-
WAN acceleration: Enabling successful disaster recovery
Data replication and backup can be difficult to accomplish reliably because a large amount of information is sent across low bandwidth/high latency links. WAN acceleration can be an essential tool ...30 Jun 2006
-
Fast track to our Learning Guides, Crash Courses and FastFacts
Here's a fast reference to our resources on networking and information technology training. You can find information on wireless technologies, networking certifications, routers, and more. If you know...29 Jun 2006
-
Program helps admins control user privileges in Windows
Winternals Protection Manager allows administrators to define precisely how users can (or can't) do things with applications.28 Jun 2006
-
Resilient network services essential for real-time success
Reconfiguring switches for resilient services will not only help the network work better now, but will prepare a business for the fast-approaching future of communications.27 Jun 2006
-
Breaking out of the data center
This article examines the trend among enterprises to have greater volumes of data residing outside their traditional data centers and in frontline environments. It discusses how enterprises are acc...27 Jun 2006
-
Bandwidth for video over IP may skyrocket
Video was a hot topic of conversation at the Cisco Networkers annual customer conference, with the uses for it as varied as the attendees. Several network architects and engineers are already exper...27 Jun 2006
-
Wireless and WiMax introduction
This chapter excerpt examines the driving forces behind WiMAX, including the desire for more bandwidth, an increasing demand for mobility, the need for global roaming, the requirement on the part o...26 Jun 2006
-
Anonymity programs and services for network engineers
Anonymity is very rarely discussed in the business world because in some respects, it is at odds with the ideas of non-repudiation and authentication. But in the interest of network security, admin...26 Jun 2006
-
Security and the TCP/IP stack
Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP.22 Jun 2006
-
IPsec and SSL VPNs: Solving remote access problems
In this presentation from Information Security Decisions, Joel Snyder, senior partner with consultancy Opus One offers insight on how to solve remote access problems.22 Jun 2006
-
How to move an SSL certificate between Exchange servers
SearchExchange.com contributor Serdar Yegulalp provides step-by-step instructions on how to move an SSL certificate from one Exchange server to another, and explains a couple of gotchas to watch ou...22 Jun 2006
-
Is telepresence mature enough to be Cisco's next named top technology?
Cisco is continuing a pervasive campaign to stay the stalwart No.1 course, pushing its aggressive market strategy and pinning short-term hopes on "telepresence," a cutting-edge videoconferencing te...22 Jun 2006
-
Wireless LAN usage reporting: Tools for capacity planning
Usage reporting on wireless local area networks (WLANs) is becoming increasingly important as organizations rely more and more on wireless communication for mission-critical and real-time applicati...21 Jun 2006
-
NAC boosts security for Sun Microsystems
Network Access Control has helped Sun Microsystems secure its network, despite advice from Burton Group analysts for network architects to hold off on NAC until the market matures and standards eme...20 Jun 2006
-
Open source routers: Booting tips and operational benefits
There are advantages to using an open source router, as Tom Lancaster points out in this tip. Here, he shares tips for distributing, configuring and booting.20 Jun 2006
-
Cisco PIX firewall configuration from scratch
Cisco PIX firewall configuration is discussed in this step-by-step tip. Learn how to configure a new PIX, out of the box. You will configure passwords, IP addresses, network address translation (NA...19 Jun 2006
-
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
This chapter describes some of the key operating fundamentals of TCP beginning with a discussion of how TCP handles data and introduces the concepts of streams, segments, and sequences. Further it ...19 Jun 2006
-
Wi-Fi firewalls boost wireless security by blocking airborne attacks
Wi-Fi firewalls, or wireless intrusion prevention systems, are servers that monitor and filter Wi-Fi traffic, blocking unauthorized 802.11 usage and attacks while still in the air. Learn about the ...16 Jun 2006
-
Tool helps administrators run applications with limited user privileges
A tool called RunAsLimitedUser allows administrators to run any application in a limited-user context.14 Jun 2006
-
Freeware captures raw sockets and TCP/IP packets
SmartSniff allows you to capture TCP/IP packets that pass through your network adapter, and view the captured data as sequence of conversations between clients and servers.14 Jun 2006
Network Management Strategies for the CIO