Tips

  • WLAN usage monitoring

    In this tip, Lisa Phifer demonstrates how to monitor 802.11 network usage for accounting, capacity planning, and compliance reporting by combining traditional network and session monitoring techniq...

  • TCPdump: Qualify traffic and create a traffic collectio

    In this excerpt from The router is the firewall, part 3 -- Configuring CBAC, router expert Michael J. Martin explains how to use the popular open source tool TCPdump to audit network traffic.

  • A router by any other name is still a router

    While many articles discuss what makes a switch a switch and a router a router, this article focuses on delineating the characteristics between enterprise and home devices.

  • Prevent network spoofing

    Network spoofing occurs when the attacker forges the source or destination address in the IP header, ultimately causing a Denial of Service. In this tip, security expert Michael Gregg explains how ...

  • New wireless products and standards

    New products and standards will help boost wireless security.

  • Network security 1-2-3

    Network security is more than just firewall protection. This tip offers the basics on services and strategies for securing networks on a small budget.

  • Nessus: Vulnerability scanning in the enterprise

    General advice for building an enterprise scanning program with the open source vulnerability scanner Nessus.

  • Wireless networks are watching you

    Location-based technology promises great boons for business and the public good -- but some consumers are still concerned about it infringing on their privacy.

  • Managing Nessus reports

    Vulnerability scanning with Nessus can produce mountains of data. Learn three tips for getting the most out of the open source vulnerability scanner and managing the data produced by this valuable ...

  • Getting started with Nessus

    Nessus, an open source vulnerability scanner, can scan a network for potential security risks and provide detailed reporting that enables you to remediate gaps in your corporation's security postur...

  • WLAN security tools: Buyers' guide for SMBs

    Wireless LAN security is critical for small and midsized businesses, which are often the target of unauthorized access attempts and denial-of-service attacks.

  • Check IT List: Network appliances for small offices

    As the supply and demand for network and security tools increases for small and midsized businesses, so do the options for SMB network appliances. Ed Tittel offers advice for your network setup.

  • Layer 3 switches explained

    Layer 3 switches are explained in this tip -- including the difference between a switch, a router and a Layer 3 router.

  • Securing your Layer 2 network: Don't overlook the basic

    Before dropping substantial cash on a fancy surveillance system, most sensible home owners would ensure that their doors and windows were locked. Similarly, there are simple security measures you c...

  • What to do when Performance Monitor yields unexpected r

    When the Performance Monitor built into Windows behaves in an unexpected manner, admins may have to look closely to find a logical explanation to the problem.

  • Power over Ethernet for network engineers

    This introduction to Power over Ethernet (PoE) is directed toward network engineers and discusses how the technology works, its power capabilities and some benefits it provides for the network admi...

  • New security features in Internet Explorer 7

    In Internet Explorer 7, Microsoft seems to have addressed many of the security issues that have plagued IE for the last decade. Of course only time will tell if IE 7 is really secure or not, but th...

  • Hack your storage network in the name of increased secu

    Information security expert Kevin Beaver discusses security tests you can perform and tools you can use to ethically hack your storage systems and uncover vulnerabilities you might not have discove...

  • Blocking online music access

    While letting employees listen to music online may seem like a harmless way to boost morale, streaming audio drains network bandwidth. In this tip, your peers offer advice, tools and tactics you ca...

  • Alleviate network congestion on iSCSI SANs via switch s

    Careful configuration of an iSCSI SAN will usually preclude most problems. But if network performance is still slow, there are several adapter and switch settings that can help speed things up and ...