-
network analyzer (protocol analyzer or packet analyzer)
A network analyzer is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicio...31 Aug 2006
-
Wireless Networks For Dummies, Chapter 1: Removing the tethers: Entering the wireless world
Removing the tethers: Entering the wireless world, Chapter 1 of Wireless Networks For Dummies by Barry Lewis and Peter Davis, explains the risks and the rewards of going wireless, helps you sort o...31 Aug 2006
-
How to get recertified as a CCNA.
Can I be recertified as a CCNA if I pass one of the CCNP exams, or must I take the CCNA over again to start my recertification as a CCNP?31 Aug 2006
-
The best book for CCDA certification
In this Ask the Expert, David Minutella recommends the best book resource for CCDA certification31 Aug 2006
-
Change your network adapter's IP information
To change a machine's TCP/IP settings, you can use a VBScript to modify the network adapter information on a computer.30 Aug 2006
-
Firewalls for Dummies, Chapter 1: Why do you need a firewall?
Firewalls for Dummies, Chapter 1, by Brian Komar, Ronald Beekelaar and Joern Wettern provides an excellent overview of what a firewall is, what it does and how it works. Further, it explains when y...30 Aug 2006
-
BackTrack: The gotta-have, free, network security tool you've never heard of
Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and expl...30 Aug 2006
-
FTAM (File Transfer Access Method)
File Transfer Access Method (FTAM), also known as File Transfer Access and Management or Electronic File Transfer Access Method (EFTAM), is an ISO standard that specifies methods of transfering ...29 Aug 2006
-
fault management
Fault management is the component of network management concerned with detecting, isolating and resolving problems... (Continued)29 Aug 2006
-
ProCurve rolls out three new switch series
ProCurve Networking by HP has added three new series of switches to its lineup.29 Aug 2006
-
Data destruction
How often do we hear about sensitive data falling into the wrong hands? And that data is usually on laptops, imagine the embarrassment if that data was found on something that was thrown away? Cont...29 Aug 2006
-
Data-leakage security threat to meet its protection match
Security-aware network managers fretting over headlines about intellectual property loss may find hope in the emerging data-leakage protection industry.29 Aug 2006
-
Duplex mismatch
What is duplex, and what is the difference between half and full duplex? What is a duplex mismatch? How can autonegotiation help or hurt your network? How can you resolve duplex conflicts? In this ...28 Aug 2006
-
Cisco patches flaws in multiple products
Attackers could corrupt files, cause a denial of service and bypass security restrictions via flaws in several of Cisco's firewall and VPN products.25 Aug 2006
-
Network intrusion prevention: An allegory
Security expert Rich Loeber discusses the importance of computer intrusion prevention and provides steps for protecting your network -- as well as keeping geese off your beach.25 Aug 2006
-
Microsoft and Cisco ready to demo NAP/NAC
There is harmony at last between two high-tech elephants. At a Boston security conference, Microsoft and Cisco will demonstrate how their competing security technologies will co-exist.24 Aug 2006
-
Remote access, WAN optimization, and network analysis news
Briefs: Remote access from Positive Networks helps with disaster recovery plans; Ipanema Technologies provides WAN optimization; Lancope rolls out network behavior analysis and response system tools.24 Aug 2006
-
Avoid congestion when fitting a new facility for wireless
Mike Puglia goes through the options of fitting a hospital for wireless offered to patients and visitors to avoid access point congestion.24 Aug 2006
-
Can you distinguish between 802.11n and 802.11g?
In this response, Mike Puglia describes the difference between 802.11n and 802.11g.24 Aug 2006
-
Duplex mismatch: Stop the conflicts, part 2
Today, the majority of modern cabling supports full-duplex, and there is a significantly diminished need for half-duplex -- or at least, that is what one would like to think. In this column, Loki J...23 Aug 2006
Network Management Strategies for the CIO