-
Securing the internal Windows network
Hardening your network from the outside world is a good idea, but don't forget to watch out for internal threats. Security testing expert Kevin Beaver provides a testing to-do list for securing you...
-
How to recover your network after a security breach
If you have the time and money to invest in some of the more impressive network management systems, you can possibly recover your network after a security attack by clicking a few buttons. However,...
-
Troubleshooting switching
Switches can perform many very distinct functions, most of which have nothing to do with the academic definition of "switching." In order to troubleshoot your environment with a minimum of effort, ...
-
Mobile client security
As more companies employ a mobile workforce, security becomes a critical factor. Organizations are no longer looking for access mechanisms; they are looking for ways to secure the data over the mul...
-
Little known Microsoft security utilities
Microsoft makes a big deal of security, but some of its useful security utilities fly under the radar. Contributor Brien M. Posey highlights a few of the more valuable Microsoft tools and provides ...
-
Common Exchange mail delivery issues
This article discusses some common culprits of Exchange message delivery delays and failures.
-
Launch Internet Explorer in a separate process
Find out how to prevent one Internet Explorer from affecting other instances if it stops responding.
-
Cleansing an infected mail server
If your server is heavily infected, the sheer volume of infected messages can overwhelm the machine, and your antivirus software may not be able to keep pace with the server.
-
Tuning your network cyborg
IT managers should think carefully about how the human components of the system align with the hardware and software.
-
Test drive: Firefox enhancements make IE look like an '
This hands-on review of the newest version of Firefox finds the browser full of useful features, easy to use -- and an excellent cross-platform solution.
-
DHCP services for WLANs
Learn how to configure Dynamic Host Configuration Protocol (DHCP) services as part of a WLAN implementation.
-
SMB Buying Decisions: WLAN security tools
Wireless LAN security is critical for small and midsized businesses, which are often the target of unauthorized access attempts and denial-of-service attacks.
-
The top five most common Windows networking mistakes
Check out this top five and make sure these aren't mistakes you're making.
-
Expand number of Internet Explorer's 'zones'
When five Internet security zones aren't enough, here's how you can add more levels for finer control over content.
-
Patch management: A preventive process
Patch management is more than a one-time fix. Michael Gregg offers advice and tips on how to create a proactive patch management process to protect your networks.
-
Essential security testing tools for SMBs
Kevin Beaver's security tool overview is jam-packed with detailed descriptions of who, what, why and how to use the tools.
-
Configuring and troubleshooting wireless LAN clients
An understanding of wireless LAN (WLAN) client and WLAN access point communication mechanisms is critical to anyone attempting to initially connect or troubleshoot a WLAN connection. In this tip, R...
-
Internet access devices aplenty for SMBs
There are options aplenty for Internet access devices for SMBs, with many applications, connections and value-adds at affordable prices.
-
Network monitoring with Nagios, part two
Bernard Golden looks at example Nagios configuration in this tip.
-
Network monitoring with Nagios, part one
Bernard Golden discusses the usefulness and architecture of open source network monitoring tool Nagios.
-
Premises- or provider-based network management?
IT expert David Davis outlines the pros and cons of premises- versus provider-based network management.
-
Networking blogs: Reevaluating the optical market
This week, networking bloggers discuss a potential sea change for the optical market, and reveal some key tips for using custom config builders.
-
Data center spaghetti: Trials, tribulations of cabling
Switching out servers at a data center can go from ho-hum to disaster unless you have a tested cable management plan in place.
-
Networking blogs: Wi-Fi Certified 802.11ac is here
In this week's blog roundup, get expert insight on preparing for 802.11ac and solutions to CDN bandwidth issues.
Network Management Strategies for the CIO