<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 7 Ways to Monitor your Local Network</title>
	<atom:link href="http://www.gfi.com/blog/7-ways-monitor-local-network/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/7-ways-monitor-local-network/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=7-ways-monitor-local-network</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: lawrence</title>
		<link>http://www.gfi.com/blog/7-ways-monitor-local-network/comment-page-1/#comment-17567</link>
		<dc:creator>lawrence</dc:creator>
		<pubDate>Wed, 05 Jan 2011 04:21:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2978#comment-17567</guid>
		<description><![CDATA[A few co-workers and I have recently had a discussion about the effectiveness and practicality of network monitoring as opposed to personally enforced practices. We were split dead center on which method we supported, though those of us opposed to personally enforced practices cited that a company has no right to snoop on the work of others. However, I think a company has every right to monitor and observe the staff, equipment and property it is paying to use and employ.]]></description>
		<content:encoded><![CDATA[<p>A few co-workers and I have recently had a discussion about the effectiveness and practicality of network monitoring as opposed to personally enforced practices. We were split dead center on which method we supported, though those of us opposed to personally enforced practices cited that a company has no right to snoop on the work of others. However, I think a company has every right to monitor and observe the staff, equipment and property it is paying to use and employ.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Donna</title>
		<link>http://www.gfi.com/blog/7-ways-monitor-local-network/comment-page-1/#comment-17566</link>
		<dc:creator>Donna</dc:creator>
		<pubDate>Wed, 05 Jan 2011 04:20:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2978#comment-17566</guid>
		<description><![CDATA[A few co-workers and I have recently had a discussion about the effectiveness and practicality of network monitoring as opposed to personally enforced practices. We were split dead center on which method we supported, though those of us opposed to personally enforced practices cited that a company has no right to snoop on the work of others. However, I think a company has every right to monitor and observe the staff, equipment and property it is paying to use and employ.]]></description>
		<content:encoded><![CDATA[<p>A few co-workers and I have recently had a discussion about the effectiveness and practicality of network monitoring as opposed to personally enforced practices. We were split dead center on which method we supported, though those of us opposed to personally enforced practices cited that a company has no right to snoop on the work of others. However, I think a company has every right to monitor and observe the staff, equipment and property it is paying to use and employ.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Garry Benson</title>
		<link>http://www.gfi.com/blog/7-ways-monitor-local-network/comment-page-1/#comment-17542</link>
		<dc:creator>Garry Benson</dc:creator>
		<pubDate>Tue, 04 Jan 2011 21:26:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2978#comment-17542</guid>
		<description><![CDATA[Monitoring events and system logs may probably be one of the most effective, yet tedious practices of monitoring your local network. Most especially on systems and servers getting a lot traffic from remote or off-site use, it may be difficult and time consuming to sift through literally tons and tons of logs. But in the end, you won’t get a more precise documentation of system and server activity anywhere else.]]></description>
		<content:encoded><![CDATA[<p>Monitoring events and system logs may probably be one of the most effective, yet tedious practices of monitoring your local network. Most especially on systems and servers getting a lot traffic from remote or off-site use, it may be difficult and time consuming to sift through literally tons and tons of logs. But in the end, you won’t get a more precise documentation of system and server activity anywhere else.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Angela</title>
		<link>http://www.gfi.com/blog/7-ways-monitor-local-network/comment-page-1/#comment-16012</link>
		<dc:creator>Angela</dc:creator>
		<pubDate>Tue, 14 Dec 2010 18:28:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2978#comment-16012</guid>
		<description><![CDATA[I think this is quite an impressive checklist when it comes to improving local network security. It&#039;s definitely something to sticky on corkboards of system admins looking to beef up the security of their system. Monitoring your local network, I believe, is much like going to the doctor for a check-up. Any hiccups, anomalies and potential threats can easily be identified if you know what you&#039;re looking for. It&#039;s definitely much more productive than simply responding to threats that are already underway.]]></description>
