Tips

  • Secure WLANs - Know your protocols

    This tip reviews the 802.11 architecture and the PHY standards for 802.11a, b, and g and performance expectations.

  • Top ten certification Q&amp

    These ten quetions and answers represent the some of the best certification advice our career experts have to offer.

  • Connecting storage networks

    Once you decide to use a SAN you have to decide how your network will connect to the servers, these tips will help.

  • Ensuring business certainty

    This column explores the importance of ensuring the performance of mission-critical applications with the help of application service level solutions.

  • Extra NICs

    Some uses for your hardware's extra NICs.

  • Not your daddy's TCP

    While TCP/IP was not designed for today's high-performance applications there are solutions in the works.

  • Cisco's IOS SLB feature

    You might be missing out on a useful feature of your Cisco hardware. The IOS SLB feature can provide you with a cheap load balancing option.

  • Prioritizing programs

    Try out some of these underutilized tricks to improve CPU performance.

  • Seven steps to ensure project success

    The Value Manager recently had a project fall well below expectations. He reviewed what happened and came up with seven key steps for managing technical risk and one golden rule.

  • Networking on the edge

    Once upon a time, a NIC was just a NIC. See what's changed.

  • Network mgmt vs. crisis mgmt

    Effectively managing a network means obtaining accurate, objective, and pertinent metrics before you make any decisions, especially decisions to spend money.

  • Authentication weaknesses

    This tip focuses on hardening network access against brute-force attacks.

  • The art of networking

    Simple connectivity is easy, but if you aspire to a more advanced network, something to be admired like a work of art, then these pointers will help.

  • The face of the new network police

    Considering its reputation for creating serious network problems, it may not seem obvious that VoIP can actually show you how to make your network perform better. Learn why...

  • E-mail firewall: A vital defense layer

    Learn how an e-mail firewall appliance can streamline security management for inbound messaging streams while contributing to defense-in-depth.

  • The nasty truth about spyware

    A look at some of the dangers spyware presents to corporate networks and what to do about them.

  • The Multi Router Traffic Grapher

    A short review of a free network traffic monitoring tool called the Multi Router Traffic Grapher.

  • Hacking For Dummies

    This chapter helps security professionals understand how malicious users think and work, enabling them to defend their systems against attacks and to identify vulnerabilities.

  • Filtering with MAC addresses

    This month our router expert discuss some strategies for controlling host network access using MAC address filtering.

  • Focus Windows port scanning

    How to use the netscan command to focus Windows port scanning.