Email Alerts
-
The bot invasion
Bots are invading a computer near you. Microsoft MVP Tony Bradley explains the evolution of bot code, the rise of botnets and how you can prevent bots from infecting your networks. Tip
-
Understanding VPN technologies and capabilities
Virtual Private Networks (VPNs) are the mainstay of the mobile environment. Enterprises across the world are looking for and finding a multitude of ways to provide the remote, mobile end user with secure access to corporate computing facilities and m... Tip
-
Anonymity programs and services for network engineers
Anonymity is very rarely discussed in the business world because in some respects, it is at odds with the ideas of non-repudiation and authentication. But in the interest of network security, administrators need to be familiar with the state of techn... Tip
-
How to move an SSL certificate between Exchange servers
SearchExchange.com contributor Serdar Yegulalp provides step-by-step instructions on how to move an SSL certificate from one Exchange server to another, and explains a couple of gotchas to watch out for during the process. Tip
-
Cisco PIX firewall configuration from scratch
Cisco PIX firewall configuration is discussed in this step-by-step tip. Learn how to configure a new PIX, out of the box. You will configure passwords, IP addresses, network address translation (NAT) and basic firewall rules. Tip
-
Freeware captures raw sockets and TCP/IP packets
SmartSniff allows you to capture TCP/IP packets that pass through your network adapter, and view the captured data as sequence of conversations between clients and servers. Tip
-
Getting along with the security pros
As a networking professional, you can't just focus on the nuts and bolts (or bits and bytes) end of what you do. As a high-level network engineer or manager, you will need to establish and maintain relationships with other departments in your company... Tip
-
Intrusion prevention management packages
Networks are continually under attack from hackers and viruses. Firewalls, anti-virus software and anti-spyware software prevent most attacks from doing any damage. But new types of attacks must be reported in a manner that makes clear to network man... Tip
-
Minimize Windows security testing's impact on performance
Testing security is a good thing, but if you're not careful you could adversely affect your Windows networks and systems. Contributor Kevin Beaver has extensive security testing experience and tells you how and when to test to ensure the slightest ne... Tip
-
How to (really) harden Windows clients
Hardening Windows clients with a long checklist or an auditor's suggestions might be overkill according to contributor Kevin Beaver. Take a look at his bare-minimum checklist and his recommendations for hardening clients according to vulnerability as... Tip
Network Management Strategies for the CIO