Tips

  • Next generation WLAN design

    WLAN design applies to the detailed design that shows how the components are to be configured and what functionality they provide. The more detailed they get the better the integration to your over...

  • Practical Configurations, Part 3

    This section explains how to configure your distribution and core devices to route traffic to its proper destination and includes some simple commands to help validate your configuration.

  • Bridging Windows wirelessly

    Have two groups of PCs in different locations that you need to connect? Many admins don't know that Windows XP offers a bridging feature that can be a useful solution when combined with a couple of...

  • Hardening your router in 9 easy steps

    For most enterprise LANs, the router has become one of the most critical security appliances in use. Configured properly, it can keep all but the most determined bad guys out, and if you want, it c...

  • Surefire network security strategies

    Tired of fighting the latest worms and viruses? Following our preventative steps can make your network more resistant and fend off future problems.

  • A five-point strategy for secure remote access

    Systems with remote access pose a greater risk than those that sit behind the corporate firewall. Here are best practices for securing remote access endpoints.

  • Maximizing IDS/IPS implementations

    This tip looks at problems administrators face when implementing IDS/IPS systems and provides suggestions on how to increase the amount of valid information they provide.

  • Networks are like onions

    Your network is like an onion -- a series of bottlenecks, located at different components and layers, along the end-to-end path. Peel back the layers to improve performance.

  • Standard interface configuration for a WLAN proxy serve

    Our router expert continues his series on building a secure WLAN with a Linux base. This article covers standard interface configuration of the http proxy server.

  • EventCombMT: Search for specific events on event logs

    If you've ever wanted to do quick and dirty searches on event logs for multiple Windows machines, contributor Serdar Yegulalp says don't go without: EventCombMT. Find out how to use it in this tip.

  • Fixing bugs in Windows XP

    Windows XP bugs can be an annoyance, but if you follow some basic procedures, you can better apply the resources available to you, like patches, hotfixes, the Microsoft Knowledgebase and various In...

  • Don't let remote management problems get you down

    This checklist describes some common problems you may encounter with Terminal Services/Remote Desktop and offers suggestions on what to do to solve the issues.

  • Tools give you a heads-up to server problems

    You can avoid server crashes before they happen if you use the right tools. Here, we look at four server management tools on the market -- some of which take steps proactively to dodge a potentiall...

  • Testing Group Policy security

    So you've hardened Group Policy settings to protect Windows from attacks -- but are you sure all of those settings are working? Contributor Kevin Beaver offers several methods for testing Group Pol...

  • Crossing the wizard gap

    The wizard gap is the distance between average network performance and what you really should be able to attain. It is hours of tweaking and fiddling by your best network engineers on each and ever...

  • How to choose a firewall

    Despite the development and evolution of security technologies, the firewall remains a vital component of any network architecture, and today's organizations have myriad options to choose from. Thi...

  • Nonpareil networking tool

    Ed Tittel describes why GFI's LANguard Network Security Scanner is a "Swiss Army Knife" in its range of functionality and details its most noteworthy capabilities.

  • Eight steps to prevent malware outbreaks

    It's impossible to prevent a malware attack that you've never seen, but the having the right security measures in place could you'll be your organization's saving grace.

  • Script shows patch installation issues

    While you're busy with a particularly cantankerous patch installation, do you sometimes wish a genie would appear and tell you exactly where all the problems are hiding?

  • Checklist: Patching after a security breach

    The patching approach you take immediately following a security breach may mean the difference between preventing future attacks and leaving your system exposed to new threats.