Administration & Professional Networking

Sorted by:  

Installing and Configuring DNS

The Active Directory Installation wizard offers to install DNS if the wizard does not detect a proper DNS zone configuration during the installation of Active Directory. However, you should not rely on [more…]

Exploring TCP/IP Routers

Routers connect networks. Routers range from someone's desktop PC running Internet sharing software to multimillion-dollar systems of specialized hardware and software. In the original work on TCP/TP, [more…]

Looking into Routed versus Routing Protocols for the CCNA Exam

When preparing for the CCNA exam, review routers and their protocols by starting with the difference between a routed protocol and a routing protocol. Knowing the difference between these two protocols [more…]

Components of a Server Computer

The hardware components that a typical server computer comprises are similar to the components used in less expensive client computers. However, server computers are usually built from higher-grade components [more…]

Exploring NFS in UNIX

If your computer is on a LAN, the computer is probably set up to share files with other computers. Quite a few different schemes enable computers to use files on other machines. These schemes are named [more…]

Configuring a Wireless Access Point

The physical setup for a wireless access point is pretty simple: You take it out of the box, put it on a shelf or on top of a bookcase near a network jack and a power outlet, plug in the power cable, and [more…]

Who Goes There? Understanding Permissions in UNIX

Unlike some operating systems, UNIX was designed from the beginning to be used by more than one person. Like all multiuser systems, UNIX keeps track of who owns what file and who can do what with each [more…]

Sifting Through SANs (Storage Area Networks)

The technical description of a storage area network (SAN) is a collection of computers and storage devices, connected over a high-speed optical network and dedicated to the task of storing and protecting [more…]

Ensuring Network Security with a VPN (Virtual Private Network)

Virtual private networks (VPNs) were created to address two different problems: the high cost of dedicated leased lines needed for branch office communications and the need to allow employees a method [more…]

Breaking Into the Basics of Network Security

Network security can be as simple as adhering to a set of rules; technology alone can't thwart hack attacks and other security breaches. The following sections include details of just some of these rules [more…]

The TCP/IP Networking Protocol Suite

TCP/IP, the protocol on which the Internet is built, is actually not a single protocol but rather an entire suite of related protocols. TCP is even older than Ethernet. It was first conceived in 1969 by [more…]

The Ethical Hacking Process

Like practically any IT or security project, ethical hacking needs to be planned in advance. Strategic and tactical issues in the ethical hacking process should be determined and agreed upon. To ensure [more…]

Network Security: Anti-Virus Do's and Don'ts

Viruses cost businesses money, and the threat is not going to go away any time soon. The interoperability between applications only makes it easier for virus writers to release viruses that can spread [more…]

Understanding WEP Weaknesses

Security researchers have discovered security problems that let malicious users compromise the security of WLANs (wireless local area network) that use WEP [more…]

Cracking the UNIX Shell

After you figure out which general variety of UNIX you have, you must figure out one other vital consideration: which shell you're using. Although you may say, [more…]

Looking at the Pros and Cons of Using a Storage Area Network

Everyone likes new toys, and a storage area networks (SANs) are pretty cool. This, however, shouldn't be the main reason to install a SAN. Find out if you should make the move or not. [more…]

Defining Terms: What Is a Directory Service?

Here is one definition for a directory service:

A directory service is a customizable information store that functions as a single point from which users can locate resources and services distributed throughout [more…]

Selecting Tools For Your Hacking Job

As with any project, if you don't have the right tools for ethical hacking, accomplishing the task effectively is difficult. Having said that, just because you use the right tools doesn't mean that you [more…]

Getting a Close Look at Firewalls

As network traffic passes through the firewall, the firewall decides which traffic to forward and which traffic not to forward, based on rules that you have defined. All firewalls screen traffic that comes [more…]

Obeying the Ten Commandments of Ethical Hacking

These commandments were not brought down from Mount Sinai, but thou shalt follow these commandments shouldst thou decide to become a believer in the doctrine of ethical hacking. [more…]

Sailing the Storage Area Network Islands

Imagine that you've grown to love this storage area network (SAN) stuff so much that it's reproducing itself like rabbits throughout your company! Things are starting to get out of hand again. You have [more…]

Understanding the Need to Hack Your Own Systems

To catch a thief, you must think like a thief. That's the basis for ethical hacking. It's absolutely critical to know your enemy.

The law of averages works against security. With the increased number and [more…]

Windows 2000 Administration: Working with Snap-ins

The snap-in is the basic component of a Microsoft Management Console (MMC). The key concept is that a snap-in always resides in an MMC console. Snap-ins, like plug-ins downloaded from a Web site, don't [more…]

Working with Directory Permissions in a Windows 2000 Network

Being an administrator within a Windows 2000 domain is no longer the same as being an administrator within a Windows NT domain. First and foremost, the administrator tag name no longer grants you minor-deity-like [more…]

How Unethical Hackers Can Hurt Your Systems

It's one thing to know that your systems generally are under fire from hackers around the world and rogue insiders around the office; it's another to understand specific attacks against your systems that [more…]

Sign Up for RSS Feeds

Computers & Software