Packet loss is usually difficult to troubleshoot, because there are many possible causes for that. It always takes a long time to troubleshoot such issues. Colasoft Capsa network analyzer can help IT team find the source of packet loss by packet analysis and comparison[...]
Capsa is able to decrypt HTTPS packets. As everything in the HTTPS message is encrypted, including the headers, and the request/response load, the analyzer can only know that a connection is taking place between the two parties and their domain names and IP addresses[...]
It is really necessary to focus on conversations from one certain field. Colasoft Capsa provides Conversation Filter to help you to do so. Conversation Filter allows users to filter conversations according to the Address and Port, Location, Conversation Protocol, Conversation Packets, Conversation Content, and Conversation Options[...]
As a networking manager, it is very important to document network log. By analyzing http log files, you will be able to see if your website blocking strategy is successfully set up; if there are any strange IPs in your network system. Colasoft Capsa enables you to do so with Log View and Log Output features.[...]
By analyzing http log files, you will be able to see if your website blocking strategy is successfully set up or if there are any strange IPs in your network system. Colasoft Capsa enables you to do so with Log View and Log Output features[...]
Troubleshooting network problems can be a very difficult and challenging task. Capsa introduces a feature that allows us to highlight-colorize relevant IP conversations in the network based on their MAC address, IP Addresses, TCP or UDP conversations[...]
ARP attacks and ARP flooding are common problems small and large networks are faced with. ARP attacks target specific hosts by using their MAC address and responding on their behalf, while at the same time flooding the network with ARP requests. ARP attacks are frequently used for 'Man-in-the-middle' attacks, causing serious security threats, loss of confidential information and should be therefore quickly identified and mitigated.
When working with medium to large scale networks, IT departments are often faced dealing with network loops and broadcast storms that are caused by user error, faulty network devices or incorrect configuration of network equipment. Network loops and broadcast storms are capable of causing major network disruptions and therefore must be dealt with very quickly[...]
Capsa Professional and Capsa Enterprise packet capture application provides the ability feature to backup configurations, including analysis profile settings and network profile settings.
As an innovative and high quality network analysis solution, Capsa network analyzer is not only designed to monitor and analyze wired network traffic, but also for wireless LAN traffic, including 802.11 a/b/g/n networks.
When data is transmitting over computer network, one or more packets may fail to reach their destinations, and this is packet loss.
Task scheduler provides the ability to run packet capture and analysis at pre-defined time automatically, which can be scheduled to run one time, daily or weekly
TCP packets reveal useful information to help us troubleshoot slow network, especially for the cases like slow website response, slow CRM transactions and slow downloading or uploading, etc [...]
As a network analyzer (aka. packet sniffer & protocol analyzer), Capsa make it easy for us to monitor and analyze network traffic in its intuitive and information-rich tab views. With Capsa's network traffic monitor feature, we can quickly identify network [...]
ARP, because of its simpleness, fastness, and effectiveness, is becoming increasingly popular among internet raggers, thus causing severe influence to the internet environment. With Colasoft Capsa, we can quickly and accurately locate ARP source [...]
Network utilization rate is the ratio of current network traffic to the maximum traffic that the port can handle. It indicates the bandwidth use in the network. High network utilization rate indicates the network is busy whereas low utilization rate indicates the network is idle [...]
As a delicate work, network analysis always requires us to view the original packets and analyze them. However, not all the network failures can be found in a very short period. Sometimes network analysis requires long time monitoring and must be based on the baseline of normal network [...]
By analyzing network protocol distribution and learning what protocols are being used in the network, we can quickly find out what host is doing what activity [...]
Slow network is a common phenomenon. For the diversity of the reasons causing slow network, to troubleshoot slow network is one of the most common and troublesome work in daily network management [...]
In Ethernet, all communications are based on broadcast. Excessive broadcast traffic may lead to network performance depreciation, or even cause network failures such as slow network and intermittence [...]
TTL tells the router whether the packet should be dropped because it stays in the network for too long. TTL is initially designed to define a time scope beyond which the packet will be dropped. As TTL value will be deducted by at least 1 by the router when the packet passes through, TTL often indicates the number of the routers which the packet passed through before it was dropped [...]
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected, the backdoor may take the form of an installed program, or could be a modification to an existing program or hardware device. It hides in the computer, scans existing loopholes, opens corresponding ports, as well as modifies system registration files [...]
In networking, an email worm is a computer worm which can copy itself to the shared folder in system. And it will keep sending infected emails to stochastic email addresses. In this way, it spreads fast via SMTP mail servers.
What Is the Harm of Email Worm
An email worm can send lots [...]
There are two tabs concerning endpoint statistics in Capsa: the Physical Endpoint tab and the IP Endpoint tab. Users can detect the IP/MAC endpoint in the largest traffic in a short time by the endpoint analytics. And also, The system supply clear statistics of traffic ranking (Top 5 IP endpoint under HTTP protocol)[...]
BitTorrent Consumes Big Bandwidth
Based on the working principle of BitTorrent protocol, if somebody is downloading big files with BitTorrent software, it will be a disaster for other users who need bandwidth for business operations as the user will consume large amount of bandwidth, thus causing long time network slowness, intermittence, even disconnections; because meantime the [...]
Some people may doubt if it is legal to monitor email of employees with an email monitor software (aka. email spy or email checker), but this is not the topic of this article. We are going to discuss how we can monitor email with some technical methods, especially how we can monitor email with this [...]
Internet traffic is the flow of data around the Internet. It includes web traffic, which is the amount of that data that is related to the World Wide Web, along with the traffic from other major uses of the Internet, such as electronic mail and peer-to-peer networks.
In case we want to monitor internet traffic generated [...]
Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. Its use for retrieving inter-linked resources led to the establishment of the World Wide Web.
In order to monitor http traffic, we will need a packet sniffer (or a protocol analyzer) software. Here is a detail process how we can monitor http [...]
In computing, a protocol is a set of rules which is used by computers to communicate with each other across a network. A protocol is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax, semantics, and synchronization of communication. Protocols may be implemented by hardware, software [...]
Trojan and Worms are two major threats to network security. Do you know what exact is a Trojan horse? In Wikipedia, Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations[...]