Administration & Professional Networking

Sorted by:  

Straightening Out the Hacker's Terminology

We've all heard of external hackers and rogue insiders. Many of us have even suffered the consequences of their criminal actions. So who are these people? And why is it important to know about them? [more…]

Storage Area Networks: Dissecting a Management Framework

A storage area network (SAN) management framework consists of various pieces of software that run on a server in your data center. In the most simple definition, its job is to discover, report on, and [more…]

Understanding the Enemy as You Prepare to Hack

The wireless network's inherent vulnerabilities, in and of themselves, aren't necessarily bad. The true problem lies with all the malicious hackers out there just waiting to exploit these vulnerabilities [more…]

Windows 2000 Administration: Restoring Files and Folders

Although you can select different menu options and varying operations depending on your choice of media and backup routine, the basic procedure for a restoration is remarkably the same. The basic restore [more…]

Tools That Augment Your Firewall Protection

If you already have a firewall installed, you should spend some time testing it. Just assuming that your firewall works is as bad as not having a firewall at all. Use these tools on your own network only [more…]

Using Network Interface Cards (NICs)

Every computer on a network, both clients and servers, requires a network interface card (or NIC) in order to access the network. A NIC is usually a separate adapter card that slides into one of the server's [more…]

Looking at E-mail and Internet Security for Security+ Certification

For the Security + exam, you need to know the different standards and applications available for secure e-mail and Internet use. You also need to be aware of several vulnerabilities and nuisances, including [more…]

Windows 2000 Administration: Making the Most of Multiplatform Networks

When you're in charge of a network of machines that are set up with 100-percent-pure Windows 2000, you can count your blessings and sleep with an untroubled mind. For the rest of us mortals, upgrading [more…]

Knowing What Your Firewall Is Up Against

Hackers have a number of ways (beyond insecure passwords and software bugs) to get into computers and networks. Most operating systems and other programs have vulnerabilities, and it is only a matter of [more…]

Deciding on a Windows 2000 Network Upgrade or a New Installation

It's time to get to work with Windows 2000. Among your initial decisions: upgrade installation or a new installation?

An upgrade installation attempts to retain some Registry settings, users and group settings [more…]

Responding to a Network Security Breach

No matter how careful you are and no matter how secure your systems are, bad things happen. Electronic components fail. Software can be found to be buggy. People make mistakes. And, just sometimes, people [more…]

Familiarizing Yourself with an Existing Windows 2000 Network

Although having complete control over how a network is set up would be nice, inheriting an existing network from somebody is far more typical than building one from scratch. [more…]

Knowing How Much Security You Need on a Windows 2000 Network

People gain access to a Windows 2000 network through user accounts. Each person should be assigned a unique user account. That way, the network sees each person as a distinct individual. This distinctiveness [more…]

Windows 2000 Administration: Weighing In with an Ounce of Prevention

Hurricanes. Tornadoes. Earthquakes. Tidal waves.

None of these disasters can compare with your system going down when you're a Windows 2000 administrator. Thank goodness that Windows 2000 Server and Windows [more…]

TCP/IP Definitions

Knowing your way around TCP/IP is key if you want to manage a network successfully. The definitions in the following list explain the basics, such as what an IP address is, and they also clarify the various [more…]

How to Use Virtualization with Cloud Computing

Any discussion of cloud computing typically begins with virtualization. Virtualization is critical to cloud computing because it simplifies the delivery of services by providing a platform for optimizing [more…]

How to Reduce Security Breaches in Cloud Computing Networks

Cloud security has to be a part of your company’s overall security strategy. Reducing security breaches in cloud computing networks requires planning and strategy to be successful. Companies need to devote [more…]

How to Create a Cloud Computing Security Plan

Creating a cloud computing security plan should be the first consideration when switching to a cloud computing system. Whether you’re looking at creating a private cloud or leveraging a public cloud, you [more…]

How to Design a Cloud Computing Strategy

Many companies think that the cloud has the potential to dramatically reduce the costs of managing their technology infrastructure. Before you jump into cloud computing you need to take the time to design [more…]

Cloud Computing Actions to Take and to Avoid

When planning to switch over parts of your business to cloud computing, there are several things that you need to take into consideration. Reviewing what to do and what [more…]

Comparing Public, Private, and Hybrid Cloud Computing Options

Cloud computing comes in three forms: public clouds, private clouds, and hybrids clouds. Depending on the type of data you're working with, you'll want to compare public, private, and hybrid clouds in [more…]

Cloud Computing Standards Organizations

Many cloud computing organizations and informal groups are focused on addressing standards issues in regards to the cloud environment. These standards bodies help maintain a standards and best practices [more…]

How Cloud Data Centers Compare to Traditional Data Centers

Before making any decisions about moving your data center to a cloud, you need to take the time to consider how cloud data centers compare to traditional data centers. Because of the high costs of infrastructure [more…]

How to Choose the Right Cloud Computing Service Provider

The cloud, like every other computing platform, has to be managed. Once you've decided to move to a cloud, the next most important decision is to choose the right cloud computing service provider. Investigating [more…]

How to Ease the Transition to Cloud Computing

The cloud model has lots of benefits, but it still represents change — and there are inevitable cultural issues that arise when you ask people to do things differently. To ensure the success of your new [more…]


Sign Up for RSS Feeds

Computers & Software