-
Michael Gregg has more than 15 years experience in the IT field. Michael is the President of Superior Solutions, Inc., a Houston based training and consulting firm. He is an expert on networking, security, and Internet technologies. He holds two associates degrees, a bachelor's degree, and a master's degree. He presently maintains the following certifications: MCSE, MCT, CTT, A+, N+, CNA, CCNA, CIW Security Analyst, and TICSA.
He is a member of the Independent Computer Consulting Association and of the Texas Association of Educational Technology. When he's not training, consulting, or writing, Mike enjoys traveling. He is an avid music collector. His collection ranges from records, 8-track tapes, CD's, and MP3's.
-
Do you have a question for our experts?
-
- Website:
- http://www.thesolutionfirm.com/
- Blog:
- http://www.thesolutionfirm.com/blog/
- Follow:
Contributions from Michael Gregg
- How to lock wireless routers
- Are you on a domain name system (DNS) blacklist database?
- Where can I find a sample security audit report? How can I run my own?
- Why are TCP/IP networks considered unsecured?
- Troubleshooting networks: Can vendor software self-install firewalls?
- How can I block my competitor's IP address range from my website?
- What software monitors and locks users from accessing my router?
- Why do we need IP security at the network layer?
- What is a genetic algorithm and where can I learn more about them online?
- What's the difference between VPN pass-through and multi-tunneling?
- Why implementing adequate security challenges LAN administration
- What security measures are recommended for each level of the TCP/IP model?
- What are the best methods for handling rogue access points?
- How to interpret test scan results to assess network vulnerability
- What should I know before implementing a packet sniffer?
- Will WPA2-PSK keep wireless networks safe from war drivers?
- How to train intrusion detection systems (IDS)
- Can a broadband network installer compromise your network security?
- Do social networking products (blogs) pose network security threats?
- What types of network firewalls are there?
Network Management Strategies for the CIO