Tips

  • Wireless LAN security: 802.11i

    What is 802.11i, and is it really practical for you to implement in your organization? Robbie Harrell explores how the new wireless standard can improve security -- and reasons why you may want to ...

  • Router Expert: Building VLAN interfaces in Linux and IO

    Segmenting a wireless LAN with VLANs can increase security. Find out from our router expert how to support VLAN interfaces in Linux and Cisco IOS.

  • Cisco PIX ASDM installation & troubleshooting

    Learn some helpful hints for installing and troubleshooting Cisco's Adaptive Security Device Manager (ASDM) for PIX firewalls in this two-part tip.

  • Cisco PIX ASDM installation & troubleshooting, part 2

    In part two of this tip, look at some common problems that arise with ASDM installation.

  • Cache poisoning attacks and how to prevent them

    Want something scary to think about? A compromise of your name servers could cut you off from the Internet or redirect your customers to a competitor. It could even shunt sensitive electronic mail ...

  • Remote admin cards

    A special card, usually in a PCI form factor, can give you the equivalent of console access via the network -- and help increase security as well.

  • How QoS appliances subdue VoIP bugbears

    QoS appliances look deep into packets to counteract delay, jitter and packet loss, improving call quality. David Jacobs explains how in this tip.

  • Router Expert: Building 802.11Q VLANs

    Network segmentation can be a great way to increase security. This article covers segmenting with VLANs and the 802.1Q standard.

  • Understanding the differences between IDS and IPS

    We all know that the Internet is a haven for cyber criminals who use the connectivity to launch an unprecedented number of attacks against enterprise networks. IDS and IPS have been developed to co...

  • The death of SLAs

    The SLA is essentially an empty agreement. Its intention is to assure that an enterprise's critical applications and network-dependent business processes operate optimally. But its nature bears lit...

  • Avoiding open relays

    Getting on a spam blacklist can cause an annoying and crippling e-mail outage. One of the keys to staying off blacklists is making sure your e-mail system doesn't turn into an open relay. Tom Lanca...

  • Are Cisco switches still tops?

    A recent survey shows more organizations are dissatisfied with the cost and value of Cisco's LAN switches, while a number of competitors may be gaining ground.

  • The network administrator's guide to forensic first res

    The time between discovery of an incident and the handover of digital evidence is critical for the possibility of successful evidence retrieval. Mishandled evidence, whether to be used in court or...

  • Router Expert: Building a WLAN proxy server, IP routing

    This tip describes how to configure a multi-interface Linux server so it reaches all of the networks beyond all of its local interfaces by implementing a static kernel IP route table.

  • 'Hacking Wireless Networks For Dummies

    This chapter download, "Still at War," covers installing and using network discovery and wardriving tools Kismet and Wellenreiter and discusses wardriving countermeasures.

  • VoIP natural fit with text-to-speech information delive

    Turning text into sound involves several potential technical hurdles and numerous interesting components. Ed Tittel explains the process in this tip.

  • Max interrupts

    If you've been having performance problems with your server, you may be able to ramp up network throughput by taking a deeper look at your driver configuration.

  • Placing systems in a firewall topology

    Factors to consider when deciding where to place individual systems in a firewall topology, such as bastion host, screened subnet and multi-homed firewalls.

  • Practical configurations, Part 4

    This tip on verification and troubleshooting in networking configuration teaches simple commands that will help not only in making a network run more smoothly, but also in learning how the individu...

  • Network Performance Management

    Keeping a close eye on your network performance and throughput is critical. But as your network grows and becomes more complicated, managing it becomes all the more complex.