-
Troubleshoot networks with the pathping command
You can troubleshoot networks with the pathping command, which works like a combination of ping and tracert.
-
OSI: Securing the stack, Layer 1
Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats.
-
VoWLAN: Preparing your network for a voice over wireles
If you are considering a voice over wireless LAN (VoWLAN) deployment, you must plan ahead to ensure the high call quality your users expect. In this tip, David Jacobs explains the three steps to a ...
-
Change your network adapter's IP information
To change a machine's TCP/IP settings, you can use a VBScript to modify the network adapter information on a computer.
-
BackTrack: Free security testing suite
Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and expl...
-
Data destruction
How often do we hear about sensitive data falling into the wrong hands? And that data is usually on laptops, imagine the embarrassment if that data was found on something that was thrown away? Cont...
-
Duplex mismatch
What is duplex, and what is the difference between half and full duplex? What is a duplex mismatch? How can autonegotiation help or hurt your network? How can you resolve duplex conflicts? In this ...
-
Network intrusion prevention: An allegory
Security expert Rich Loeber discusses the importance of computer intrusion prevention and provides steps for protecting your network -- as well as keeping geese off your beach.
-
Duplex mismatch: Stop the conflicts, part 2
Today, the majority of modern cabling supports full-duplex, and there is a significantly diminished need for half-duplex -- or at least, that is what one would like to think. In this column, Loki J...
-
Network engineering overview: Techniques for making cha
Network engineers are often faced with the task of making changes to the network with minimal downtime. Whether you are upgrading an Ethernet switch or adding a whole new building to your network, ...
-
Cellular data convergence: An introduction to wireless
The world of wireless data capabilities on the carrier networks is seeing a tremendous amount of growth as it relates to standards and service offerings. In this tip, Robbie Harrell sorts out the a...
-
Network engineering overview: Technology
Network engineering requires a firm grasp of technology. This overview covers frameworks, standards and products. This tip is the first in a four-part series on things network engineers need to kno...
-
Remote disaster recovery and prevention
This tip discusses the two most basic ways you can recover from, and fend off, disasters that can overtake a remotely-hosted system: backup and redundancy.
-
Three ways to improve wireless network access for your
Here are three things an administrator can do to improve your company's wireless strategy on the client side.
-
Planning Network Load Balancing clusters
Servers that use Windows Network Load Balancing can benefit from optimization. Servers should be optimized for their role, the types of applications they will run, and the anticipated local storage...
-
Network Access Quarantine Control vs. Network Access Pr
With the number of mobile devices and remote workers growing, network quarantining has been a popular topic lately. Contributor and NAQC expert Jonathan Hassell compares the features of NAQC with t...
-
Troubleshooting wireless networks: A systematic approac
Troubleshooting wireless networks can take up a lot of time for network operations staff with a wireless LAN (WLAN) environment. Wireless guru Lisa Phifer discusses the tools and processes involved...
-
The bot invasion
Bots are invading a computer near you. Microsoft MVP Tony Bradley explains the evolution of bot code, the rise of botnets and how you can prevent bots from infecting your networks.
-
Decentralizing patch management
Brien Posey explains reasons why centralized patch management is often ineffective in large or geographically dispersed networks and offers some alternative arrangements for these types of organiza...
-
DNS for a wireless network
DNS services are essential for building a secure wireless LAN. Our Router Expert provides complete instructions for setting up a DNS server, including implementing BIND, configuring a non-authorita...
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO