December 2006

  • New Member Special Offer

    New Member Special Offer

  • Wireless network security -- Chapter 8 of 'Essential Computer Security'

    Starting with a brief overview of the wireless protocols and technology, this chapter will cover what's required to secure your own home wireless network to keep unauthorized users out of your netw...

  • Network waste to reach $100 billion

    Network overspending will cost enterprises more than $100 billion over the next five years, according to recent predictions by Gartner Inc.

  • NAC implementation slows as networking budgets grow

    Network Access Control (NAC) implementations will decrease, despite growth in networking budgets, according to TheInfoPro's Wave 2 Networking study.

  • star network

    A star network is a local area network (LAN) in which all nodes (workstations or other devices) are directly connected to a common central computer.

  • Cisco WLAN design best practices

    Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing ...

  • WLAN interference and clogged pipes -- happy holidays!

    WLAN interference caused by decorations and slowed traffic due to online shopping are just some of the network woes of the holidays.

  • Phishers and spambots -- appliances that fight back

    Most email security appliances are designed to deflect unsolicited inbound SMTP traffic. In this edition of our Security Spotlight Lisa Phifer examines the benefits of deploying an email security a...

  • Top expert Q&As of 2006

    SearchNetworking.com's Ask the Expert section is the place where our elite experts answer our reader's questions. They cover topics like network administration, security, network and systems manage...

  • Top 10 learning tools

    Explore our most popular in-depth information on topics such on bandwidth optimization, IP network design, network engineering, WLAN security, MPLS and more.

  • Top 10 technical tips of 2006

    Our most popular tech tips of 2006.

  • Troubleshooting Cisco networks -- Chapter 14 of 'Cisco: A Beginner's Guide, Fourth Edition'

    In this book excerpt you'll learn how to troubleshoot problems in a variety of Cisco configurations by running through some troubleshooting scenarios.

  • Intrusion detection systems -- introduction to IDS and IPCop

    This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) includin...

  • Top 10 news exclusives of 2006

    Our exclusive news items help you stay current on the latest happenings in the networking world, offering technical advice from experts in the field as well as best practices for choosing and imple...

  • The IT Guy: WAP placement

    In our premiere networking cartoon, IT guy Dave searches for the best place to put wireless routers.

  • The IT Guy: VoIP implementation

    In this networking cartoon, the IT guy deals with a common problem for networking pros involved in a VoIP implementation: User issues.

  • Windows Vista security settings

    Microsoft's Windows Vista is here. Here, Current Analysis senior analyst Andrew Braunberg discusses what network admins need to know about tightening up Vista security.

  • The IT Guy: Flying with your laptop

    In this networking cartoon, our IT guy, Dave, flies with a very fancy case for his laptop.

  • WAN acceleration scalability: Part 3

    As WAN acceleration becomes more critical to business operations, the average size and scope of deployment is steadily increasing. In this tip, we wrap up our series on considerations for scaling a...

  • CCNA: Earn more by knowing more

    Many already in the networking and telephony field feel they don't need to get CCNA certified, but participants in SearchNetworking.com's CCNA Video Mentor contest expressed not only their desire t...