background preloader

Network/Internet Related

Facebook Twitter

List of academic databases and search engines. Wikipedia list article This article contains a representative list of notable databases and search engines useful in an academic setting for finding and accessing articles in academic journals, institutional repositories, archives, or other collections of scientific and other articles. Databases and search engines differ substantially in terms of coverage and retrieval qualities.[1] Users need to account for qualities and limitations of databases and search engines, especially those searching systematically for records such as in systematic reviews or meta-analyses.[2] As the distinction between a database and a search engine is unclear for these complex document retrieval systems, see: List of search engines. Wikimedia list article By content/topic General * Powered by Bing ** Powered by Google *** Metasearch engine † Main website is a portal Based on Based on Ask.com (formerly)

List of search engines

First choice in IP Address Management. NirSoft - freeware utilities: password recovery, system utilities, desktop utilities. Open Source IDS / IPS / NSM engine. NetDB. BGP feed - The Spamhaus Project. Source Address Validation Technique (aka BCP 38) - Service Provider Security - SENKI's Confluence. In the mid ‘90s, network operators noticed new trends in security incidents.

Source Address Validation Technique (aka BCP 38) - Service Provider Security - SENKI's Confluence

These trends demonstrated that attackers would change the IPv4 source address of their attack to something other than the source IPv4 address of their host. IPv4 does not require the source address to be checked for its authenticity. This IPv4 limitation makes spoofed source address attacks possible and easy to execute from any devices connected to the Internet. In addition, since the source addresses are spoofed, tracking attacks back to their source become difficult and tedious – which is one of the key reasons why attacks prefer spoofed source addresses. The Internet community responded to this threat with the drafting and adopting and Internet Engineering Task Force (IETF) Best Common Practice (BCP) document to recommend ISP use some packet filtering technique on the edge of the insure the validity of the source IP address. RT: Request Tracker - Best Practical. Overview - Redmine.

NOC - Site - Confluence. Революция, о необходимости которой так долго гооврили большевики, таки свершилась: NOC, как и подобает любой нормальной OSS, обзавелся своей адресной базой.

NOC - Site - Confluence

Роль адресной базы часто ошибочно недооценивают, но тем не менее она является одним из краеугольных камней в фундаменте OSS. Без качественной адресной базы крайне сложно нормально организовать процессы капитального строительства и обслуживания массового сегмента (PSTN, ШПД, ЦТВ, КТВ и др), то есть почти все услуги фиксированной связи,… Понадобилось тут проверить, а что за железки выпали из дерева топологии. Естественно, у задачи есть минимум два решения. А был бы ерл вместо питона - было бы по пять вариантов написания каждого из двух решений и одно решение в виде ASCII-art.

C "Божьей" помощью, вот что получилось. По мотивам крайне полезного пируля,… Представляю Вашему вниманию вариант организации связи NOC с Zabbix на уровне триггеров базы данных. NANOG BCOP. Best Practices. Best Practical. BCP38. Abusehq - The Standard for Network Abuse, Spam and Feedback Loop Handling. Bro Blog. TeemIp - IP Address Management solution. NetDB. PRTG - network monitoring using SNMP, NetFlow, WMI and more. In a PRTG Cluster up to 5 PRTG instances ("Nodes") work together to create a failover tolerant monitoring system.

PRTG - network monitoring using SNMP, NetFlow, WMI and more

Not even a software update causes downtime for a PRTG cluster. The cluster performs automatic failovers: If the primary node fails or loses connection to the cluster, another node immediately becomes the master server and takes over the sending of notifications. Thus notifications are always sent, even if the primary master has no connectivity or has crashed. Moreover, you can achieve multiple points-of-presence monitoring, all nodes monitor all sensors all the time. This means that response times are measured from different locations in the network (LAN/WAN/VPN) and can be compared with each other.

Please note: Remote Probes can only be connected to one node of a cluster. Distributed Monitoring Using Remote Probes With the so called Remote Probes PRTG Network Monitor can be used to monitor several networks in different locations: Open-source IP address management. Overview - Netdot - Redmine. Open Resolver Project. NOC - Site - Confluence. IPplan [IP address management and tracking] In Search of a Provider-Grade IPAM Solution. Lately I've been looking for robust IP address management (IPAM) software to replace the unwieldy subnet spreadsheets I try to corral every day at work.

In Search of a Provider-Grade IPAM Solution

You'd think this would be a fairly straight-forward task, but you'd be wrong. See, I work for a managed services provider (MSP), which acts in many respects as a sort of mini-ISP. We don't install or maintain physical circuits but we do act as a middleman for carriers who do, and we manage a large amount of address space both private and public, customer and internal. As an added bonus, we also have to carefully track how address space is imported and exported among hundreds of independent customer VRFs, which can potentially employ overlapping address space. The problem I've encountered repeatedly whilst searching for an IPAM solution is that most of the products out there are intended to cater toward enterprise and datacenter customers. Here's what I've come across so far... Infoblox. BT Diamond IPControl. BlueCat Networks Proteus. Free Development software downloads. 6connect - Revolutionary Network Automation Software.

Untitled.