Tips

  • Managing processes and tasks in Windows Vista

    This article looks at new capabilities in Windows Vista for managing processes and scheduling tasks and how administrators can use these capabilities for maintaining and troubleshooting systems.

  • Sharpening your security skills

    Unique skills and abilities can make a real difference in your marketability in today's challenging workplace, particularly where security is concerned. Kicking off his series, "Defending your netw...

  • How to (really) harden Windows clients

    Hardening Windows clients with a long checklist or an auditor's suggestions might be overkill according to contributor Kevin Beaver. Take a look at his bare-minimum checklist and his recommendation...

  • Nmap: A valuable open source tool for network security

    Open source tool Nmap is a popular choice amongst hackers and security pros alike for network mapping and testing for network vulnerabilities.

  • IEEE 802.3at: Power over Ethernet plus

    802.3af Power over Ethernet (PoE) has been widely adopted for powering VoIP phones, wireless access points and a number of other network-connected products. But it provides a limited amount of powe...

  • Using IDS as a hack detection tool

    Intrusion-detection systems (IDS) play a critical role in protecting the IT infrastructure. In this tip, security expert Michael Gregg discusses the types of IDS, how they work and how to get start...

  • Troubleshooting WLAN connectivity on the network

    This tip looks at potentially troublesome areas an admin will want to consider when troubleshooting WLAN connectivity on the network: the access point (AP), the LAN, the authentication server and r...

  • Defining adequate security controls

    Because of the changing nature of technology, the language in the Sarbanes-Oxley Act is purposefully vague. This article explores the meaning of adequate security controls and what is required for ...

  • Securing the internal Windows network

    Hardening your network from the outside world is a good idea, but don't forget to watch out for internal threats. Security testing expert Kevin Beaver provides a testing to-do list for securing you...

  • How to recover your network after a security breach

    If you have the time and money to invest in some of the more impressive network management systems, you can possibly recover your network after a security attack by clicking a few buttons. However,...

  • Troubleshooting switching

    Switches can perform many very distinct functions, most of which have nothing to do with the academic definition of "switching." In order to troubleshoot your environment with a minimum of effort, ...

  • Mobile client security

    As more companies employ a mobile workforce, security becomes a critical factor. Organizations are no longer looking for access mechanisms; they are looking for ways to secure the data over the mul...

  • Little known Microsoft security utilities

    Microsoft makes a big deal of security, but some of its useful security utilities fly under the radar. Contributor Brien M. Posey highlights a few of the more valuable Microsoft tools and provides ...

  • Common Exchange mail delivery issues

    This article discusses some common culprits of Exchange message delivery delays and failures.

  • Cleansing an infected mail server

    If your server is heavily infected, the sheer volume of infected messages can overwhelm the machine, and your antivirus software may not be able to keep pace with the server.

  • Tuning your network cyborg

    IT managers should think carefully about how the human components of the system align with the hardware and software.

  • Test drive: Firefox enhancements make IE look like an '

    This hands-on review of the newest version of Firefox finds the browser full of useful features, easy to use -- and an excellent cross-platform solution.

  • Launch Internet Explorer in a separate process

    Find out how to prevent one Internet Explorer from affecting other instances if it stops responding.

  • The top five most common Windows networking mistakes

    Check out this top five and make sure these aren't mistakes you're making.

  • Expand number of Internet Explorer's 'zones'

    When five Internet security zones aren't enough, here's how you can add more levels for finer control over content.