Tips

  • Layer 3 switches explained

    Layer 3 switches are explained in this tip -- including the difference between a switch, a router and a Layer 3 router.

  • Securing your Layer 2 network: Don't overlook the basic

    Before dropping substantial cash on a fancy surveillance system, most sensible home owners would ensure that their doors and windows were locked. Similarly, there are simple security measures you c...

  • Power over Ethernet for network engineers

    This introduction to Power over Ethernet (PoE) is directed toward network engineers and discusses how the technology works, its power capabilities and some benefits it provides for the network admi...

  • New security features in Internet Explorer 7

    In Internet Explorer 7, Microsoft seems to have addressed many of the security issues that have plagued IE for the last decade. Of course only time will tell if IE 7 is really secure or not, but th...

  • What to do when Performance Monitor yields unexpected r

    When the Performance Monitor built into Windows behaves in an unexpected manner, admins may have to look closely to find a logical explanation to the problem.

  • Hack your storage network in the name of increased secu

    Information security expert Kevin Beaver discusses security tests you can perform and tools you can use to ethically hack your storage systems and uncover vulnerabilities you might not have discove...

  • Custom network security policy checklist

    A well-designed security policy, commonly associated with the gpedit snap-in console, is a powerful tool in your network security arsenal. Using built-in tools found in Windows XP, you can create a...

  • Blocking online music access

    While letting employees listen to music online may seem like a harmless way to boost morale, streaming audio drains network bandwidth. In this tip, your peers offer advice, tools and tactics you ca...

  • Alleviate network congestion on iSCSI SANs via switch s

    Careful configuration of an iSCSI SAN will usually preclude most problems. But if network performance is still slow, there are several adapter and switch settings that can help speed things up and ...

  • Deploying apps via Group Policy -- cost-effective, but

    You can deploy applications using Group Policy. But without the proper planning, this is a good way to shoot yourself in the foot.

  • In the know with intranets

    Small and midsized businesses can benefit most from intranets, which offer better productivity, knowledge sharing and money-saving resources.

  • Purchasing the right Wi-Fi client

    Companies devote considerable attention to purchasing Wi-Fi access points, routers, and switches, giving far less thought to Wi-Fi client selection. But it takes two to tango: client devices have ...

  • Eight reasons to plan out your security testing

    You would think that if you are taking the time to test your Windows networks for security vulnerabilities, that any testing is a good thing. Not so, says security testing expert Kevin Beaver. In t...

  • Designing a DMZ and using iptables

    Our editors posted a question on ITKnowledge Exchange to help out "Ruhi" plan for a DMZ using iptables, and fellow techies jumped in to help out, providing excellent advice for DMZ design.

  • Using Snort, Nessus and Tripwire for network security

    Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus a...

  • The most important security lesson for employees

    Social engineering may be the most significant security threat organizations face when it comes to educating their employees. Security expert Michael Gregg explains why, and provides instructions f...

  • Know your wireless encryption options

    Understanding wireless encryption is essential to deploying a secure wireless network. Contributor Tony Bradley breaks down the different encryption methods and explains why some are better than ot...

  • Introducing Vista's Network Center

    In Windows Vista Microsoft has made it a lot easier to quickly gather information about how a workstation is connected to a network through a new component called the Network Center. This expert ti...

  • Power over Ethernet for network architects

    David Jacobs discusses how Power over Ethernet (PoE) is defined by the 802.3af standard, then looks at how PoE can help network architects simplify power distribution and potentially save money.

  • Enterprise router buyer's guide

    This tip provides a concise buyer's guide to companies and their products that compete in the enterprise and branch office routing arena, along with brief descriptions of those products and links t...