How to Locate the Source of Packet Loss With Network Analyzer

Packet loss is usually difficult to troubleshoot, because there are many possible causes for that. It always takes a long time to troubleshoot such issues. Colasoft Capsa network analyzer can help IT team find the source of packet loss by packet analysis and comparison[...]

Read More

How to Decrypt HTTPS Packets

Capsa is able to decrypt HTTPS packets. As everything in the HTTPS message is encrypted, including the headers, and the request/response load, the analyzer can only know that a connection is taking place between the two parties and their domain names and IP addresses[...]

Read More

Conversation Filter

It is really necessary to focus on conversations from one certain field. Colasoft Capsa provides Conversation Filter to help you to do so. Conversation Filter allows users to filter conversations according to the Address and Port, Location, Conversation Protocol, Conversation Packets, Conversation Content, and Conversation Options[...]

Read More

Document Your Network - Capsa Log View & Output

As a networking manager, it is very important to document network log. By analyzing http log files, you will be able to see if your website blocking strategy is successfully set up; if there are any strange IPs in your network system. Colasoft Capsa enables you to do so with Log View and Log Output features.[...]

Read More

How to Analyze Network Traffic Based on Local Processes

By analyzing http log files, you will be able to see if your website blocking strategy is successfully set up or if there are any strange IPs in your network system. Colasoft Capsa enables you to do so with Log View and Log Output features[...]

Read More

Improve Network Analysis Efficiency with Conversation Colorization Feature

Troubleshooting network problems can be a very difficult and challenging task. Capsa introduces a feature that allows us to highlight-colorize relevant IP conversations in the network based on their MAC address, IP Addresses, TCP or UDP conversations[...]

Read More

How to Detect Arp Attacks & Arp Flooding

ARP attacks and ARP flooding are common problems small and large networks are faced with. ARP attacks target specific hosts by using their MAC address and responding on their behalf, while at the same time flooding the network with ARP requests. ARP attacks are frequently used for 'Man-in-the-middle' attacks, causing serious security threats, loss of confidential information and should be therefore quickly identified and mitigated. [...]

Read More

How to Detect Routing Loops and Physical Loops

When working with medium to large scale networks, IT departments are often faced dealing with network loops and broadcast storms that are caused by user error, faulty network devices or incorrect configuration of network equipment. Network loops and broadcast storms are capable of causing major network disruptions and therefore must be dealt with very quickly[...]

Read More

Migrating Capsa Configuration Files

Capsa Professional and Capsa Enterprise packet capture application provides the ability feature to backup configurations, including analysis profile settings and network profile settings. [...]

Read More

How to Capture Wireless Network Traffic

As an innovative and high quality network analysis solution, Capsa network analyzer is not only designed to monitor and analyze wired network traffic, but also for wireless LAN traffic, including 802.11 a/b/g/n networks. [...]

Read More

How to Monitor Network Packet Loss

When data is transmitting over computer network, one or more packets may fail to reach their destinations, and this is packet loss. [...]

Read More

Task Scheduler: Auto-Run Packet Capture

Task scheduler provides the ability to run packet capture and analysis at pre-defined time automatically, which can be scheduled to run one time, daily or weekly [...]

Read More

Powerful TCP Flow Analysis

TCP packets reveal useful information to help us troubleshoot slow network, especially for the cases like slow website response, slow CRM transactions and slow downloading or uploading, etc [...]

Read More

How to Monitor Network Traffic

As a network analyzer (aka. packet sniffer & protocol analyzer), Capsa make it easy for us to monitor and analyze network traffic in its intuitive and information-rich tab views. With Capsa's network traffic monitor feature, we can quickly identify network [...]

Read More

Troubleshoot ARP Attacks with Colasoft Capsa

ARP, because of its simpleness, fastness, and effectiveness, is becoming increasingly popular among internet raggers, thus causing severe influence to the internet environment. With Colasoft Capsa, we can quickly and accurately locate ARP source [...]

Read More

How to Analyze Network Utilization Rate

Network utilization rate is the ratio of current network traffic to the maximum traffic that the port can handle. It indicates the bandwidth use in the network. High network utilization rate indicates the network is busy whereas low utilization rate indicates the network is idle [...]

Read More

24x7 Network Monitoring

As a delicate work, network analysis always requires us to view the original packets and analyze them. However, not all the network failures can be found in a very short period. Sometimes network analysis requires long time monitoring and must be based on the baseline of normal network [...]

Read More

Powerful Protocol Analyzer

By analyzing network protocol distribution and learning what protocols are being used in the network, we can quickly find out what host is doing what activity [...]

Read More

Find Reasons for Slow Network

Slow network is a common phenomenon. For the diversity of the reasons causing slow network, to troubleshoot slow network is one of the most common and troublesome work in daily network management [...]

Read More

Analyze Broadcast Traffic with Colasoft Capsa

In Ethernet, all communications are based on broadcast. Excessive broadcast traffic may lead to network performance depreciation, or even cause network failures such as slow network and intermittence [...]

Read More

Diagnose Network by TTL Value

TTL tells the router whether the packet should be dropped because it stays in the network for too long. TTL is initially designed to define a time scope beyond which the packet will be dropped. As TTL value will be deducted by at least 1 by the router when the packet passes through, TTL often indicates the number of the routers which the packet passed through before it was dropped [...]

Read More

Detect Backdoor with Colasoft Capsa

A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected, the backdoor may take the form of an installed program, or could be a modification to an existing program or hardware device. It hides in the computer, scans existing loopholes, opens corresponding ports, as well as modifies system registration files [...]

Read More

How to Detect Email Worm with Colasoft Packet Sniffer

In networking, an email worm is a computer worm which can copy itself to the shared folder in system. And it will keep sending infected emails to stochastic email addresses. In this way, it spreads fast via SMTP mail servers. What Is the Harm of Email Worm
An email worm can send lots [...]

Read More

How to Detect the Network Malfunction Via the End-point View

There are two tabs concerning endpoint statistics in Capsa: the Physical Endpoint tab and the IP Endpoint tab. Users can detect the IP/MAC endpoint in the largest traffic in a short time by the endpoint analytics. And also, The system supply clear statistics of traffic ranking (Top 5 IP endpoint under HTTP protocol)[...]

Read More

How to Track BitTorrent User in Network with Colasoft Packet Sniffer

BitTorrent Consumes Big Bandwidth
Based on the working principle of BitTorrent protocol, if somebody is downloading big files with BitTorrent software, it will be a disaster for other users who need bandwidth for business operations as the user will consume large amount of bandwidth, thus causing long time network slowness, intermittence, even disconnections; because meantime the [...]

Read More

Email Monitor & Auto-saving Email Content

Some people may doubt if it is legal to monitor email of employees with an email monitor software (aka. email spy or email checker), but this is not the topic of this article. We are going to discuss how we can monitor email with some technical methods, especially how we can monitor email with this [...]

Read More

How to Monitor Internet Traffic with Colasoft Packet Sniffer

Internet traffic is the flow of data around the Internet. It includes web traffic, which is the amount of that data that is related to the World Wide Web, along with the traffic from other major uses of the Internet, such as electronic mail and peer-to-peer networks.
In case we want to monitor internet traffic generated [...]

Read More

How to Monitor http Traffic with Packet Sniffer

Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. Its use for retrieving inter-linked resources led to the establishment of the World Wide Web.
In order to monitor http traffic, we will need a packet sniffer (or a protocol analyzer) software. Here is a detail process how we can monitor http [...]

Read More

How to Improve Network Protocols Learning and Teaching

In computing, a protocol is a set of rules which is used by computers to communicate with each other across a network. A protocol is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax, semantics, and synchronization of communication. Protocols may be implemented by hardware, software [...]

Read More

Detecting Trojan and Worm with Capsa Network Analyzer

Trojan and Worms are two major threats to network security. Do you know what exact is a Trojan horse? In Wikipedia, Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations[...]

Read More