Network Security Best Practices and Products

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • BackTrack: The gotta-have, free, network security tool you've never heard of

    Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. 

  • Data destruction

    How often do we hear about sensitive data falling into the wrong hands? And that data is usually on laptops, imagine the embarrassment if that data was found on something that was thrown away? Contributor Brien Posey explains the need for proper data... 

  • Network intrusion prevention: An allegory

    Security expert Rich Loeber discusses the importance of computer intrusion prevention and provides steps for protecting your network -- as well as keeping geese off your beach. 

  • Network Access Quarantine Control vs. Network Access Protection

    With the number of mobile devices and remote workers growing, network quarantining has been a popular topic lately. Contributor and NAQC expert Jonathan Hassell compares the features of NAQC with the forthcoming NAP program and advises on if and when... 

  • The bot invasion

    Bots are invading a computer near you. Microsoft MVP Tony Bradley explains the evolution of bot code, the rise of botnets and how you can prevent bots from infecting your networks. 

  • Understanding VPN technologies and capabilities

    Virtual Private Networks (VPNs) are the mainstay of the mobile environment. Enterprises across the world are looking for and finding a multitude of ways to provide the remote, mobile end user with secure access to corporate computing facilities and m... 

  • Anonymity programs and services for network engineers

    Anonymity is very rarely discussed in the business world because in some respects, it is at odds with the ideas of non-repudiation and authentication. But in the interest of network security, administrators need to be familiar with the state of techn... 

  • How to move an SSL certificate between Exchange servers

    SearchExchange.com contributor Serdar Yegulalp provides step-by-step instructions on how to move an SSL certificate from one Exchange server to another, and explains a couple of gotchas to watch out for during the process. 

  • Cisco PIX firewall configuration from scratch

    Cisco PIX firewall configuration is discussed in this step-by-step tip. Learn how to configure a new PIX, out of the box. You will configure passwords, IP addresses, network address translation (NAT) and basic firewall rules. 

  • Freeware captures raw sockets and TCP/IP packets

    SmartSniff allows you to capture TCP/IP packets that pass through your network adapter, and view the captured data as sequence of conversations between clients and servers.