
{"id":227,"date":"2007-07-24T20:42:02","date_gmt":"2007-07-24T23:42:02","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=227"},"modified":"2007-07-24T20:42:02","modified_gmt":"2007-07-24T23:42:02","slug":"microsoft-network-monitor-31","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/","title":{"rendered":"Microsoft Network Monitor 3.1"},"content":{"rendered":"<p>El otro d\u00c3\u00ada mi compa\u00c3\u00b1ero Ra\u00c3\u00bal me pas\u00c3\u00b3 un enlace, en el que se facilita la descarga de <a href=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?FamilyID=18b1d59d-f4d8-4213-8d17-2f6dde7d7aac&#038;DisplayLang=en#filelist\">Microsoft Network Monitor 3.1<\/a>, un analizador de protocolos <em>made in Redmond<\/em>.<\/p>\n<p>Me lo he bajado y lo he probado en una estaci\u00c3\u00b3n Windows XP que tengo en casa, con la idea de ver cu\u00c3\u00a1les son las posibles ventajas de usar este producto y no cualquier otro analizador de red, vaya que despu\u00c3\u00a9s secunde la opici\u00c3\u00b3n de alguien y me concedan el estatus de tecnico-less .<\/p>\n<p>Lo primero que me llama la atenci\u00c3\u00b3n es el ofrecimiento de la activaci\u00c3\u00b3n del servicio de actualizaciones Microsoft Update, el cual, sinceramente, no me esperaba, sobre todo cuando lo tengo deshabilitado a prop\u00c3\u00b3sito.<\/p>\n<p><img decoding=\"async\" alt=\"network monitor\" src=\"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor1.png\" \/><\/p>\n<p>Por cierto, no me ha funcionado ni el bot\u00c3\u00b3n \u00e2\u20ac\u0153Privacy Statement\u00e2\u20ac\u009d ni el de FAQ. Acto seguido la cl\u00c3\u00a1sica ventana para cooperar con Redmond, en la que se nos recomienda cooperar envi\u00c3\u00a1ndoles informaci\u00c3\u00b3n del hardware y c\u00c3\u00b3mo usamos la herramienta. Echo en falta conocer detalles de c\u00c3\u00b3mo se pretende obtener informaci\u00c3\u00b3n estudiando c\u00c3\u00b3mo uso la herramienta. No estar\u00c3\u00ada mal saber qu\u00c3\u00a9 informaci\u00c3\u00b3n sobre hardware se enviar\u00c3\u00ada en caso de cooperar.<\/p>\n<p><img decoding=\"async\" alt=\"network monitor\" src=\"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor2.png\" \/><\/p>\n<p>Tampoco me funciona el enlace \u00e2\u20ac\u0153More Information\u00e2\u20ac\u009d. Tras un proceso de instalaci\u00c3\u00b3n, aparece la herramienta. La captura que adjunto est\u00c3\u00a1 sin maximizar:<\/p>\n<p><img decoding=\"async\" alt=\"network monitor\" src=\"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor3.png\" \/><\/p>\n<p>El paso natural es realizar un par de capturas, y cacharrear con la aplicaci\u00c3\u00b3n. He medido, con la herramienta de medici\u00c3\u00b3n de recursos que proporciona el sistema operativo, el consumo de memoria que tiene la aplicaci\u00c3\u00b3n capturando paquetes. La prueba la he ejecutado corriendo simult\u00c3\u00a1neamente Wireshark, tambi\u00c3\u00a9n capturando paquetes, ya que a fin de cuentas es el producto que suelo utilizar, con un sorprendente resultado en cuanto a consumos de memoria, a menos, en el entorno en el que estoy ejecutando la prueba:<\/p>\n<p><img decoding=\"async\" alt=\"network monitor\" src=\"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor4.png\" \/><\/p>\n<p>Pegas que le veo tras estar un rato haciendo pruebas:<\/p>\n<ol>\n<li>No trae filtros de captura predefinidos, y la ayuda sobre filtros no es precisamente amplia.<\/li>\n<li>S\u00c3\u00b3lo salva las capturas como pcap, no contempl\u00c3\u00a1ndose la exportaci\u00c3\u00b3n a formatos como modified tcpdump, nanosecond libpcap, o NA sniffer. Por supuesto, las implementaciones propias de Linux, HP-UX o Sun no son seleccionables.<\/li>\n<li>No informa sobre la naturaleza de los paquetes capturados seg\u00c3\u00ban se est\u00c3\u00a1n capturando.<\/li>\n<li>Una vez acabada la captura, no se emplean c\u00c3\u00b3digos de colores para identificar la naturaleza de los paquetes capturados.<\/li>\n<li>A la hora de salvar capturas, no se informa del n\u00c3\u00bamero de paquetes totales guardados ni de cu\u00c3\u00a1les son los paquetes seleccionados, si vamos a guardar una selecci\u00c3\u00b3n.<\/li>\n<li>No se ofrece al usuario la opci\u00c3\u00b3n de hacer <em>merge<\/em> con otras capturas.<\/li>\n<li>La aplicaci\u00c3\u00b3n carece de generador de informes globales sobre las capturas.<\/li>\n<li>La aplicaci\u00c3\u00b3n no permite establecer referencias temporales en el conteo de tiempos de las capturas.<\/li>\n<li>Como puede resultar l\u00c3\u00b3gico, la herramienta carece del trasfondo de soporte que s\u00c3\u00ad tienen otras soluciones, como Wireshark, mucho m\u00c3\u00a1s populares entre el usuario.<\/li>\n<li>Como puede resultar l\u00c3\u00b3gico, pero conviene recordarlo, no es una herramienta interoperable. S\u00c3\u00b3lo funciona en entornos Windows.<\/li>\n<\/ol>\n<p>Fuente: <a href=\"http:\/\/www.sahw.com\/wp\/\">http:\/\/www.sahw.com\/wp\/<\/a><\/p>\n<p>\u00c2\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El otro d\u00c3\u00ada mi compa\u00c3\u00b1ero Ra\u00c3\u00bal me pas\u00c3\u00b3 un enlace, en el que se facilita la descarga de Microsoft Network Monitor 3.1, un analizador de protocolos made in Redmond. Me lo he bajado y lo he probado en una estaci\u00c3\u00b3n Windows XP que tengo en casa, con la idea de ver cu\u00c3\u00a1les son las posibles [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-227","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Microsoft Network Monitor 3.1<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Microsoft Network Monitor 3.1\",\"datePublished\":\"2007-07-24T23:42:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/\"},\"wordCount\":539,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor1.png\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Microsoft Network Monitor 3.1\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor1.png\",\"datePublished\":\"2007-07-24T23:42:02+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/#primaryimage\",\"url\":\"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor1.png\",\"contentUrl\":\"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor1.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Microsoft Network Monitor 3.1","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Microsoft Network Monitor 3.1","datePublished":"2007-07-24T23:42:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/"},"wordCount":539,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/#primaryimage"},"thumbnailUrl":"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor1.png","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/","url":"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Microsoft Network Monitor 3.1","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/#primaryimage"},"thumbnailUrl":"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor1.png","datePublished":"2007-07-24T23:42:02+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/microsoft-network-monitor-31\/#primaryimage","url":"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor1.png","contentUrl":"http:\/\/www.sahw.com\/images\/networkmonitor\/network_monitor1.png"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=227"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/227\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}