Remove DNS Remove Email Remove Internet
article thumbnail

How to find applications with NetFlow

Kentik

Looking at NetFlow, IPFIX (Internet Protocol Flow Information Export), or even sFlow (a standardized protocol similar to NetFlow) records today, you will find that most everything runs on port 80 or 443. Lots of applications use these ports today, including DNS lookups and email. NetFlow application monitoring: Use DNS logs.

article thumbnail

NPM, encryption, and the challenges ahead: Part 1 of 2

Kentik

Once you saw a person’s password to any given application, you knew they were generally using the same one for all of their other applications — email, the ticketing system, the FTP and Novell servers, etc. Getting all the DNS logs is often impractical. Is Google hijacking DNS with DoH? Well, that didn’t last long.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

EP139: Design a Live Streaming System

ByteByteGo

Live streaming is challenging because the video content is sent over the internet in near real-time. Sending a large volume of video content over the internet takes time. When a device wants to access the internet, it sends a request to your router. The modified request is sent to the internet. But how does it work?

article thumbnail

Stuff The Internet Says On Scalability For September 28th, 2018

High Scalability

They sent me long email listing reasons why I shouldn't get a second monitor, including (numbers are approximate, employee count from 2013 or so) "If every googler gets an extra monitor, in a year it would be equivalent to driving Toyota Camry for 18000 miles.". After all, nobody gets fired from creating a hierarchy. There more.

article thumbnail

The malware threat landscape: NodeStealer, DuckTail, and more

Engineering at Meta

We’re sharing our latest threat research and technical analysis into persistent malware campaigns targeting businesses across the internet, including threat indicators to help raise our industry’s collective defenses across the internet. For more security tips, visit our Newsroom.

Cookie 116
article thumbnail

Today’s Enterprise WAN Isn’t What It Used To Be

Kentik

The WAN was how we got access to some websites and sent emails. What changed Over the last 15 years, though, the quality of the public internet has improved significantly. We still need to connect our infrastructure to the public internet, so the enterprise WAN is still about routers, circuit IDs, and perimeter firewalls.

WAN 98
article thumbnail

EP147: The Ultimate API Learning Roadmap

ByteByteGo

The Ultimate API Learning Roadmap APIs are the backbone of communication over the Internet. After DNS resolution, the requests reach the app servers. To ensure your ad reaches this influential audience, reserve your space now by emailing sponsorship@bytebytego.com. API First Oauth 2.0 Every developer needs to learn about APIs.

Cookie 173