Tips

  • Two-factor authentication and compliance: What it is an

    The Federal Financial Institutions Examination Council has mandated that federal institutions deploy two-factor authentication for online banking. But what constitutes two-factor authentication is ...

  • Troubleshooting routing

    Network troubleshooting can be challenging for a number of reasons, not the least of which is the lack of a standard methodology. In this tip, Tom Lancaster looks at some of the best and fastest wa...

  • Proper planning, communication help avoid user headache

    A recent, informal survey of SearchNetworking.com readers revealed that while admins deal with plenty of technical issues, their most common problems come from users who submit redundant and often ...

  • The QoS scam: Paying for reduced bandwidth

    On an unhealthy or broken network, quality of service (QoS) is a rudder on a sinking boat -- it fixes nothing and cannot resolve degradation issues. On a healthy, well-provisioned network, QoS is n...

  • How to ensure your next firewall isn't a dud

    A firewall can be an invaluable tool when it comes to securing your network. On the other hand, a less-than-stellar firewall can leave your network open to attack and leave you with a false sense o...

  • Six user headaches Windows admins can avoid

    SearchWinSystems.com's desktop management expert, Serdar Yegulalp, offers six tips for making an administrator's task of monitoring and restricting user rights easier.

  • Network monitoring freeware

    This collection of free network monitoring tools will help analyze, monitor and report on your network performance without spending a dime.

  • Troubleshooting a Windows-based network

    We've all been taught at one time or another that on a Windows network, if at least one domain controller within each domain is functional, then the domain itself should be functional. Sadly, this ...

  • Wireless LAN management: Managing security compliance

    Find out the security threats that need to be addressed to make your network compliant with security regulations.

  • 802.11 a and g bring more sweet spots for wireless acce

    An often-overlooked factor in placing wireless access points, the difference between the 802.11a, b and g specifications can mean substantial differences in both data rates and available channels. ...

  • Certifications that will earn you the most money

    Ed Tittel takes a look at the five network certifications that earned the most money in 2005.

  • IP network design, part 4: LAN design

    This final section of the IP network design series relates to the issues encountered with campus LAN design. The benefits of Ethernet switching over a traditional hub environment are first explaine...

  • Wireless access points: Placement checklist

    When planning to deploy wireless or tweak your existing deployment, the conventional wisdom is that you need a "site survey." If you're trying to locate the best places to put your wireless access ...

  • Protecting your network against spoofed IP packets

    These days, the vast majority of administrators go to great lengths to protect the files on their network. Typically, elaborate firewalls are used to keep outsiders away from file servers. The file...

  • Intrusion prevention devices

    Hackers are constantly at work developing new ways to attack your network, so guarding against these attacks requires eternal vigilance. Intrusion prevention devices are one essential element of de...

  • IP network design, part 3: Designing the WAN

    The wide area network (WAN) is the single biggest contributor to a corporate network's cost of ownership. Therefore, this is the area where the cost-versus-performance tradeoff is most pronounced a...

  • Implementing software restriction policies

    This tip explains how you can use software restriction policies to keep your workstations in pristine shape and cut down on help desk calls at the same time.

  • Using Netsh with Windows Firewall

    This tip examines how to configure and troubleshoot Windows Firewall using the Netsh command-line utility. The procedures covered apply to both the Windows XP Service Pack 2 and Windows Server 2003...

  • LAN connectivity problem

    ITKnowledge Exchange member "BinooDas1234" had connectivity issues with a troublesome LAN, and fellow techies jumped in to help out. But does the answer lie in the DNS configuration, the NIC driver...

  • Configuring a Cisco 1200 802.11g WLAN access point

    Our router expert continues his series on building a secure wireless LAN with a Linux base. This article explains how to utilize a single Cisco 1200 series access point to provide access to three d...