When data is transmitting over computer network, one or more packets may fail to reach their destinations, and this is packet loss.
Task scheduler provides the ability to run packet capture and analysis at pre-defined time automatically, which can be scheduled to run one time, daily or weekly
TCP packets reveal useful information to help us troubleshoot slow network, especially for the cases like slow website response, slow CRM transactions and slow downloading or uploading, etc [...]
As a network analyzer (aka. packet sniffer & protocol analyzer), Capsa make it easy for us to monitor and analyze network traffic in its intuitive and information-rich tab views. With Capsa's network traffic monitor feature, we can quickly identify network [...]
ARP, because of its simpleness, fastness, and effectiveness, is becoming increasingly popular among internet raggers, thus causing severe influence to the internet environment. With Colasoft Capsa, we can quickly and accurately locate ARP source [...]
Network utilization rate is the ratio of current network traffic to the maximum traffic that the port can handle. It indicates the bandwidth use in the network. High network utilization rate indicates the network is busy whereas low utilization rate indicates the network is idle [...]
With Colasoft Capsa, you can monitor not only the original logs of HTTP Requests, Email Messages, FTP Transfers and DNS Queries, but also the real-time activities and detailed messages of four most poplar instant messengers: MSN and Yahoo Messenger [...]
As a delicate work, network analysis always requires us to view the original packets and analyze them. However, not all the network failures can be found in a very short period. Sometimes network analysis requires long time monitoring and must be based on the baseline of normal network [...]
By analyzing network protocol distribution and learning what protocols are being used in the network, we can quickly find out what host is doing what activity [...]
Slow network is a common phenomenon. For the diversity of the reasons causing slow network, to troubleshoot slow network is one of the most common and troublesome work in daily network management [...]
In Ethernet, all communications are based on broadcast. Excessive broadcast traffic may lead to network performance depreciation, or even cause network failures such as slow network and intermittence [...]
TTL tells the router whether the packet should be dropped because it stays in the network for too long. TTL is initially designed to define a time scope beyond which the packet will be dropped. As TTL value will be deducted by at least 1 by the router when the packet passes through, TTL often indicates the number of the routers which the packet passed through before it was dropped [...]
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected, the backdoor may take the form of an installed program, or could be a modification to an existing program or hardware device. It hides in the computer, scans existing loopholes, opens corresponding ports, as well as modifies system registration files [...]
What Is an Email Worm?
In networking, an email worm is a computer worm which can copy itself to the shared folder in system. And it will keep sending infected emails to stochastic email addresses. In this way, it spreads fast via SMTP mail servers.
What Is the Harm of Email Worm
An email worm can send lots [...]
There are two tabs concerning endpoint statistics in Capsa: the Physical Endpoint tab and the IP Endpoint tab. Users can detect the IP/MAC endpoint in the largest traffic in a short time by the endpoint analytics. And also, The system supply clear statistics of traffic ranking (Top 5 IP endpoint under HTTP protocol)[...]
BitTorrent Consumes Big Bandwidth
Based on the working principle of BitTorrent protocol, if somebody is downloading big files with BitTorrent software, it will be a disaster for other users who need bandwidth for business operations as the user will consume large amount of bandwidth, thus causing long time network slowness, intermittence, even disconnections; because meantime the [...]
Some people may doubt if it is legal to monitor email of employees with an email monitor software (aka. email spy or email checker), but this is not the topic of this article. We are going to discuss how we can monitor email with some technical methods, especially how we can monitor email with this [...]
Internet traffic is the flow of data around the Internet. It includes web traffic, which is the amount of that data that is related to the World Wide Web, along with the traffic from other major uses of the Internet, such as electronic mail and peer-to-peer networks.
In case we want to monitor internet traffic generated [...]
Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. Its use for retrieving inter-linked resources led to the establishment of the World Wide Web.
In order to monitor http traffic, we will need a packet sniffer (or a protocol analyzer) software. Here is a detail process how we can monitor http [...]
In computing, a protocol is a set of rules which is used by computers to communicate with each other across a network. A protocol is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax, semantics, and synchronization of communication. Protocols may be implemented by hardware, software [...]
Trojan and Worms are two major threats to network security. Do you know what exact is a Trojan horse? In Wikipedia, Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations[...]
Colasoft just released a major upgrade of Capsa Network Analyzer a few days ago and we notice that the Security Analysis Profile is the most important new feature in Capsa which helps users to locate and troubleshoot network issues and attacks like ARP attack, DoS attack and port scanning[...]
Colasoft, Capsa, nChronos and Colasoft logos are registered trademarks of Colasoft. Sniffer is a registered trademark of Network General Corporation. All other names are trademarks or registered trademarks of their respective owners.