Tips

  • Custom network security policy checklist

    A well-designed security policy, commonly associated with the gpedit snap-in console, is a powerful tool in your network security arsenal. Using built-in tools found in Windows XP, you can create a...

  • Deploying apps via Group Policy -- cost-effective, but

    You can deploy applications using Group Policy. But without the proper planning, this is a good way to shoot yourself in the foot.

  • In the know with intranets

    Small and midsized businesses can benefit most from intranets, which offer better productivity, knowledge sharing and money-saving resources.

  • Purchasing the right Wi-Fi client

    Companies devote considerable attention to purchasing Wi-Fi access points, routers, and switches, giving far less thought to Wi-Fi client selection. But it takes two to tango: client devices have ...

  • Eight reasons to plan out your security testing

    You would think that if you are taking the time to test your Windows networks for security vulnerabilities, that any testing is a good thing. Not so, says security testing expert Kevin Beaver. In t...

  • Using Snort, Nessus and Tripwire for network security

    Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus a...

  • Designing a DMZ and using iptables

    Our editors posted a question on ITKnowledge Exchange to help out "Ruhi" plan for a DMZ using iptables, and fellow techies jumped in to help out, providing excellent advice for DMZ design.

  • The most important security lesson for employees

    Social engineering may be the most significant security threat organizations face when it comes to educating their employees. Security expert Michael Gregg explains why, and provides instructions f...

  • Introducing Vista's Network Center

    In Windows Vista Microsoft has made it a lot easier to quickly gather information about how a workstation is connected to a network through a new component called the Network Center. This expert ti...

  • Know your wireless encryption options

    Understanding wireless encryption is essential to deploying a secure wireless network. Contributor Tony Bradley breaks down the different encryption methods and explains why some are better than ot...

  • Power over Ethernet for network architects

    David Jacobs discusses how Power over Ethernet (PoE) is defined by the 802.3af standard, then looks at how PoE can help network architects simplify power distribution and potentially save money.

  • Enterprise router buyer's guide

    This tip provides a concise buyer's guide to companies and their products that compete in the enterprise and branch office routing arena, along with brief descriptions of those products and links t...

  • Two-factor authentication and compliance: What it is an

    The Federal Financial Institutions Examination Council has mandated that federal institutions deploy two-factor authentication for online banking. But what constitutes two-factor authentication is ...

  • Troubleshooting routing

    Network troubleshooting can be challenging for a number of reasons, not the least of which is the lack of a standard methodology. In this tip, Tom Lancaster looks at some of the best and fastest wa...

  • Proper planning, communication help avoid user headache

    A recent, informal survey of SearchNetworking.com readers revealed that while admins deal with plenty of technical issues, their most common problems come from users who submit redundant and often ...

  • The QoS scam: Paying for reduced bandwidth

    On an unhealthy or broken network, quality of service (QoS) is a rudder on a sinking boat -- it fixes nothing and cannot resolve degradation issues. On a healthy, well-provisioned network, QoS is n...

  • How to ensure your next firewall isn't a dud

    A firewall can be an invaluable tool when it comes to securing your network. On the other hand, a less-than-stellar firewall can leave your network open to attack and leave you with a false sense o...

  • Six user headaches Windows admins can avoid

    SearchWinSystems.com's desktop management expert, Serdar Yegulalp, offers six tips for making an administrator's task of monitoring and restricting user rights easier.

  • Network monitoring freeware

    This collection of free network monitoring tools will help analyze, monitor and report on your network performance without spending a dime.

  • Troubleshooting a Windows-based network

    We've all been taught at one time or another that on a Windows network, if at least one domain controller within each domain is functional, then the domain itself should be functional. Sadly, this ...