Securing Wireless Network Traffic (Part 5)
Introduction So far in this article series, I have talked about some of the various security features that are commonly built into wireless access points. Now, I want to turn…
A Drink of Technology for the Thirsty Mind
Introduction So far in this article series, I have talked about some of the various security features that are commonly built into wireless access points. Now, I want to turn…
Introduction In my previous article, I explained that one of the best things that you can do to secure your wireless network is to avoid attaching wireless access points directly…
Introduction In my previous article, I explained that one of the best ways to secure wireless network traffic is to treat the wireless network as an unsecured medium. The idea…
Configuring the Network Policy Server The first step in the configuration process is to make the Network Policy Server aware of your wireless access point. To do so, make sure…
Introduction So far in this article series I have spent a lot of time talking about security settings that you can configure on your wireless access points, as well as…
Introduction There are endless free and open source software solutions and services out there for use in the network—for small, medium, and enterprise environments. You aren’t limited to Microsoft, Cisco,…
This article walks you through the steps involved for configuring volume and folder quotas using File Server Resource Manager, a new feature of Windows Server 2003 R2. The article also…
The basics of Internet Information Services 7.0 also known as IIS 7.0. IIS 7.0 is the web server role in Windows Vista and Windows Server 2008. Introduction Internet Information Services…
You probably already know that a User Account in Active Directory is an Active Directory Object, or simply said, a record in an AD database. Most of the time we…
If you have a website and want to change domain names or if you need to change the architecture of your site, you won’t want visitors following links from other…