-
What is the difference between an IT audit and SOX audit?
What is the difference between an IT audit and SOX audit?16 Mar 2006
-
Best practices for network management in the non-profit world
Discover how the Washington, D.C.-based National Parks Conservation Association developed their network management solution to ensure network uptime and availability.16 Mar 2006
-
Designing a DMZ and using iptables
Our editors posted a question on ITKnowledge Exchange to help out "Ruhi" plan for a DMZ using iptables, and fellow techies jumped in to help out, providing excellent advice for DMZ design.15 Mar 2006
-
Using Snort, Nessus and Tripwire for network security
Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus a...15 Mar 2006
-
Could March Madness cripple the network?
CBS Sports this week will offer all games of the 2006 NCAA basketball tournament online as streaming video. But if end-users tune in, the network could drop out.15 Mar 2006
-
Guide to IP Network Design1
Guide to IP Network Design15 Mar 2006
-
How is application management changing the role of networking pros?
How is application management changing the role of networking pros?14 Mar 2006
-
The most important security lesson for employees
Social engineering may be the most significant security threat organizations face when it comes to educating their employees. Security expert Michael Gregg explains why, and provides instructions f...13 Mar 2006
-
Introducing Vista's Network Center
In Windows Vista Microsoft has made it a lot easier to quickly gather information about how a workstation is connected to a network through a new component called the Network Center. This expert ti...10 Mar 2006
-
Know your wireless encryption options
Understanding wireless encryption is essential to deploying a secure wireless network. Contributor Tony Bradley breaks down the different encryption methods and explains why some are better than ot...10 Mar 2006
-
IT and the Oscars
Some said it was the year for cowboys, while others pointed out all the portrayals of real individuals in the nominated films of the 78th annual Academy Awards, held Sunday, March 5, 2006. We could...08 Mar 2006
-
Quote of the day
Quote of the day08 Mar 2006
-
Power over Ethernet for network architects
David Jacobs discusses how Power over Ethernet (PoE) is defined by the 802.3af standard, then looks at how PoE can help network architects simplify power distribution and potentially save money.07 Mar 2006
-
Public security slip forces Georgia Capitol to lock down WLAN
More than three years after a TV news crew exposed security flaws in the WLAN at the Georgia State Capitol building, the governor's office is trying again to go wireless.07 Mar 2006
-
Enterprise router buyer's guide
This tip provides a concise buyer's guide to companies and their products that compete in the enterprise and branch office routing arena, along with brief descriptions of those products and links t...07 Mar 2006
-
Two-factor authentication and compliance: What it is and isn't
The Federal Financial Institutions Examination Council has mandated that federal institutions deploy two-factor authentication for online banking. But what constitutes two-factor authentication is ...06 Mar 2006
-
FastFacts on Power over Ethernet
Power up on Power over Ethernet with this edition of Networking FastFacts.06 Mar 2006
-
Staying apps aware keeps Continental in the air
Three years after getting slammed by the SQL Slammer worm, Continental's network is secure. ConSentry Network's role-based provisioning technology keeps apps, users in check.02 Mar 2006
-
What does the future hold for Power over Ethernet (PoE)?
What does the future hold for Power over Ethernet (PoE)? Find out from our network infrastructure and developing technologies guru, Carrie Higbie, in this Ask the Expert response.01 Mar 2006
-
Guide to IP Network Design
Guide to IP Network Design01 Mar 2006
Network Management Strategies for the CIO