		<content:encoded><![CDATA[<p>I think this is quite an impressive checklist when it comes to improving local network security. It&#8217;s definitely something to sticky on corkboards of system admins looking to beef up the security of their system. Monitoring your local network, I believe, is much like going to the doctor for a check-up. Any hiccups, anomalies and potential threats can easily be identified if you know what you&#8217;re looking for. It&#8217;s definitely much more productive than simply responding to threats that are already underway.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: paul</title>
		<link>http://www.gfi.com/blog/7-ways-monitor-local-network/comment-page-1/#comment-15722</link>
		<dc:creator>paul</dc:creator>
		<pubDate>Sun, 12 Dec 2010 17:30:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2978#comment-15722</guid>
		<description><![CDATA[I think comparing desktops and servers to people is a great analogy (more likely because I spend more time with one group over the other *smiles*). But kidding aside, it&#039;s quite true. Negligence on the part of the user, whether it&#039;s on desktops or servers can lead to dire consequences down the road; especially to unattended servers. Maintenance on hard drives, RAM, mobos and other drives are essential to keep things running like clockwork.]]></description>
		<content:encoded><![CDATA[<p>I think comparing desktops and servers to people is a great analogy (more likely because I spend more time with one group over the other *smiles*). But kidding aside, it&#8217;s quite true. Negligence on the part of the user, whether it&#8217;s on desktops or servers can lead to dire consequences down the road; especially to unattended servers. Maintenance on hard drives, RAM, mobos and other drives are essential to keep things running like clockwork.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/7-ways-monitor-local-network/comment-page-1/#comment-12236</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Mon, 01 Nov 2010 10:17:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2978#comment-12236</guid>
		<description><![CDATA[Hi Sue,

That&#039;s quite a bad scenario. Not only is your friend getting charged for her neighbors&#039; abuse but she might also get in legal trouble as anyone investigating the unauthorized duplication of said movies will be led back to her (assuming her neighbor is engaged in the downloading of copyrighted material without authorization). Another possibility would be restrict access to authorized MAC addresses as well, but yes, you&#039;re definitely right, WEP is basically only very slightly better than having no password at all. Tools are available that can crack WEP in 3 - 5 minutes so it&#039;s definitely not considered secure.]]></description>
		<content:encoded><![CDATA[<p>Hi Sue,</p>
<p>That&#8217;s quite a bad scenario. Not only is your friend getting charged for her neighbors&#8217; abuse but she might also get in legal trouble as anyone investigating the unauthorized duplication of said movies will be led back to her (assuming her neighbor is engaged in the downloading of copyrighted material without authorization). Another possibility would be restrict access to authorized MAC addresses as well, but yes, you&#8217;re definitely right, WEP is basically only very slightly better than having no password at all. Tools are available that can crack WEP in 3 &#8211; 5 minutes so it&#8217;s definitely not considered secure.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sue Walsh</title>
		<link>http://www.gfi.com/blog/7-ways-monitor-local-network/comment-page-1/#comment-12200</link>
		<dc:creator>Sue Walsh</dc:creator>
		<pubDate>Mon, 01 Nov 2010 02:39:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2978#comment-12200</guid>
		<description><![CDATA[Great post. A friend of mine recently started getting warned that she was going over the data cap her ISP has in place and was getting huge overage charges. After some investigation it was discovered a neighbor had cracked her WEP security and had been borrowing her internet connection to download movies and other high bandwidth things.I highly suggest that routers never be secured with WEP. It&#039;s too easy for a hacker to crack. WPK is much more secure.]]></description>
		<content:encoded><![CDATA[<p>Great post. A friend of mine recently started getting warned that she was going over the data cap her ISP has in place and was getting huge overage charges. After some investigation it was discovered a neighbor had cracked her WEP security and had been borrowing her internet connection to download movies and other high bandwidth things.I highly suggest that routers never be secured with WEP. It&#8217;s too easy for a hacker to crack. WPK is much more secure.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 16:27:26 by W3 Total Cache --