Tips

  • Troubleshoot networks with the pathping command

    You can troubleshoot networks with the pathping command, which works like a combination of ping and tracert.

  • OSI: Securing the stack, Layer 1

    Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats.

  • VoWLAN: Preparing your network for a voice over wireles

    If you are considering a voice over wireless LAN (VoWLAN) deployment, you must plan ahead to ensure the high call quality your users expect. In this tip, David Jacobs explains the three steps to a ...

  • Change your network adapter's IP information

    To change a machine's TCP/IP settings, you can use a VBScript to modify the network adapter information on a computer.

  • BackTrack: Free security testing suite

    Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and expl...

  • Data destruction

    How often do we hear about sensitive data falling into the wrong hands? And that data is usually on laptops, imagine the embarrassment if that data was found on something that was thrown away? Cont...

  • Duplex mismatch

    What is duplex, and what is the difference between half and full duplex? What is a duplex mismatch? How can autonegotiation help or hurt your network? How can you resolve duplex conflicts? In this ...

  • Network intrusion prevention: An allegory

    Security expert Rich Loeber discusses the importance of computer intrusion prevention and provides steps for protecting your network -- as well as keeping geese off your beach.

  • Duplex mismatch: Stop the conflicts, part 2

    Today, the majority of modern cabling supports full-duplex, and there is a significantly diminished need for half-duplex -- or at least, that is what one would like to think. In this column, Loki J...

  • Network engineering overview: Techniques for making cha

    Network engineers are often faced with the task of making changes to the network with minimal downtime. Whether you are upgrading an Ethernet switch or adding a whole new building to your network, ...

  • Cellular data convergence: An introduction to wireless

    The world of wireless data capabilities on the carrier networks is seeing a tremendous amount of growth as it relates to standards and service offerings. In this tip, Robbie Harrell sorts out the a...

  • Network engineering overview: Technology

    Network engineering requires a firm grasp of technology. This overview covers frameworks, standards and products. This tip is the first in a four-part series on things network engineers need to kno...

  • Remote disaster recovery and prevention

    This tip discusses the two most basic ways you can recover from, and fend off, disasters that can overtake a remotely-hosted system: backup and redundancy.

  • Three ways to improve wireless network access for your

    Here are three things an administrator can do to improve your company's wireless strategy on the client side.

  • Planning Network Load Balancing clusters

    Servers that use Windows Network Load Balancing can benefit from optimization. Servers should be optimized for their role, the types of applications they will run, and the anticipated local storage...

  • Network Access Quarantine Control vs. Network Access Pr

    With the number of mobile devices and remote workers growing, network quarantining has been a popular topic lately. Contributor and NAQC expert Jonathan Hassell compares the features of NAQC with t...

  • Troubleshooting wireless networks: A systematic approac

    Troubleshooting wireless networks can take up a lot of time for network operations staff with a wireless LAN (WLAN) environment. Wireless guru Lisa Phifer discusses the tools and processes involved...

  • The bot invasion

    Bots are invading a computer near you. Microsoft MVP Tony Bradley explains the evolution of bot code, the rise of botnets and how you can prevent bots from infecting your networks.

  • DNS for a wireless network

    DNS services are essential for building a secure wireless LAN. Our Router Expert provides complete instructions for setting up a DNS server, including implementing BIND, configuring a non-authorita...

  • Decentralizing patch management

    Brien Posey explains reasons why centralized patch management is often ineffective in large or geographically dispersed networks and offers some alternative arrangements for these types of organiza...