Tips

  • The network administrator's guide to forensic first res

    The time between discovery of an incident and the handover of digital evidence is critical for the possibility of successful evidence retrieval. Mishandled evidence, whether to be used in court or...

  • Router Expert: Building a WLAN proxy server, IP routing

    This tip describes how to configure a multi-interface Linux server so it reaches all of the networks beyond all of its local interfaces by implementing a static kernel IP route table.

  • 'Hacking Wireless Networks For Dummies

    This chapter download, "Still at War," covers installing and using network discovery and wardriving tools Kismet and Wellenreiter and discusses wardriving countermeasures.

  • VoIP natural fit with text-to-speech information delive

    Turning text into sound involves several potential technical hurdles and numerous interesting components. Ed Tittel explains the process in this tip.

  • Max interrupts

    If you've been having performance problems with your server, you may be able to ramp up network throughput by taking a deeper look at your driver configuration.

  • Placing systems in a firewall topology

    Factors to consider when deciding where to place individual systems in a firewall topology, such as bastion host, screened subnet and multi-homed firewalls.

  • Practical configurations, Part 4

    This tip on verification and troubleshooting in networking configuration teaches simple commands that will help not only in making a network run more smoothly, but also in learning how the individu...

  • Network Performance Management

    Keeping a close eye on your network performance and throughput is critical. But as your network grows and becomes more complicated, managing it becomes all the more complex.

  • Next generation WLAN design

    WLAN design applies to the detailed design that shows how the components are to be configured and what functionality they provide. The more detailed they get the better the integration to your over...

  • Practical Configurations, Part 3

    This section explains how to configure your distribution and core devices to route traffic to its proper destination and includes some simple commands to help validate your configuration.

  • Bridging Windows wirelessly

    Have two groups of PCs in different locations that you need to connect? Many admins don't know that Windows XP offers a bridging feature that can be a useful solution when combined with a couple of...

  • Hardening your router in 9 easy steps

    For most enterprise LANs, the router has become one of the most critical security appliances in use. Configured properly, it can keep all but the most determined bad guys out, and if you want, it c...

  • A five-point strategy for secure remote access

    Systems with remote access pose a greater risk than those that sit behind the corporate firewall. Here are best practices for securing remote access endpoints.

  • Surefire network security strategies

    Tired of fighting the latest worms and viruses? Following our preventative steps can make your network more resistant and fend off future problems.

  • Maximizing IDS/IPS implementations

    This tip looks at problems administrators face when implementing IDS/IPS systems and provides suggestions on how to increase the amount of valid information they provide.

  • Networks are like onions

    Your network is like an onion -- a series of bottlenecks, located at different components and layers, along the end-to-end path. Peel back the layers to improve performance.

  • Standard interface configuration for a WLAN proxy serve

    Our router expert continues his series on building a secure WLAN with a Linux base. This article covers standard interface configuration of the http proxy server.

  • EventCombMT: Search for specific events on event logs

    If you've ever wanted to do quick and dirty searches on event logs for multiple Windows machines, contributor Serdar Yegulalp says don't go without: EventCombMT. Find out how to use it in this tip.

  • Fixing bugs in Windows XP

    Windows XP bugs can be an annoyance, but if you follow some basic procedures, you can better apply the resources available to you, like patches, hotfixes, the Microsoft Knowledgebase and various In...

  • Don't let remote management problems get you down

    This checklist describes some common problems you may encounter with Terminal Services/Remote Desktop and offers suggestions on what to do to solve the issues.