-
Two-factor authentication and compliance: What it is an
The Federal Financial Institutions Examination Council has mandated that federal institutions deploy two-factor authentication for online banking. But what constitutes two-factor authentication is ...
-
Troubleshooting routing
Network troubleshooting can be challenging for a number of reasons, not the least of which is the lack of a standard methodology. In this tip, Tom Lancaster looks at some of the best and fastest wa...
-
Proper planning, communication help avoid user headache
A recent, informal survey of SearchNetworking.com readers revealed that while admins deal with plenty of technical issues, their most common problems come from users who submit redundant and often ...
-
The QoS scam: Paying for reduced bandwidth
On an unhealthy or broken network, quality of service (QoS) is a rudder on a sinking boat -- it fixes nothing and cannot resolve degradation issues. On a healthy, well-provisioned network, QoS is n...
-
How to ensure your next firewall isn't a dud
A firewall can be an invaluable tool when it comes to securing your network. On the other hand, a less-than-stellar firewall can leave your network open to attack and leave you with a false sense o...
-
Six user headaches Windows admins can avoid
SearchWinSystems.com's desktop management expert, Serdar Yegulalp, offers six tips for making an administrator's task of monitoring and restricting user rights easier.
-
Network monitoring freeware
This collection of free network monitoring tools will help analyze, monitor and report on your network performance without spending a dime.
-
Troubleshooting a Windows-based network
We've all been taught at one time or another that on a Windows network, if at least one domain controller within each domain is functional, then the domain itself should be functional. Sadly, this ...
-
Wireless LAN management: Managing security compliance
Find out the security threats that need to be addressed to make your network compliant with security regulations.
-
802.11 a and g bring more sweet spots for wireless acce
An often-overlooked factor in placing wireless access points, the difference between the 802.11a, b and g specifications can mean substantial differences in both data rates and available channels. ...
-
Certifications that will earn you the most money
Ed Tittel takes a look at the five network certifications that earned the most money in 2005.
-
IP network design, part 4: LAN design
This final section of the IP network design series relates to the issues encountered with campus LAN design. The benefits of Ethernet switching over a traditional hub environment are first explaine...
-
Wireless access points: Placement checklist
When planning to deploy wireless or tweak your existing deployment, the conventional wisdom is that you need a "site survey." If you're trying to locate the best places to put your wireless access ...
-
Protecting your network against spoofed IP packets
These days, the vast majority of administrators go to great lengths to protect the files on their network. Typically, elaborate firewalls are used to keep outsiders away from file servers. The file...
-
Intrusion prevention devices
Hackers are constantly at work developing new ways to attack your network, so guarding against these attacks requires eternal vigilance. Intrusion prevention devices are one essential element of de...
-
IP network design, part 3: Designing the WAN
The wide area network (WAN) is the single biggest contributor to a corporate network's cost of ownership. Therefore, this is the area where the cost-versus-performance tradeoff is most pronounced a...
-
Implementing software restriction policies
This tip explains how you can use software restriction policies to keep your workstations in pristine shape and cut down on help desk calls at the same time.
-
Using Netsh with Windows Firewall
This tip examines how to configure and troubleshoot Windows Firewall using the Netsh command-line utility. The procedures covered apply to both the Windows XP Service Pack 2 and Windows Server 2003...
-
LAN connectivity problem
ITKnowledge Exchange member "BinooDas1234" had connectivity issues with a troublesome LAN, and fellow techies jumped in to help out. But does the answer lie in the DNS configuration, the NIC driver...
-
Configuring a Cisco 1200 802.11g WLAN access point
Our router expert continues his series on building a secure wireless LAN with a Linux base. This article explains how to utilize a single Cisco 1200 series access point to provide access to three d...
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO