-
How much do the CCIE exams cost?
Learn in depth details about the cost and logistics of how and where to take the two part CCIE (Cisco Certified Internetwork Expert) exam.
-
After the CCNA, can I pursue CWNA, Cisco's wireless certification?
Get advice on which wireless networking certificate to pursue after completing a CCNA (Cisco Certified Network Associate) course, from our expert David Minutella.
-
Is there a way to trace my stolen laptop computer?
Learn some useful preliminary techniques on how to safeguard your computer should it get stolen and make it recoverable using certain trace software, from our expert Michael Gregg.
-
How do I find the application on my network that's dropping packets?
Learn how to use Wireshark to trace dropped packets being sent from a PC on your network or an external application/service and secure SMTP ports, from our expert Michael Gregg.
-
Will using a VPN protect me against fake wireless hotspots?
Learn how to avoid data theft from phishing or connecting to a fake hotspot, by using a VPN, and various other secure browsing techniques, from our expert Lisa Phifer.
-
Can wireless adapters operate as client access points to make SoftAPs?
Learn how to simultaneously use two separate wireless adapters to connect to an access point and route or bridge traffic through the two adapters, from our expert Lisa Phifer.
-
How can I replicate the services of Active Directory (AD) in ADC?
Learn how to replicate AD services in ADC (Active Directory Controller) by creating policy replication agreements between two or more servers, from our expert.
-
Top 10 reasons why computers do not have network access to each other
Learn 10 useful tips from our expert on how to troubleshoot a network in which one computer will not allow password permissions or access because of several common network environmental issues.
-
Is there VLAN software recommend for Realtek NICs?
Find out which VLAN (virtual local area network) software recommendations and device drivers are the best solutions for your Realtek NIC, from our expert, Lindi Horton.
-
Should organizations separate technical from administrative security?
Learn from our expert how to organize technical security control in your business without hindering network and inter-departmental communication.
-
Is WPA2 secure enough for a commercial business wireless network?
Our expert explains whether industry standard WPA2 is secure enough for wireless commercial business networks, in this response.
-
Which Q&A brain dump sites will help me prepare for the CCNA exam?
Becoming a Cisco Certified Network Associates (CCNA) takes much more than memorizing brain dumps or taking short cuts to pass the exam. Get advice on the best way to approach CCNA certification fro...
-
How does CCIE certification help me find a network security job?
Understand how a CCIE (Cisco Certified Internetwork Expert) security certificate can aid you in pursuing a career in network security from our Cisco certification expert, David Minutella.
-
How can I hide my WLAN's SSID in an Aruba AP-61?
Learn the pros and cons of hiding your access point (AP) service set identifiers (SSIDs) on an Aruba AP-61, from our wireless network expert, Lisa Phifer.
-
WLAN QoS and SLA monitoring with 7/24 Wireless Quality Assurance costs
Learn how 7/24 Wireless Quality Assurance compares to traditional network monitoring methods in terms of cost effectiveness, in this expert response from Lisa Phifer.
-
What network equipment is needed to secure a small business LAN?
Learn how to effectively manage and secure a relatively small LAN that connects to the internet without compromising security.
-
Which configuration management tools map connected network devices?
Are there network management tools that provide configuration management mappings of connected network devices? Our network administration expert, Lindi Horton, explains.
-
How important are network infrastructure maps for engineers or admins?
Our network administration expert explains how important it is for an IT admin or engineer to have a network infrastructure map, in this response.
-
How to lock wireless routers
Learn how to limit connections to your WLAN and control access to your router, in this advice from our enterprise security expert, Michael Gregg.
-
How server virtualization improves efficiency in a client-server model
How can server virtualization benefit a business in a client-server model? Our network administration expert explains how virtualization can optimize productivity in this expert response.
-
BYOD security: Which VPN is best for you, IPsec or SSL?
By 2016, 40% of the workforce will be mobile. IPsec VPNs are being widely discussed for BYOD security. But should we also be talking about SSL VPNs?
-
Why should you care about SDN?
Expert Jim Damoulakis weighs in on the potential of software-defined networking, or SDN, and why you should care.
-
Can you really have security, convenience and BYOD?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?
Network Management Strategies for the CIO