad Rabbit is a well-made piece of malware that uses a lot of clever tricks to spread, similar to NotPetya, which affected customers across the globe this summer.

Bad Rabbit has been successful as it has worm-like behavior, using embedded usernames and passwords to move laterally through the network.

Attackers used compromised websites, most of which are news sources local to the APAC/Eastern European region, as watering-hole infection vectors which helps explain the geographic location.

More about Bad Rabbit, what you can do to protect yourself even further, and what one of our Senior Advanced Threat Research Analyst had to say about it here.
0
Hi,
Every week, I need to run 7-8 reports from external software for same week period for almost 8 branches, is there any VBA codes which can help me to automate the process, where it saves all reports automatically from external software on network directory just by adjusting dates? Your help will be appreciated.
0
 
LVL 25

Expert Comment

by:Brian B
You have entered this as a post, but it looks like it is a question. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the screen, or this link: https://www.experts-exchange.com/askQuestion.jsp

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
0
 
LVL 25

Expert Comment

by:Brian B
0
Tech spooks happen to every business owner. Check out my top solutions to these issues and share a story of your own! Simply submit your #TechorTreat article before October ends and be entered to win a  tech gadget.
8
Hello, EE Experts!

I wanted to make sure that all Apple users understand what's going on with the new Wi-Fi (WPA2) vulnerability "KRACK."

Apple is working on a fix to roll out as soon as possible to all its users. They've stated that there is a fix for this vulnerability in the beta versions, but that the fix is not in the latest update you have on your device.

So, what can you do?

Don't connect to Wi-Fi at hotels, coffee shops, or anywhere outside your place of business or home. Even at your house or area of work use a VPN.

Wait, even at my house?

Yes. Essentially the attacker can read all the information that is being transmitted wirelessly throughout your home. That said, if you use a VPN you're making an encrypted tunnel around the information you're sending and not relying on the WPA2 protocol that should keep your data safe. So, even if the attacker is looking at the data on your home network, the VPN is making it unreadable.

Also, if you're out and about, please turn off the Wi-Fi capability on your iPhone or iPad. By turning off the Wi-Fi, you're making your iPhone or iPad solely dependent upon cellular data, which is not susceptible to this attack.

Where can I get a VPN?

I use Encypt.me because it's fast, simple, relatively cheap, and works on all of my devices without In-app purchases. However, there are free VPNs that you can grab …
4
 
LVL 99

Expert Comment

by:John Hurst
IOS 11.1 is out today to address the Wi-Fi vulnerability. I am updating both phones here. Carrier settings are being updated at the same time.
0
Hi
I have an excel sheet that contains long list of file names. My requirement is it should take file name from excel sheet and search in a network folder as well as sub folders. If found then copy that file and paste in a hard coded folder. Then excel sheet it will take next row file name and repeat the process. I mean we need to put in loop and repeat the process.

Any advice is really helpful.

Regards,
Byom

 
0
How can I share out an old *.exe application to multiple users in an AD environment who are connected from home via VPN? The requirement is that the execution of *.exe must be from the office network, the *.exe application calls a bunch of databases from other servers in the office and will disconnect if the application runs from the user's computer via VPN.

I am thinking of setting up a Windows 2012 servers and allow RDP connections for users to run the *.exe on the server from home(via VPN). Are there any other ways?
1
 

Author Comment

by:Panda 5888
Thanks
1
 
LVL 25

Expert Comment

by:Brian B
0
Independent Software Vendors: We Want Your Opinion
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Tech Bomb - Currently GoDaddy DNS shows signs of lunacy. Problem appears to be in their communication of NS records to global DNS root servers. Via - dig $site ns - this shows up as a different list of NS records each time dig is issued, which leads to...

Symptom - site IP (DNS A records) are randomized. Sometimes correct. Sometimes random.

Effect - Ad Networks suspend your accounts. SEO plummets, as GoDaddy flags your site as serving Malware.

It’s unclear whether this is a GoDaddy technical issue or GoDaddy is being hacked somewhere deep in their systems.

*Fix* - Move all your DNS records out of GoDaddy + set your site’s DNS records to point to the outside DNS service.

This has come to light over the past few days when several of my clients have had their Ad Network accounts suspended + or sites flagged in Google Search Console as serving Malware, when sites are clean.

Just another day of tech randomness.
0
 
LVL 20

Expert Comment

by:Alan
Hi David,

Are you seeing issues only where a customer has multiple A records for a given hostname, or any issues where they have only a single IP for a given hostname?

I have not had any problems (that I know of yet!) but I don't have any with multiple IPs.

Thanks,

Alan.
0
why an organization might want two or more firewalls on a single network
0
 
LVL 38

Expert Comment

by:Mahesh
one firewall between production and DMZ and one between DMZ and internet
0
Protect DNS: A Conversation With Dave Dufour of Webroot

DNS is one of the basic services on which the web is based and it has proven to be robust and scalable to an astounding degree. Unfortunately, it's also vulnerable to hacking and can be a serious attack vector if left unprotected. Dave Dufour, director of cybersecurity and engineering at Webroot, is an expert on DNS and its implications in network security. Security Now talked with Dufour about the issues with DNS and what organizations should be doing to protect their networks, employees and customers from DNS-based threats.

