-
Application logging is critical in detecting hack attac
Now that networks are fairly well-protected, attackers are targeting application servers. In this tip, security expert Mike Chapple explains how implementing application layer logging is becoming a...
-
NetDirector, an introduction: Free, simple server manag
NetDirector provides a free, customizable, easy way for network and systems administrators to configure network services and manage groups of Linux, Solaris, or BSD servers. The open source tool is...
-
Understanding VPN technologies and capabilities
Virtual Private Networks (VPNs) are the mainstay of the mobile environment. Enterprises across the world are looking for and finding a multitude of ways to provide the remote, mobile end user with ...
-
Duplex mismatch: Why duplex conflicts plague the networ
Duplex mismatch problems -- caused by two ends of the Ethernet attempting a full-duplex connection, resulting in packet loss -- simply will not go away. After a decade of plaguing IP networks, dupl...
-
WAN acceleration: Enabling successful disaster recovery
Data replication and backup can be difficult to accomplish reliably because a large amount of information is sent across low bandwidth/high latency links. WAN acceleration can be an essential tool ...
-
Program helps admins control user privileges in Windows
Winternals Protection Manager allows administrators to define precisely how users can (or can't) do things with applications.
-
Breaking out of the data center
This article examines the trend among enterprises to have greater volumes of data residing outside their traditional data centers and in frontline environments. It discusses how enterprises are acc...
-
Anonymity programs and services for network engineers
Anonymity is very rarely discussed in the business world because in some respects, it is at odds with the ideas of non-repudiation and authentication. But in the interest of network security, admin...
-
IPsec and SSL VPNs: Solving remote access problems
In this presentation from Information Security Decisions, Joel Snyder, senior partner with consultancy Opus One offers insight on how to solve remote access problems.
-
How to move an SSL certificate between Exchange servers
SearchExchange.com contributor Serdar Yegulalp provides step-by-step instructions on how to move an SSL certificate from one Exchange server to another, and explains a couple of gotchas to watch ou...
-
Security and TCP/IP
Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP.
-
Wireless LAN usage reporting
Usage reporting on wireless local area networks (WLANs) is becoming increasingly important as organizations rely more and more on wireless communication for mission-critical and real-time applicati...
-
Open source routers: Booting tips and operational benef
There are advantages to using an open source router, as Tom Lancaster points out in this tip. Here, he shares tips for distributing, configuring and booting.
-
Cisco PIX firewall configuration from scratch
Cisco PIX firewall configuration is discussed in this step-by-step tip. Learn how to configure a new PIX, out of the box. You will configure passwords, IP addresses, network address translation (NA...
-
Tool helps administrators run applications with limited
A tool called RunAsLimitedUser allows administrators to run any application in a limited-user context.
-
Freeware captures raw sockets and TCP/IP packets
SmartSniff allows you to capture TCP/IP packets that pass through your network adapter, and view the captured data as sequence of conversations between clients and servers.
-
Getting along with the security pros
As a networking professional, you can't just focus on the nuts and bolts (or bits and bytes) end of what you do. As a high-level network engineer or manager, you will need to establish and maintain...
-
Troubleshooting "my network connection is slow" reports
A user-submitted script for troubleshooting "my network connection is slow" reports.
-
Five steps to stamp out unsafe Wi-Fi use
Lisa Phifer helps dispel the top myths of wireless security and explains five steps that network administrators can take to lead their users toward safer Wi-Fi usage.
-
Intrusion prevention management packages
Networks are continually under attack from hackers and viruses. Firewalls, anti-virus software and anti-spyware software prevent most attacks from doing any damage. But new types of attacks must be...
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO