Honghong Sharing | SPAN Port vs Network TAP Complete Traffic Monitoring Solution Comparison

Abstract In network monitoring and troubleshooting, obtaining traffic visibility is critical. This paper compares two main approaches: SPAN ports and network TAPs. SPAN ports are a switch mirroring feature that is easy to configure but suffers from traffic loss and limited visibility, while network T ...

Continue ReadingHonghong Sharing | SPAN Port vs Network TAP Complete Traffic Monitoring Solution Comparison

Honghong Sharing | How to Leverage IOTA to Improve Network Performance Diagnostics : An In-Depth Analysis of the Performance Impact of Micro-burst Traffic

IOTA Data Analytics | An In-Depth Look at the Hidden Worries of Microbursts In today's high-speed and complex network environments, microbursts are often regarded as "invisible killers" because they can have a significant impact on overall performance in a short period of time on the millisecond scale. In this article, we will introduce ...

Continue ReadingHonghong Sharing | How to Leverage IOTA to Improve Network Performance Diagnostics : An In-Depth Analysis of the Performance Impact of Micro-burst Traffic

Honghong Shares丨Identify and Prevent Security Risks of Blast-RADIUS Vulnerability with ProfiShark and IOTA

Introduction With the increasing number of threats to network security, it is critical to understand and prevent possible attacks. Blast-RADIUS is a security vulnerability that severely affects the RADIUS protocol, allowing attackers to bypass authentication and gain unauthorized access. This article...

Continue ReadingHonghong Shares丨Identify and Prevent Security Risks of Blast-RADIUS Vulnerability with ProfiShark and IOTA

Honghong Sharing | IT and OT Networks: Structure, Challenges and the Future of Precision Analysis

IT Networks (Traditional Networks) IT networks are the backbone of modern computing, providing the infrastructure for data exchange, communication and processing. Typical applications include: Office Networks Data Centers Cloud Services Internet Connectivity These networks rely on standard protocols such as TCP/IP, DNS and HTTP...

Continue ReadingHonghong Sharing | IT and OT Networks: Structure, Challenges and the Future of Precision Analysis

What is threat intelligence? How does it play a role in detection and prevention in the security analysis of an organization? Come

威脅情報,也稱為網路威脅情報,是網路安全的一個分支,專注於收集和分析有關組織可能面臨的潛在威脅和漏洞的資訊。這些資訊有多種形式,從原始的、未經處理的資料到可供人類消費的成品情報。 威脅情報的目標是提供…

Continue ReadingWhat is threat intelligence? How does it play a role in detection and prevention in the security analysis of an organization? Come