Securing Wireless Network Traffic (Part 3)
Introduction In my previous article, I discussed the debate over whether or not you should change your wireless access point’s default password. In this article, I want to continue the…
A Drink of Technology for the Thirsty Mind
Introduction In my previous article, I discussed the debate over whether or not you should change your wireless access point’s default password. In this article, I want to continue the…
Introduction In my previous article, I discussed the importance of a wireless access point’s SSID and I also talked about MAC address filtering. In this article, I want to continue…
Introduction So far in this article series, I have talked about some of the various security features that are commonly built into wireless access points. Now, I want to turn…
Introduction In my previous article, I explained that one of the best things that you can do to secure your wireless network is to avoid attaching wireless access points directly…
Introduction In my previous article, I explained that one of the best ways to secure wireless network traffic is to treat the wireless network as an unsecured medium. The idea…
Configuring the Network Policy Server The first step in the configuration process is to make the Network Policy Server aware of your wireless access point. To do so, make sure…
Introduction So far in this article series I have spent a lot of time talking about security settings that you can configure on your wireless access points, as well as…
Introduction There are endless free and open source software solutions and services out there for use in the network—for small, medium, and enterprise environments. You aren’t limited to Microsoft, Cisco,…
This article walks you through the steps involved for configuring volume and folder quotas using File Server Resource Manager, a new feature of Windows Server 2003 R2. The article also…
The basics of Internet Information Services 7.0 also known as IIS 7.0. IIS 7.0 is the web server role in Windows Vista and Windows Server 2008. Introduction Internet Information Services…