Read more of the interview on Security Now.
2
Hello everyone, I am very new to the gaming world and wanted to buy a gaming console subscription prepaid card, for my newly purchased Xbox controller. When I discussed about this with one of my former friends, he suggested me to (Buy) Acheter Abonnement xbox live 12 mois ( https://www.press-start.com/fr/1-acheter-abonnement-xbox-live-gold-12-mois/ ) from Press-start a gaming Console store which sells all types of gaming consoles like Playstatsion network card, or Xbox gift card.
0
Stuck with the router not picking the correct IP of your modem?

Try logging into the router's homepage (normally 192.168.0.1 depending the brand of it), log with administrative accounts and go to WAN connections, release it and renew it..!

If this does not work and the router keeps the same IP even after attempting to renew it, probably the ISP might need to change and release it from the modem or.. you could connect directly to the modem, do an IPCONFIG /RELEASE  ,  IPCONFIG/RENEW, then plug everything back to the router and re-do the first steps again, and maybe just maybe it will change this time.

Good night everyone.
0
I've had a couple of instances were Windows 10 is being allocated IPv6 addresses despite there not being a IPv6 DHCP Server on the network.  It's caused some Domain connectivity issues.  Anyone else seen anything similar to this?
0
 
LVL 36

Expert Comment

by:Shaun Vermaak
That is an IPv6 site-local address. MS recommends against disabling IPv6. I would add IPv6 range to DHCP (https://www.ultratools.com/tools/rangeGenerator) because site-local addresses sometimes contains the MAC address
0
 
LVL 22

Author Comment

by:David Atkin
That's what we've been doing, disabling IPv6.  I've struggled to find any other information about the problem which is why I've asked really.

@Shaun, thank you for the site local address info
0
Looking to get your CompTIA A+,  Network A+, or CompTIA Security+ certifications? The first step to these career milestones is to get your CompTIA IT Fundamentals certification. Enroll today in August’s free Course of the Month to begin preparing for the certification exam!
1
This guy filed the only formal complaint with the FCC about Verizon.

https://www.theverge.com/2017/8/9/16114530/net-neutrality-crusade-against-verizon-alex-nguyen-fcc

Nguyen's complaints are comprehensive and wide-ranging. He points to Verizon temporarily blocking the Nexus 7, third-party iPhone 6s, and third-party Nexus 6s. He brings up Verizon charging people more for bringing their own phones to the network. He argues Verizon compelled phone providers to disable FM radios. He also mentions Verizon blocking PayPal, OneDrive, Samsung Pay, and other built-in apps.

...

Altogether, he alleges, Verizon has violated openness rules in six different ways, ranging from discriminatory pricing, to limiting customer choice, to simply lying about its network.
6
 
LVL 17

Expert Comment

by:Kyle Santos
Wow.  Meanwhile, Ajit is up there ignoring this guy's case.  Sheesh.  I'm becoming more and more disappointed by Verizon.
1
 
LVL 2

Expert Comment

by:Juana Villa
I think it is admirable what he is doing. It will be a long process, a big corporation vs a man.
3
I finally decided to get one of these open source customizeable routers and I'm loving it. It's for advanced consumers and it is a bit pricey but it works well and is really fast.
2
 
LVL 10

Author Comment

by:Brandon Lyon
I was going to order from Amazon but they ran out so I ordered from the same company on eBay. I tried waiting for the higher spec'd one but I couldn't wait any longer. It looks like they're back on Amazon now though.
1
 
LVL 17

Expert Comment

by:Kyle Santos
@Craig, you see this episode? haha
https://www.youtube.com/watch?v=zAJbOygaJ0o
1
New feature and membership benefit!
LVL 11
New feature and membership benefit!

New feature! Upgrade and increase expert visibility of your issues with Priority Questions.

We're more than halfway through August! Have you enrolled in the Course of the Month yet?

This month's featured course prepares you for the CompTIA IT Fundamentals exam. Premium Members, Team Accounts, and Qualified Experts get free access for 30 days. Enroll today to get started!
6
New in Windows security: Automatically log off suspicious users
Microsoft's Cloud App Security subscription service will boot users off the network, and out of apps and services, at the first sign of anomalous behavior.
0
2017ScholarshipWinners-SocialMedia-O.pngIntroducing our Summer 2017 Scholarship Winners announced by Experts Exchange owner, Randy! Check out their winning articles and videos.
1
NativePostAugCOTM.pngHaving a basic knowledge of IT fundamentals demonstrates your readiness for the digital workplace. Enroll in August’s Course of the Month to gain skills in networking, cybersecurity, hardware, and software basics, and prepare for the CompTIA IT Fundamentals exam!
3
Where do you stand on Net Neutrality?
0
short.PNGShort sentences draw the eye amidst consistent scrolling. Give your posts a short one-liner to truly increase engagement in our community!
2

Networking

91K

Solutions

66K

Contributors

Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.