network monitoring

  1. ChatGPT

    Enhance Your Windows Taskbar: Monitor Internet Speeds with NetSpeedMonitor and TrafficMonitor

    Monitoring your internet speed directly from the taskbar is not just a convenience, but a vital tool for managing network performance, especially in our increasingly digital world. In this article, we will explore how you can effectively utilize two excellent applications—NetSpeedMonitor and...
  2. B

    Windows 8.1 How to make Batch Script run a command when it gets a response to ping...

    Ok so i want a batch file that will run in the background and ping a few servers, and then if it gets a response from any of these servers (If it is able to communicate with them), it executes a command. It will be running on a machine that in normal operation has no internet (WAN) access, (For...
  3. News

    AA20-183A: Defending Against Malicious Cyber Activity Originating from Tor

    Original release date: July 1, 2020 | Last revised: July 2, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) and Pre-ATT&CK framework. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques. This...
  4. News

    AA20-183A: Defending Against Malicious Cyber Activity Originating from Tor

    Original release date: July 1, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) and Pre-ATT&CK framework. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques. This advisory—written by the...
  5. News

    AA20-006A: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad

    Original release date: January 6, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) is sharing the following information with the cybersecurity community as a primer for assisting in the protection of our Nation’s critical infrastructure in light of the current tensions...
  6. News

    3004375 - Update for Windows Command Line Auditing - Version: 1.0

    Revision Note: V1.0 (February 10, 2015): Advisory published. Summary: Microsoft is announcing the availability of an update for supported editions of Windows 7, Windows 8, Windows Server 2008R2 and Windows Server 2012 that expands the Audit Process Creation policy to include the command...
  7. B

    Windows 7 Anonymous network traffic to public IPs

    Hi, I have windows 7 SP1 installed pcs in my office network belongs to workgroup. these system traffic shows through router(command: show ip accounting) that many public ip address is accessing ,which utilze my network bandwidth in large size.How can i block these traffic? Why happening these...
  8. News

    TA13-141A: Washington, DC Radio Station Web Site Compromises

    Original release date: May 20, 2013 | Last revised: May 21, 2013 Systems Affected Microsoft Windows systems running Adobe Reader, Acrobat, or Oracle Java Overview On May 16, 2013, US-CERT was notified that both Link Removed[.]com and Link Removed[.]com had been compromised to...
  9. P

    Windows 7 mapped network drive speed drops after some time

    I have a problem with the speed of my mapped network drive. At first al is wel and file loading is as fast as to be expected. But after some time the transfer speed drops dramaticaly and it becomes very slow. I tested it primaraly with loading of image sequences, but it affects all file loading...
  10. D

    Windows 7 > Monitor Router Traffic?

    How can I Monitor Router Traffic? Not just one computer, but all connected to the router.
  11. S

    Windows 7 Three Monitors

    I have recently switched my HP HDX18 over to Windows 7. I monitor a network so I use 2 Monitors. To do this I hookup a Nippon Labs SVGA Video Y-Adapter Cable to my laptops VGA port and plugin an ACER and a Sony Monitor.When I plug both in however, it allows me only to extend my desktop onto one...
  12. whoosh

    Windows 7 Lopt Crack 6

    05.26.2009 - L0phtCrack 6 Released: The code and L0phtCrack name have taken a long strange trip from proof of concept code for a vulnerability in 1997 to a commercial application funding the L0pht's security research to being sold as a product by the security consulting company @stake and then...
Back
Top