• WAN acceleration: Enabling successful disaster recovery

    Data replication and backup can be difficult to accomplish reliably because a large amount of information is sent across low bandwidth/high latency links. WAN acceleration can be an essential tool ...

  • Program helps admins control user privileges in Windows

    Winternals Protection Manager allows administrators to define precisely how users can (or can't) do things with applications.

  • Breaking out of the data center

    This article examines the trend among enterprises to have greater volumes of data residing outside their traditional data centers and in frontline environments. It discusses how enterprises are acc...

  • Anonymity programs and services for network engineers

    Anonymity is very rarely discussed in the business world because in some respects, it is at odds with the ideas of non-repudiation and authentication. But in the interest of network security, admin...

  • IPsec and SSL VPNs: Solving remote access problems

    In this presentation from Information Security Decisions, Joel Snyder, senior partner with consultancy Opus One offers insight on how to solve remote access problems.

  • How to move an SSL certificate between Exchange servers contributor Serdar Yegulalp provides step-by-step instructions on how to move an SSL certificate from one Exchange server to another, and explains a couple of gotchas to watch ou...

  • Security and TCP/IP

    Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP.

  • Wireless LAN usage reporting

    Usage reporting on wireless local area networks (WLANs) is becoming increasingly important as organizations rely more and more on wireless communication for mission-critical and real-time applicati...

  • Open source routers: Booting tips and operational benef

    There are advantages to using an open source router, as Tom Lancaster points out in this tip. Here, he shares tips for distributing, configuring and booting.

  • Cisco PIX firewall configuration from scratch

    Cisco PIX firewall configuration is discussed in this step-by-step tip. Learn how to configure a new PIX, out of the box. You will configure passwords, IP addresses, network address translation (NA...

  • Tool helps administrators run applications with limited

    A tool called RunAsLimitedUser allows administrators to run any application in a limited-user context.

  • Freeware captures raw sockets and TCP/IP packets

    SmartSniff allows you to capture TCP/IP packets that pass through your network adapter, and view the captured data as sequence of conversations between clients and servers.

  • Getting along with the security pros

    As a networking professional, you can't just focus on the nuts and bolts (or bits and bytes) end of what you do. As a high-level network engineer or manager, you will need to establish and maintain...

  • Troubleshooting "my network connection is slow" reports

    A user-submitted script for troubleshooting "my network connection is slow" reports.

  • Five steps to stamp out unsafe Wi-Fi use

    Lisa Phifer helps dispel the top myths of wireless security and explains five steps that network administrators can take to lead their users toward safer Wi-Fi usage.

  • Intrusion prevention management packages

    Networks are continually under attack from hackers and viruses. Firewalls, anti-virus software and anti-spyware software prevent most attacks from doing any damage. But new types of attacks must be...

  • Get ready for TCP/IP in Windows Vista

    Network engineers in organizations moving toward Windows Vista need to know about changes made to the TCP/IP stack in the upcoming operating system. That good news is that these changes intend to p...

  • Making networks intelligent

    It is clear that autonomics and self-healing will require specific details of the network, not symptomatic generalities, for any remedial or provisioning action to be reliably executed. Meanwhile, ...

  • Reducing false positives in network monitoring

    Network managers need to be aware of the importance of choosing the right tool to monitor their system's internal counters. In this tip, Brien Posey narrows in on alert mechanisms for Windows serve...

  • Minimize Windows security testing's impact on performan

    Testing security is a good thing, but if you're not careful you could adversely affect your Windows networks and systems. Contributor Kevin Beaver has extensive security testing experience and tell...