Casey has a Bachelor of Arts in Criminal Justice, but after some soul searching a few years ago, he decided to obtain a Master of Science in Information Assurance. Casey enjoys dabbling in Java every now and then, and is fond of playing around in whatever Linux distribution happens to be on hand. Casey's true love, however, is using Wireshark to conduct network packet analysis - he's absolutely fascinated with watching packets dance across the wire. He's even found it helpful to his writing, where he strives to delve into the finer details of whatever concept he's attempting to illustrate. Casey sees this "detail diving" as a written version of a Wireshark capture.
Articles by Brad Casey
IPv6 infrastructure appears to be on the way, but the switch from IPv4 won't come without obstacles. Find out more here
Wi-Fi technology has resulted in an explosion of connectivity, but this communication medium has some vulnerabilities. If proper...
When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity
The automation, technical support and easy installation of a Microsoft platform make it seem like an easy choice over Linux distros for...
So just how safe is your data? Here we take a deeper look at the PKI technology designed to protect it
Find out why the distinction between voice and data services is quickly falling by the wayside
BackTrack Linux can reveal some very serious shortcomings within a given network. It can also reveal some viable methods to fix them
Snort is a passive tool for network packet analysis and network forensics, but it isn't a security solution. Learn more about it here
Although the 802.11ac standard is still a few years away from implementation, the time to start thinking about whether to focus on Ethernet...
There are still a few wrinkles to be ironed out, but IT professionals are excited about virtualization's boundless potential
Learn about the Linux operating system and its value in a small - or medium-sized business's network architecture
VoIP is well known for its cost effectiveness, but security should be considered before you embark on a VoIP implementation
Join thousands of others with our weekly newsletter
The 4th Era of IT Infrastructure: Superconverged Systems:
Approaches and Benefits of Network Virtualization:
Free E-Book: Public Cloud Guide:
Free Tool: Virtual Health Monitor:
Free 30 Day Trial – Turbonomic:
- May02 The Model Enterprise: A Blueprint for Enterprise Data Governance
- May10 Better to Ask Permission? Best Practices for Privacy and Security
Being digital should be of more interest than being electronic.- Alan Turing, 1947