July 2006

  • Network Access Quarantine Control vs. Network Access Protection

    With the number of mobile devices and remote workers growing, network quarantining has been a popular topic lately. Contributor and NAQC expert Jonathan Hassell compares the features of NAQC with t...

  • Troubleshooting wireless networks: A systematic approach

    Troubleshooting wireless networks can take up a lot of time for network operations staff with a wireless LAN (WLAN) environment. Wireless guru Lisa Phifer discusses the tools and processes involved...

  • Network Virtualization, Chapter 3: A basic virtualized enterprise

    In this excerpt from Network Virtualization by Victor Moreno and Kumar Reddy, learn the technical requirements posed by the need to virtualize the network, as well as an architectural framework com...

  • The bot invasion

    Bots are invading a computer near you. Microsoft MVP Tony Bradley explains the evolution of bot code, the rise of botnets and how you can prevent bots from infecting your networks.

  • Network management gets easier thanks to new standards

    Large or small, companies are faced with managing networks that, thanks to dropping hardware prices, are forever growing in size and complexity. Steve Rokov, marketing director for Avocent's embedd...

  • Network security vs. network performance -- the line is blurring

    Securing your network is vital to your organizations livelihood, survival and future. But often, while securing the network, network performance is affected in adverse ways. Finding a happy medium ...

  • terminal proxy server (TPS)

    A terminal proxy server (TPS) is a program that acts as an interface for voice over Internet Protocol (VoIP) telephone sets... (Continued)

  • Network policy: 'No wireless' restriction enforced at Blue Cross

    Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it -- until a team of auditors said the company had better do something.

  • Open source router challenges proprietary networking market

    Vyatta is taking on the midrange routing market, offering an open source enterprise routing alternative for companies seeking more flexibility than has traditionally been possible with proprietary ...

  • router

    In packet-switched networks such as the Internet, a router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward...

  • neural network

    In information technology, a neural network is a system of programs and data structures that approximates the operation of the human brain.

  • Decentralizing patch management

    Brien Posey explains reasons why centralized patch management is often ineffective in large or geographically dispersed networks and offers some alternative arrangements for these types of organiza...

  • DNS for a wireless network: Router Expert

    DNS services are essential for building a secure wireless LAN. Our Router Expert provides complete instructions for setting up a DNS server, including implementing BIND, configuring a non-authorita...

  • All-in-One Guide: VPNs

    All-in-One Guide: VPNs

  • Identity management appliances reduce password cost

    An identity management appliance that's well-implemented can eliminate password administration overhead while strengthening network security and improving productivity. Learn about the benefits of ...

  • Cisco's NAC play: Good for users, or just for Cisco's bottom line?

    Expert opinion on how subtle moves in Cisco's NAC department suggest that the company wants to be a major security player -- selling lots and lots of equipment in the process.

  • Cisco NAC appliance secures enterprise networks

    Cisco NAC as a framework is a daunting task. But it was made easier with its latest NAC 4.0 appliance, which analysts say can ease the NAC transition for network engineers.

  • Open source network tools

    Some of the most commonly used, enterprise-ready open source tools are used for networking applications; likewise, many networking tasks can be accomplished quickly and cheaply using open source to...

  • Detecting hack attacks: Application logging is critical

    Now that networks are fairly well-protected, attackers are targeting application servers. In this tip, security expert Mike Chapple explains how implementing application layer logging is becoming a...

  • NetDirector, an introduction: Free, simple server management

    NetDirector provides a free, customizable, easy way for network and systems administrators to configure network services and manage groups of Linux, Solaris, or BSD servers. The open source tool is...