-
Network visibility thwarts crime, identifies unwanted traffic
Networking monitoring tools have helped Vanderbilt University's network team to uncover unwanted and troubling traffic. In some cases, the tools have turned the team into crime fighters.22 Aug 2006
-
Secure network against illegal users
Phifer gives advice on how to handle illegal users on a network.21 Aug 2006
-
Network engineering overview: Techniques for making changes
Network engineers are often faced with the task of making changes to the network with minimal downtime. Whether you are upgrading an Ethernet switch or adding a whole new building to your network, ...21 Aug 2006
-
QoS implementation basics
In this response, Lindi Horton discusses some of the basics of implementing Quality of Service.21 Aug 2006
-
Finding the culprit to network delays
In this response, Lindi Horton gives us some product options to find network delays.21 Aug 2006
-
Fast and secure FTP server options
Lindi Horton suggests certain options for FTP servers that need to be fast but secure.21 Aug 2006
-
Cable types for CAT5e
Learn about the different cable types for CAT5e cables in this Ask the Expert response from our network infrastructure and new technologies guru, Carrie Higbie.21 Aug 2006
-
How different 802.11 standards work in various channels
Here, Phifer explains how different 802.11 standards work with 5 MHz and 40 MHz wide channels.20 Aug 2006
-
Wireless LAN setup for hotels
Phifer discusses the requirements for WLAN setups in hotels.20 Aug 2006
-
Multicasting on a wireless network
In this response, Phifer discusses multicasting on a wireless network.20 Aug 2006
-
Differences between Wi-Fi and HPNA_338
Here, Phifer explains the difference between Wi-Fi and HPNA_338.20 Aug 2006
-
Difference between audits, assessments and pen tests
Gregg distinguishes the differences between audits and assessments.20 Aug 2006
-
What are the best tools to ensure maximum security in an organization?
Here, Gregg touches on the basics of network security building blocks.20 Aug 2006
-
What is a cause of crosstalk in UTP cables?
Higbie provides a useful link to understand crosstalk in UTP cables.20 Aug 2006
-
Preparing the Network for Pandemic Flu and Disaster Recovery1
Preparing the Network for Pandemic Flu and Disaster Recovery18 Aug 2006
-
Wireless network troubleshooting
Network operators often have the difficult task of troubleshooting wireless issues that arise not only on the wireless LAN but also with users and devices seeking access to it. Having knowledge of ...18 Aug 2006
-
Differences between open-source and commercial IDS
Here, Michael Gregg explains the differences between open-source and a commercial IDS.18 Aug 2006
-
Wireless security push fueled by paranoia
Wireless security became a necessity for Intermagnetics, but when the company used its access points to monitor the spectrum, performance suffered.17 Aug 2006
-
Firewall purchasing advice
In this Q&A, Michael Gregg offers quick advice about purchasing a firewall.17 Aug 2006
-
What structure can I follow for penetration testing?
In this question, Michael Gregg discusses the basics of penetration testing on your network.17 Aug 2006
Network Management Strategies for the CIO