Home > Articles > Networking

Networking

1386 Items

Sort by Date | Title

Attacks from Outside the Operating System
Mar 29, 2002
This excerpt from Andy Tanenbaum's Modern Operating Systems looks at some of the operating systems aspects of external threats, primarily focusing on viruses, worms, mobile code, and Java applets.
Authentication
Sep 21, 2001
Authentication means proving that a user is who he claims to be – and then making sure he accesses only what he's allowed to. Mandy Andress discusses the types of authentication available to your organization and tells where they work best.
Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
Jun 25, 2013
This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
Authentication Auditing in Windows 2000
Jul 29, 2005
Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
Availability: Requirements and Measurement
Oct 19, 2001
It's really the end user who determines whether a system is "available," according to Michael Hawkins. In this article, he explains how to determine realistic availability definitions and requirements.
Backbone Router Configuration
Mar 14, 2003
Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
Jun 16, 2006
Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
Backup Basics Part 2: Demystifying Backup Media
Jun 30, 2006
In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
Backup Basics Part 3: General Tips for a Backup Strategy
Jul 14, 2006
Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
Basic Access List Configuration for Cisco Devices
Apr 4, 2011
This article discusses the basic concepts of how ACLs work and shows how a basic ACL is configured.
Basic Cisco IOS Software and Catalyst 3550 Series Security
Jul 25, 2003
Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
Basic Data Transmission in Networks: MAC Tables and ARP Tables
May 12, 2015
Bombarded with jargon, no wonder networking beginners get lost. Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, explains some crucial terminology for anyone who needs to understand complex networking.
Basic IP Connectivity and Troubleshooting in Cisco Express Forwarding
Oct 26, 2007
This chapter helps you verify whether CEF is the root cause of a particular IP connectivity problem.
Basic IPsec VPN Topologies and Configurations
Sep 29, 2006
In this chapter, you will review several common deployments of IPsec virtual private networks (VPNs).
Basic Layer 3 Routing Concepts
Oct 6, 2015
How does a message get from point A to point B on a network? Though the question may seem simple, the process isn't. Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, discusses how basic packet routing works.
Basic Network Programming in J2ME MIDP
Aug 27, 2001
This sample chapter discusses the important concepts involved in network programming with J2ME MIDP-such as the difference between network programming with J2SE and with J2ME, and the concept of the Generic Connection framework.
Basic Virtual Private Network Deployment
Jan 19, 2001
Substantial interest in VPN has been created by concerns for privacy and data protection. You, the administrator must be aware of security concepts and network designs, and yet, customers require flexible network environments that will satisfy the needs ...
Basics of the Open Source Community
Mar 25, 2005
Nominally, this excerpted book chapter from Apache Jakarta and Beyond is an introduction to the Apache Jakarta project. But it's also a thoughtful briefing about the roles of open source software — and the related development communities.
Basics of the PIX Firewall
Nov 7, 2003
There are several areas of a network in a secure environment; the most common are the inside, the outside, and the DMZ firewalls that help divide and control traffic between them. Cisco has designed the PIX series of firewalls to be the primary devices for performing these functions. This chapter covers the basics of the PIX firewall areas that connect to the firewall—the trusted, untrusted, and DMZ.
Been Cracked? Just Put PAM On It!
Oct 26, 2001
Pluggable authentication models (PAM) allow you to configure your Linux environment to meet your own particular security needs.

<< < Prev Page 2 3 4 5 6 Next >