Tips

  • Patch management: A preventive process

    Patch management is more than a one-time fix. Michael Gregg offers advice and tips on how to create a proactive patch management process to protect your networks.

  • Essential security testing tools for SMBs

    Kevin Beaver's security tool overview is jam-packed with detailed descriptions of who, what, why and how to use the tools.

  • Configuring and troubleshooting wireless LAN clients

    An understanding of wireless LAN (WLAN) client and WLAN access point communication mechanisms is critical to anyone attempting to initially connect or troubleshoot a WLAN connection. In this tip, R...

  • SMB Buying Decisions: WLAN security tools

    Wireless LAN security is critical for small and midsized businesses, which are often the target of unauthorized access attempts and denial-of-service attacks.

  • DHCP services for WLANs

    Learn how to configure Dynamic Host Configuration Protocol (DHCP) services as part of a WLAN implementation.

  • Internet access devices aplenty for SMBs

    There are options aplenty for Internet access devices for SMBs, with many applications, connections and value-adds at affordable prices.

  • Network monitoring with Nagios, part two

    Bernard Golden looks at example Nagios configuration in this tip.

  • WLAN usage monitoring

    In this tip, Lisa Phifer demonstrates how to monitor 802.11 network usage for accounting, capacity planning, and compliance reporting by combining traditional network and session monitoring techniq...

  • Network monitoring with Nagios, part one

    Bernard Golden discusses the usefulness and architecture of open source network monitoring tool Nagios.

  • TCPdump: Qualify traffic and create a traffic collectio

    In this excerpt from The router is the firewall, part 3 -- Configuring CBAC, router expert Michael J. Martin explains how to use the popular open source tool TCPdump to audit network traffic.

  • A router by any other name is still a router

    While many articles discuss what makes a switch a switch and a router a router, this article focuses on delineating the characteristics between enterprise and home devices.

  • Prevent network spoofing

    Network spoofing occurs when the attacker forges the source or destination address in the IP header, ultimately causing a Denial of Service. In this tip, security expert Michael Gregg explains how ...

  • New wireless products and standards

    New products and standards will help boost wireless security.

  • Network security 1-2-3

    Network security is more than just firewall protection. This tip offers the basics on services and strategies for securing networks on a small budget.

  • Nessus: Vulnerability scanning in the enterprise

    General advice for building an enterprise scanning program with the open source vulnerability scanner Nessus.

  • Wireless networks are watching you

    Location-based technology promises great boons for business and the public good -- but some consumers are still concerned about it infringing on their privacy.

  • Managing Nessus reports

    Vulnerability scanning with Nessus can produce mountains of data. Learn three tips for getting the most out of the open source vulnerability scanner and managing the data produced by this valuable ...

  • Getting started with Nessus

    Nessus, an open source vulnerability scanner, can scan a network for potential security risks and provide detailed reporting that enables you to remediate gaps in your corporation's security postur...

  • WLAN security tools: Buyers' guide for SMBs

    Wireless LAN security is critical for small and midsized businesses, which are often the target of unauthorized access attempts and denial-of-service attacks.

  • Check IT List: Network appliances for small offices

    As the supply and demand for network and security tools increases for small and midsized businesses, so do the options for SMB network appliances. Ed Tittel offers advice for your network setup.