Tips

  • Tools give you a heads-up to server problems

    You can avoid server crashes before they happen if you use the right tools. Here, we look at four server management tools on the market -- some of which take steps proactively to dodge a potentiall...

  • Testing Group Policy security

    So you've hardened Group Policy settings to protect Windows from attacks -- but are you sure all of those settings are working? Contributor Kevin Beaver offers several methods for testing Group Pol...

  • Crossing the wizard gap

    The wizard gap is the distance between average network performance and what you really should be able to attain. It is hours of tweaking and fiddling by your best network engineers on each and ever...

  • How to choose a firewall

    Despite the development and evolution of security technologies, the firewall remains a vital component of any network architecture, and today's organizations have myriad options to choose from. Thi...

  • Nonpareil networking tool

    Ed Tittel describes why GFI's LANguard Network Security Scanner is a "Swiss Army Knife" in its range of functionality and details its most noteworthy capabilities.

  • Eight steps to prevent malware outbreaks

    It's impossible to prevent a malware attack that you've never seen, but the having the right security measures in place could you'll be your organization's saving grace.

  • Script shows patch installation issues

    While you're busy with a particularly cantankerous patch installation, do you sometimes wish a genie would appear and tell you exactly where all the problems are hiding?

  • Checklist: Patching after a security breach

    The patching approach you take immediately following a security breach may mean the difference between preventing future attacks and leaving your system exposed to new threats.

  • Automate security for standalone PCs

    Roberta Bragg says she's tired of SMB complaints that Microsoft offers no tools to automate security for workgroups -- when the tools they need are right in front of them.

  • Internet Explorer 7: Browsing and security enhancements

    Microsoft released the beta version of Internet Explorer 7 (IE7) and hopes it will solve the security concerns of IE6 as well as add RSS functionality and anti-phishing protection. Contributor Tony...

  • Cisco router security

    Network infrastructure is critical to our country and our businesses, and poor router security could have catastrophic consequences. Updating your router IOS is only the first step in ensuring a se...

  • Let MOM 2005 clean up your network

    Windows network management can get messy. Luckily MOM is there to help clean up. Microsoft's latest Operations Manager (MOM) 2005 has been upgraded enough that it should be a must have for Windows...

  • The growing complexity of IP networks, Part 2

    IP networks are under tremendous pressure to evolve. IP networking has been complicated by a number of Influences such as edge controls, NIC augmentation, security, machine-to-machine communicatio...

  • Updating your Windows network

    Changes made to Microsoft's Windows Server Update Services (WSUS) provide greater update functionality at a reasonable cost.

  • Next generation WLAN planning

    Wireless implementations have run the gamut from quick and haphazard to completely unsanctioned and unplanned. This tip outlines the steps needed to plan a successful and scalable WLAN implementation.

  • IPv6 renumbering

    Renumbering IPv4 networks has always been a difficult job for network administrators. With IPv6 it becomes easier. The protocol's ability to support multiple addresses on a host enables a gradual c...

  • Router Expert: Building a WLAN proxy server, Part 2

    Part 1covered the basic Linux distribution install, secure VTY and http text client -- Part 2 is a step by step process to build the kernel.

  • Router Expert: Building a WLAN proxy server, Part 1

    Our router expert walks you through building an http proxy server for a wireless network segment using Linux. The construction of the proxy server is quite involved so we'll cover the process over ...

  • The growing complexity of IP networks, Part 1

    IP networking has been complicated by a number of "new" developments such as IPv6, Gigabit Ethernet and wireless. Let's look at how each of these developments impacts our networks.

  • Practical configurations, Part 2

    Router management is one of the most basic duties of a network administrator. The second part in this series examines the configuration of distribution devices; STP, HSRP and OSPF.