-
Vendors strive to automate wireless LAN troubleshooting and management
As wireless LANs evolve from being a convenience to a primary means of network access for enterprises, IT managers have learned that anything can go wrong and that troubleshooting has become a reso...03 Sep 2009
-
Can wireless adapters operate as client access points to make SoftAPs?
Learn how to simultaneously use two separate wireless adapters to connect to an access point and route or bridge traffic through the two adapters, from our expert Lisa Phifer.02 Sep 2009
-
Will using a VPN protect me against fake wireless hotspots?
Learn how to avoid data theft from phishing or connecting to a fake hotspot, by using a VPN, and various other secure browsing techniques, from our expert Lisa Phifer.02 Sep 2009
-
Is there a way to trace my stolen laptop computer?
Learn some useful preliminary techniques on how to safeguard your computer should it get stolen and make it recoverable using certain trace software, from our expert Michael Gregg.02 Sep 2009
-
How do I find the application on my network that's dropping packets?
Learn how to use Wireshark to trace dropped packets being sent from a PC on your network or an external application/service and secure SMTP ports, from our expert Michael Gregg.02 Sep 2009
-
How much do the CCIE exams cost?
Learn in depth details about the cost and logistics of how and where to take the two part CCIE (Cisco Certified Internetwork Expert) exam.02 Sep 2009
-
After the CCNA, can I pursue CWNA, Cisco's wireless certification?
Get advice on which wireless networking certificate to pursue after completing a CCNA (Cisco Certified Network Associate) course, from our expert David Minutella.02 Sep 2009
-
Extending NAC enforcement to network security devices
NAC enforcement tools can be extended to network security and management devices -- and in return user and machine identity can be integrated into firewalling, VPN, application access, intrusion pr...01 Sep 2009
Network Management Strategies for the CIO