-
New security features in Internet Explorer 7
In Internet Explorer 7, Microsoft seems to have addressed many of the security issues that have plagued IE for the last decade. Of course only time will tell if IE 7 is really secure or not, but th...31 Mar 2006
-
What to do when Performance Monitor yields unexpected results
When the Performance Monitor built into Windows behaves in an unexpected manner, admins may have to look closely to find a logical explanation to the problem.31 Mar 2006
-
Power over Ethernet for network engineers
This introduction to Power over Ethernet (PoE) is directed toward network engineers and discusses how the technology works, its power capabilities and some benefits it provides for the network admi...31 Mar 2006
-
All-in-one anxiety
Every time I read about some great, new all-in-one product, like a multi-service router, I get a little skeptical.31 Mar 2006
-
Hack your storage network in the name of increased security
Information security expert Kevin Beaver discusses security tests you can perform and tools you can use to ethically hack your storage systems and uncover vulnerabilities you might not have discove...29 Mar 2006
-
Custom network security policy checklist
A well-designed security policy, commonly associated with the gpedit snap-in console, is a powerful tool in your network security arsenal. Using built-in tools found in Windows XP, you can create a...29 Mar 2006
-
Wireless 802.11 spec pushes enterprise networks forward
SearchNetworking.com News Editor Amanda Mitchell sits down with wireless guru Matthew Gast to chat about the impact of the 802.11 spec on enterprise networks.29 Mar 2006
-
Blocking online music access
While letting employees listen to music online may seem like a harmless way to boost morale, streaming audio drains network bandwidth. In this tip, your peers offer advice, tools and tactics you ca...29 Mar 2006
-
Alleviate network congestion on iSCSI SANs via switch settings
Careful configuration of an iSCSI SAN will usually preclude most problems. But if network performance is still slow, there are several adapter and switch settings that can help speed things up and ...29 Mar 2006
-
terminal
In data communications, a terminal is any device that terminates one end (sender or receiver) of a communicated signal.28 Mar 2006
-
Data theft prompts firm to lock down, protect network
After a disgruntled employee made off with several CDs' worth of critical data, a Michigan automotive data reseller realized it had to install better protection at the endpoints, not at the network...28 Mar 2006
-
How do virus-infected e-mails get past a firewall?
How do virus-infected e-mails get past a firewall?27 Mar 2006
-
Why can't our wireless NIC get an IP address?
Wireless association followed by DHCP failure is not uncommon. Learn why your wireless NIC is unable to get an IP address from an access point (AP) that it can see and detect a signal from, in this...27 Mar 2006
-
Overview of 802.11 networks - from 802.11 Wireless Networks: The Definitive Guide, 2nd Edition
This overview from 802.11 Wireless Networks: The Definitive Guide, 2nd Edition serves as an introduction to 802.11 networks. It defines terms used throughout discussions ot 802.11 and outlines the...27 Mar 2006
-
FastFacts on IPv6
Is now the time for your organization to migrate to IPv6? Not sure? Need some advice? Then you've come to the right place. This edition of Networkin FastFacts will help you make up your mind.27 Mar 2006
-
Is there really a big difference between cheap, residential-grade wireless APs and expensive, busine
Is there really a big difference between cheap, residential-grade wireless APs and expensive, business-grade wireless APs?27 Mar 2006
-
Can you help me understand the differences between WPA2 and Cisco's LEAP security? Is one better or
Can you help me understand the differences between WPA2 and Cisco's LEAP security? Is one better or easier or more secure than the other?27 Mar 2006
-
802.11 performance tuning - from 802.11 Wireless Networks: The Definitive Guide, 2nd Edition
This chapter from 802.11 Wireless Networks: The Definitive Guide, 2nd Edition discusses some of the administrative parameters that can tuned to improve the behavior of your wireless network.27 Mar 2006
-
Problems logging in to VPN?
Do you have problems logging on to the VPN? Learn why you might be unable to authenticate when logging in to internal servers through terminal services (RDP), in this expert answer with our network...27 Mar 2006
-
Power over Ethernet podcast
This podcast discusses the emergence of Power over Ethernet and its many benefits to enterprise networks. Is the technology ready yet for mainstream adoption? Is it ready yet for your network? Let'...27 Mar 2006
Network Management Strategies for the CIO