How to configure TCP/IP Filtering on windows 2003 Server?

In this article, we will use TCP/IP filtering to prevent a server from allowing certain TCP ports or protocol. 1. Right-click on the My Network Places icon on the desktop, open properties 2. Choose the  network connection for which you want to view the settings, right-click to open properties 3. double-click Internet Protocol (TCP/IP) to view network configuration settings. 4. […]

Read more

Using Remote Assistance with Windows Firewall Enabled

This article looks at how to use Remote Assistance in an environment where your desktop computers have Windows Firewall enabled. Topics covered include using Group Policy to create a Remote Assistance exception for desktop computers, configuring computers to receive offers of Remote Assistance, and tips on using Remote Assistance. Remote Assistance is one of those features that hasn’t quite lived […]

Read more

Firewalls 101

Firewalls have become an indispensable part of computer security, but they can be intimidating for a new administrator. In this article I will explain the inner workings of a firewall and some common firewall features in an easy to understand manner. Network Address Translation Your firewall’s number one job is to separate your private network from the Internet, and use […]

Read more

Subnetting to Increase Performance

There comes a time when a network becomes too big and performance begins to suffer as a result of too much traffic. When that happens, one of the ways that you can solve the problem is by breaking the network into smaller pieces. There are several techniques for splitting a network, but one of the most effective techniques is called […]

Read more

Securing Wireless Network Traffic (Part 1)

This article series will examine various techniques for securing Wi-Fi networks. This first article in the series deals with understanding the vulnerabilities associated with wireless networks. Introduction Even though Wi-Fi has been around for many years now, I still periodically receive E-mail messages from people who are wondering about the various security and privacy concerns regarding the use of a […]

Read more

Securing Wireless Network Traffic (Part 2)

The Great Default Password Debate Almost every wireless access point and wireless router has a Web interface that an administrator can use to configure the device to work with their network. This interface is typically accessible by opening a Web browser and going to http://192.168.0.1. Believe it or not, it’s this interface that represents a major threat to a wireless network’s security. […]

Read more
1 2 3 4 5 10