-
Secure Cisco routers against IOS flaw attack
Learn how to secure Cisco routers against the recently announced Cisco IOS flaw, which could be exploited by hackers. Find out how to determine which routers are affected and ways to protect yourse...
-
Network analysis -- Enhancing security assessments
Network security assessment doesn't have to rely on expensive automated tools. In this tip, learn how to use data from freely available tools to produce a comprehensive view of network security.
-
Upcoming wireless standards promise managed WLANs
Widespread deployment of wireless networks has created problems in office buildings, apartments and shopping areas, where multiple wireless networks share the air. It is anticipated that the proble...
-
IP address depletion hastens IPv6 adoption
IPv4 IP address depletion is hastening the need to switch from IPv4 to IPv6. In this column, Loki Jorgenson explains where we are now in terms of IPv6 readiness and provides some insight on how muc...
-
Windows Vista, IPv6 lead to network performance problem
Windows Vista, which runs on parallel IPv6 and IPv4 protocol stacks, can create network performance problems when used with older routers.
-
Cleaning up: Managing Windows networks using scripts, p
In the continuation of his series on managing different aspects of Windows networks using scripts, Mitch Tulloch walks you through the steps of "tidying up" a simple script that changes the IP addr...
-
DNS monitoring: If it's slow, everything is slow
Techniques for monitoring DNS performance, and the impact on applications when it is not performing properly, are explored in this tip.
-
Network behavioral analysis project deployment
Deploying a successful network behavorial analysis project begins with cooperation and involvement from many teams within your organization. For a technical project, some of the team members are ob...
-
TCP/IP troubleshooting: A structured approach -- Using
Limitations of the Repair feature of Windows network connections can be overcome by using Netdiag.exe, a network connectivity troubleshooting tool that is part of the Windows Support Tools. Netdiag...
-
Network auditing and incident management: Pre-plan your
Network auditing and incident management can prevent unplanned nework meltdowns and outages, and help make your life easier. Five useful building blocks can help you to construct a successful incid...
-
Network monitoring best practices
Network monitoring best practices are outlined by expert Loki Jorgenson.
-
Wireless security -- Defending Wi-Fi clients
When it comes to wireless security, considerable attention has been paid to encrypting data, authenticating users, restricting access, and detecting rogue access points. As these network and link d...
-
Managing Windows networks using scripts -- The basics
Learning to use scripts can make the life of a network administrator a lot easier by allowing you to automate daily administration tasks. This tip begins a series on using scripts to manage Windows...
-
Selling network certification: How to talk up your cred
Network certification has its benefits, but certification alone no longer guarantees employment. In this tip, learn how to justify your credentials' value.
-
Choosing WAN providers: Key questions to ask
When evaluating carrier services for the WAN, it's imperative to ask some key questions regarding customer service, service-level agreements, global coverage, management and monitoring capabilities...
-
Configure Cisco wireless bridges for point-to-point net
Point-to-point wireless bridging is ideal for many business networks. In this tip, learn how point-to-point wireless bridging can help you, the pros and cons of using it, and the configuration of t...
-
Cisco interface addressing
A look at the various commands that can be used to address Cisco router interfaces on the WAN and LAN and when to use each.
-
Repairing network connections
Learn how the Repair feature works for repairing network connections on Windows platforms in this tip from the WindowsNetworking.com series on TCP/IP troubleshooting.
-
Reduce branch office threats in 10 steps
Many organizations host business-critical applications in branch offices, but doing so exposes them to many new threats. Here we examine the potential threats to your branch offices and discuss 10 ...
-
OSI: Securing the Stack, Layer 8 -- Social engineering,
Network security is essential at every layer of the OSI model, including the mythical eighth layer, where users interact with technology. Since hackers can use social engineering to exploit people,...
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO