Tips

  • Understanding the NNTP protocol

    Everyone knows about peer-to-peer programs such as Napster, Kazaa, amongst others. How many people though know about binary newsgroups? Probably not many. These binary newsgroups are based on the N...

  • The truth about diagnostics

    We often say "diagnostics" but we don't really mean it -- at least not in the context of networks. In this featured column, Loki Jorgenson explains why the burden of analysis that leads to identify...

  • Purchasing a new router: How, why and which one to buy

    Ken Milberg discusses reasons for buying a new router, and looks at the options available from the big-name vendors.

  • Implementing QoS

    Despite reports to the contrary, QoS is still essential for guaranteeing the quality of application delivery and ensuring predictable behavior across an optimized WAN. In this tip, Dr. David Hughes...

  • IP network design, part 2: The IP addressing plan

    The IP addressing plan is the foundation upon which a successful logical design is built. Part two of this tip explains how to formulate a scalable IP addressing plan that can support the network a...

  • What's new in network certification?

    Ed Tittel provides an update on the latest in networking certifications and lists handy resources for finding out more information.

  • Networking certification tables

    Look-up points for certification programs from vendor and non-vendor organizations (the latter are a mix of training companies and industry associations of various kinds).

  • Five common insider threats and how to mitigate them

    Users can be an enterprise's best defense or its worst enemy. They have access to valuable network resources and information that can be used for ill-gain, be it accidentally or intentionally. This...

  • IP network design, part 1: Fundamental principles

    A competent network design is the foundation upon which all successful network implementations are built. This is the first of four articles that focus on the design of IP-based networks, due to th...

  • How to use IPsec filtering rules to filter network traf

    Learn how to control what enters and exits your PCs by using IPsec filtering rules to filter particular protocol and port combinations for both inbound and outbound network traffic.

  • Application firewall tips and tricks

    Network firewalls only examine packet information at the transport layer and below. For a more thorough examination of network traffic, organizations can deploy application firewalls, which work at...

  • Network asset management software

    Network asset management software acts as a watchdog and can help save staff time, downtime, and money -- and thwart security disasters before they happen. David Jacobs explains how it can be of se...

  • IOS command shortcut favorites

    Tom Lancaster recommends his favorite keyboard shortcuts for configuring Cisco routers from the command line.

  • Network virtualization -- the next big thing?

    What exactly is network virtualization and what consequence does it have for your network? This week Loki enlightens us -- offering various descriptions and uses for your consideration.

  • OSI: Securing the Stack, Layer 5 -- session hijacking

    To help secure your systems against session hijacking, this tip walks you through the steps hackers use to hijack active sessions and take over your network. You'll also learn how to detect and pre...

  • Free RSS readers: What you need to know

    Do you RSS? If "Really Simple Syndication" is foreign to you, this tip will bring you up to speed by introducing how the increasingly popular news-feed technology works and how you can use it to ke...

  • Cisco switch configuration for DOS applications on Netw

    An ITKnowledge Exchange member had a question about speeding up DOS applications through switch configuration, and fellow techies jumped in on the conversation and helped out. Here is a portion of ...

  • Making sense of Windows routing tables

    When routing packets across a network, things do occasionally go wrong. In these situations, it is helpful to be familiar with the Windows routing tables. Routing tables dictate the flow of packets...

  • Wireless LAN management

    Everyone is either deploying WLAN technology or considering the deployment of the technology. But the need for security and regulatory compliance is driving the need for better WLAN management. Rob...

  • WCCP

    WCCP is a relatively new protocol that allows routers to talk to your cache server. It isn't a routing protocol in the traditional sense, but it may be directing traffic around your network in the ...