-
What intrusion prevention systems (IPS) alogrithms are used and what has been the success of these s
Learn what intrusion prevention systems algorithms are used and what the success has been with these systems, in this Q&A with enterprise security expert Michael Gregg.
-
How can I limit the number of MBs each user downloads?
Learn about rate limiting from network administration expert Lindi Horton, in this response.
-
Is there a command in a Cisco Catalyst that will tell me the IP address of a PC hanging off a port?
Find the IP address of a PC through commands in a Cisco Catalyst in this expert response.
-
Why do vendors say ANEXT and Shannon's capacity are the problems for passive connectivity?
Are ANEXT and Shannon's capacity problems for passive connectivity? Carrie Higbie clarifies this and the 10BASE-T standard in this expert response.
-
When do you use a straight-through patch cable, and when do you use a crossover cable?
Learn when to use a straight-through patch cable and when to use a crossover cable in this Q&A with infrastructure expert Carrie Higbie.
-
What kind of work does the Department of Distributed System (DSD) do?
DSD stands for the Department of Distributed System. Training and certification expert Ed Tittel explains what kind of work DSD does and what kind of future there is in this department, in this exp...
-
Who is the target market for IPS and what are the big players doing to gain market share?
Security expert, Puneet Mehta offers an excellent resource for learning who the target market is for IPS, in this Q&A.
-
Do I need a structured cabling certification as a systems administrator?
Find out if systems administrators need an additional certification on structured cabling, with SCSA and CCNA already under their belt, in this expert response with Ed Tittel.
-
What is the difference between the CCSP and the CISSP certification?
Certification expert Ed Tittel differentiates between CCSP and CISSP certifications in this expert response.
-
What are the best tools for monitoring and troubleshooting my network?
See what monitoring and troubleshooting tools are best for your Exchange server, Windows 2003 servers and network, in this Q&A with security expert Puneet Mehta.
-
What are the criteria for evaluating an indoor wireless network?
In this Q&A., learn how to evaluate an indoor wireless network with criteria provided by expert Lisa Phifer.
-
How do I get my LAN computers to reach the Internet?
Get your LAN computers to reach the Internet in this response from wireless expert Lisa Phifer.
-
What can we do to connect our wireless router to our wireless client?
Experiencing a persistent inability to connect a wireless router from your wireless client? Lisa Phifer details how to fix this problem.
-
How do I figure out the configuration on my router?
Figure out the configuration on your router with the help of routing and switching expert Sudhanshu Gupta.
-
Is there any private/public IP address range in IPv6?
Learn about private and public IP address ranges in IPv6 in this expert response by Silvia Hagen.
-
What configuration option would remove our Novell client/server dependency on PIM Dense Mode?
Novell client/server configuration options to remove your PIM Dense Mode dependency are discussed by IPv4 and IPv6 expert Silvia Hagen in this Q&A.
-
How much does the CCNA test for ISDN?
In this Q&A, David Minutella answers how much the CCNA tests for ISDN with DDR and ISDN being popular overseas.
-
What top five subjects does the CCNA test focus on?
Know what subjects are tested most heavily on in the CCNA exam. Use this top five list from Cisco certifications expert Dave Minutella in this response.
-
Can you write a CCNP exam through a CCNA ID?
Using an expired Cisco ID to take your next exam? See what Cisco certification expert David Minutella says about writing a CCNP exam through a CCNA ID.
-
How do I get a proper load-share on this router running no routing protocols?
Sudhanshu Gupta explains how to get a proper load-share on a router running no routing protocols that achieves a 90% reception and 80% transmission, in this Q&A.
-
BYOD security: Which VPN is best for you, IPsec or SSL?
By 2016, 40% of the workforce will be mobile. IPsec VPNs are being widely discussed for BYOD security. But should we also be talking about SSL VPNs?
-
Why should you care about SDN?
Expert Jim Damoulakis weighs in on the potential of software-defined networking, or SDN, and why you should care.
-
Can you really have security, convenience and BYOD?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?
Network Management Strategies for the CIO