Arbor Networks, whose technology detects abnormal network traffic flow, now
offers its PeakFlow monitoring tool for use in virtualized environments.
PeakFlow X Virtual 4.2 is the alternative to PeakFlow X software that monitors
packet flow through network routers and switches, alerting system administrators
if traffic spikes above normal patterns, such as in the case of a dedicated
denial of service (DDOS) attack. The virtual version of the software is designed
to run in VMware's ESX and ESXi hypervisors.
-
Виртуальная сфера: Управляем облаками с помощью VMware Vsphere
Эра персоналок с установленными программами неуклонно движется к закату. На пороге эпоха к… -
Air colander: A tale about how one large wireless provider was hacked
Admit that "Wireless Internet in every home" is a very attractive slogan. It so… -
Hackers’ playground: hackers’ brain-twisters
Have you ever thought about legal hacking? Is it possible to do the things you love and p… -
How to peep in other laptop built-in webcam: Learn how to use a built-in webcam for one’s own purposes
Some people truly believe their laptop built-in webcams can pry them so they fearfully be… -
Нереальные десктопы: VMware View 4.5: обзор возможностей популярного решения для виртуализации десктопов
Мы все давно привыкли к традиционному подходу, когда на ПК пользователя устанавливаются вс… -
Faq united
A: Все зависит от фантазии злодея. Для осуществления его коварных замыслов вполне могла бы…
-
Phone pranks: hacker’s approach to IP-telephony
The Clickatel service (a service that allows SMS sending from any number) seemed a real c… -
Make Tor go the whole hog
If you think that ensuring one’s Internet privacy is the only mean of the Tor software th… -
Russian gang linked to big Citibank hack
U.S. authorities are investigating the theft of an estimated tens of millions of dollars … -
Navigation without GPS: define your location using IP, GSM/UMTS and Wi-Fi
Thousands of years ago nobody could even dream of such a thing as GPS. Sailors and travel… -
История медленной презентации
Пару недель назад я впервые принял участие в презентации на конференции Microsoft Tech-Ed… -
7 steps from Injection to the Admin Access via RDP
Any break-in pursues its own aim, which determines its value. It's up to you to decide wh…