-
Patch management: A preventive process
Patch management is more than a one-time fix. Michael Gregg offers advice and tips on how to create a proactive patch management process to protect your networks.
-
Essential security testing tools for SMBs
Kevin Beaver's security tool overview is jam-packed with detailed descriptions of who, what, why and how to use the tools.
-
Configuring and troubleshooting wireless LAN clients
An understanding of wireless LAN (WLAN) client and WLAN access point communication mechanisms is critical to anyone attempting to initially connect or troubleshoot a WLAN connection. In this tip, R...
-
SMB Buying Decisions: WLAN security tools
Wireless LAN security is critical for small and midsized businesses, which are often the target of unauthorized access attempts and denial-of-service attacks.
-
DHCP services for WLANs
Learn how to configure Dynamic Host Configuration Protocol (DHCP) services as part of a WLAN implementation.
-
Internet access devices aplenty for SMBs
There are options aplenty for Internet access devices for SMBs, with many applications, connections and value-adds at affordable prices.
-
Network monitoring with Nagios, part two
Bernard Golden looks at example Nagios configuration in this tip.
-
WLAN usage monitoring
In this tip, Lisa Phifer demonstrates how to monitor 802.11 network usage for accounting, capacity planning, and compliance reporting by combining traditional network and session monitoring techniq...
-
Network monitoring with Nagios, part one
Bernard Golden discusses the usefulness and architecture of open source network monitoring tool Nagios.
-
TCPdump: Qualify traffic and create a traffic collectio
In this excerpt from The router is the firewall, part 3 -- Configuring CBAC, router expert Michael J. Martin explains how to use the popular open source tool TCPdump to audit network traffic.
-
A router by any other name is still a router
While many articles discuss what makes a switch a switch and a router a router, this article focuses on delineating the characteristics between enterprise and home devices.
-
Prevent network spoofing
Network spoofing occurs when the attacker forges the source or destination address in the IP header, ultimately causing a Denial of Service. In this tip, security expert Michael Gregg explains how ...
-
New wireless products and standards
New products and standards will help boost wireless security.
-
Network security 1-2-3
Network security is more than just firewall protection. This tip offers the basics on services and strategies for securing networks on a small budget.
-
Nessus: Vulnerability scanning in the enterprise
General advice for building an enterprise scanning program with the open source vulnerability scanner Nessus.
-
Wireless networks are watching you
Location-based technology promises great boons for business and the public good -- but some consumers are still concerned about it infringing on their privacy.
-
Managing Nessus reports
Vulnerability scanning with Nessus can produce mountains of data. Learn three tips for getting the most out of the open source vulnerability scanner and managing the data produced by this valuable ...
-
Getting started with Nessus
Nessus, an open source vulnerability scanner, can scan a network for potential security risks and provide detailed reporting that enables you to remediate gaps in your corporation's security postur...
-
WLAN security tools: Buyers' guide for SMBs
Wireless LAN security is critical for small and midsized businesses, which are often the target of unauthorized access attempts and denial-of-service attacks.
-
Check IT List: Network appliances for small offices
As the supply and demand for network and security tools increases for small and midsized businesses, so do the options for SMB network appliances. Ed Tittel offers advice for your network setup.
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO