-
Layer 3 switches explained
Layer 3 switches are explained in this tip -- including the difference between a switch, a router and a Layer 3 router.
-
Securing your Layer 2 network: Don't overlook the basic
Before dropping substantial cash on a fancy surveillance system, most sensible home owners would ensure that their doors and windows were locked. Similarly, there are simple security measures you c...
-
Power over Ethernet for network engineers
This introduction to Power over Ethernet (PoE) is directed toward network engineers and discusses how the technology works, its power capabilities and some benefits it provides for the network admi...
-
New security features in Internet Explorer 7
In Internet Explorer 7, Microsoft seems to have addressed many of the security issues that have plagued IE for the last decade. Of course only time will tell if IE 7 is really secure or not, but th...
-
What to do when Performance Monitor yields unexpected r
When the Performance Monitor built into Windows behaves in an unexpected manner, admins may have to look closely to find a logical explanation to the problem.
-
Hack your storage network in the name of increased secu
Information security expert Kevin Beaver discusses security tests you can perform and tools you can use to ethically hack your storage systems and uncover vulnerabilities you might not have discove...
-
Custom network security policy checklist
A well-designed security policy, commonly associated with the gpedit snap-in console, is a powerful tool in your network security arsenal. Using built-in tools found in Windows XP, you can create a...
-
Blocking online music access
While letting employees listen to music online may seem like a harmless way to boost morale, streaming audio drains network bandwidth. In this tip, your peers offer advice, tools and tactics you ca...
-
Alleviate network congestion on iSCSI SANs via switch s
Careful configuration of an iSCSI SAN will usually preclude most problems. But if network performance is still slow, there are several adapter and switch settings that can help speed things up and ...
-
Deploying apps via Group Policy -- cost-effective, but
You can deploy applications using Group Policy. But without the proper planning, this is a good way to shoot yourself in the foot.
-
In the know with intranets
Small and midsized businesses can benefit most from intranets, which offer better productivity, knowledge sharing and money-saving resources.
-
Purchasing the right Wi-Fi client
Companies devote considerable attention to purchasing Wi-Fi access points, routers, and switches, giving far less thought to Wi-Fi client selection. But it takes two to tango: client devices have ...
-
Eight reasons to plan out your security testing
You would think that if you are taking the time to test your Windows networks for security vulnerabilities, that any testing is a good thing. Not so, says security testing expert Kevin Beaver. In t...
-
Designing a DMZ and using iptables
Our editors posted a question on ITKnowledge Exchange to help out "Ruhi" plan for a DMZ using iptables, and fellow techies jumped in to help out, providing excellent advice for DMZ design.
-
Using Snort, Nessus and Tripwire for network security
Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus a...
-
The most important security lesson for employees
Social engineering may be the most significant security threat organizations face when it comes to educating their employees. Security expert Michael Gregg explains why, and provides instructions f...
-
Know your wireless encryption options
Understanding wireless encryption is essential to deploying a secure wireless network. Contributor Tony Bradley breaks down the different encryption methods and explains why some are better than ot...
-
Introducing Vista's Network Center
In Windows Vista Microsoft has made it a lot easier to quickly gather information about how a workstation is connected to a network through a new component called the Network Center. This expert ti...
-
Power over Ethernet for network architects
David Jacobs discusses how Power over Ethernet (PoE) is defined by the 802.3af standard, then looks at how PoE can help network architects simplify power distribution and potentially save money.
-
Enterprise router buyer's guide
This tip provides a concise buyer's guide to companies and their products that compete in the enterprise and branch office routing arena, along with brief descriptions of those products and links t...
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO