Firewalls 101

Firewalls have become an indispensable part of computer security, but they can be intimidating for a new administrator. In this article I will explain the inner workings of a firewall and some common firewall features in an easy to understand manner. Network Address Translation Your firewall’s number one job is to separate your private network from the Internet, and use […]

Read more

Subnetting to Increase Performance

There comes a time when a network becomes too big and performance begins to suffer as a result of too much traffic. When that happens, one of the ways that you can solve the problem is by breaking the network into smaller pieces. There are several techniques for splitting a network, but one of the most effective techniques is called […]

Read more

Deploying Microsoft Windows Server Update Services

What is WSUS? Simply put, Microsoft Windows Server Update Services (WSUS) is the Microsoft provided solution for enterprise patch management. Using WSUS, network administrators can manage and deploy software updates for all of the Microsoft products in a network. This includes client operating systems such as Windows XP and Windows Vista, server operating systems such as Windows Server 2003 and […]

Read more

Securing Wireless Network Traffic (Part 1)

This article series will examine various techniques for securing Wi-Fi networks. This first article in the series deals with understanding the vulnerabilities associated with wireless networks. Introduction Even though Wi-Fi has been around for many years now, I still periodically receive E-mail messages from people who are wondering about the various security and privacy concerns regarding the use of a […]

Read more

Securing Wireless Network Traffic (Part 2)

The Great Default Password Debate Almost every wireless access point and wireless router has a Web interface that an administrator can use to configure the device to work with their network. This interface is typically accessible by opening a Web browser and going to http://192.168.0.1. Believe it or not, it’s this interface that represents a major threat to a wireless network’s security. […]

Read more
1 49 50 51 52 53 71