- Logs and Monitoring in Apache
- Aug 4, 2006
- Apache provides extensive facilities for recording information about every aspect of a request. This chapter covers the most common issues found when logging requests, such as conditional logging, log rotation, resolution of IP addresses, and piped logging. It also covers a number of bundled and third-party modules and utilities for monitoring the status of your Apache server and to analyze its logs.
|
- Imaging for Intel Macs Part 1: Why Intel Macs Increase an Administrator's Workload and How Best to Manage Their Deployment
- Jul 28, 2006
- Deploying Intel Macs can add extra work for administrators because they require completely different Mac OS X releases and system images than Power PC Macs. Although it is possible to cobble a universal Mac OS X image together, is doing so really the best choice? In this first article in a two-part series, Ryan Faas looks at some of the specific challenges that relate to developing deployment strategies for Intel Macs and some of the ongoing issues if you opt to deploy a dual-platform environment using Mac workstations.
|
- NASCAR Tech Habits Stress Data Sharing And Security Best Practices
- Jul 21, 2006
- Have you dreamed of getting behind the wheel of a 750-horsepower stock car and taking charge of the race? If you're responsible for protecting and maintaining the data-sharing capabilities of your organization, you're already in the driver's seat. Erik Eckel explains how we can learn some lessons from the speedy racers of the NASCAR set.
|
- Backup Basics Part 3: General Tips for a Backup Strategy
- Jul 14, 2006
- Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
|
- Backup Basics Part 2: Demystifying Backup Media
- Jun 30, 2006
- In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
|
- Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
- Jun 16, 2006
- Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
|
- A Network Administrator's View of Multiservice Networks
- Dec 9, 2005
- Multiservice networks provide more than one distinct communications service type over the same physical infrastructure. Multiservice implies not only the existence of multiple traffic types within the network, but also the ability of a single network to support all of these applications without compromising quality of service (QoS) for any of them. This chapter covers multiservice networks in detail from the network administrator's viewpoint.
|
- An Overview of the syslog Protocol
- Dec 1, 2005
- This chapter presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.
|
- Authentication Auditing in Windows 2000
- Jul 29, 2005
- Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
|
- Understanding Networking Components and Devices for the Network+ Exam
- Jul 29, 2005
- This chapter covers the various networking devices used in modern networks with an eye toward passing the Network+ Exam. Sample questions with detailed answers are included to help you practice.
|
- Is it Geek City Yet? Philadelphia, City-Wide Wi-Fi, and the Digital Inclusion Project
- Jul 8, 2005
- When "no child left behind" becomes "no household without Internet access," how will cities be affected? Who foots the bill? And how does the mechanism of government keep from hopeless entanglement with the objectives of the telecom industry? Sheryl Simons presents a fascinating tale of one big city's quest for the future: Wireless Philadelphia.
|
- Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
- Jul 1, 2005
- Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
|
- Introduction to Networking, Network Administration, and NetWare 6.5
- Apr 15, 2005
- The first thing you need to do as you begin your NetWare 6.5 journey is to briefly look at the historical roots of NetWare 6.5. This chapter looks at some of the new features of NetWare 6.5 and how Novell has classified some of these features and services. It also examines how NetWare 6.5 interacts with other operating systems.
|
- Creating a Fault-Tolerant Environment in Windows Server 2003
- Aug 6, 2004
- There are many ways to add fault tolerance to network services and resources running on Windows Server 2003 servers, and all without the hassle of third-party software. Find out how to use them in this chapter from Microsoft Windows Server 2003 Insider Solutions.
|
- J2EE Naming and Directory Services
- Aug 6, 2004
- Java Naming and Directory Interface (JNDI) can be used for much more than simply finding resources stored by your J2EE server. Find out how much more in this sample chapter on JNDI in Java 2, Enterprise Edition.
|
- Setting up a Software Restriction and Wireless Network Policy with Windows 2003 Group Policy
- Aug 6, 2004
- Keep those unwanted applications from running on client machines and set the rules for how wireless clients operate in your Windows 2003 domain. Jesse Smith shows you how to set up a GPO with software restriction and wireless network policies for a network operating with a Windows Server 2003 server as the primary domain controller.
|
- Administering Windows Server 2003 Remotely
- Jul 30, 2004
- This chapter covers the wealth of tools and options available to administrators in Windows Server 2003, including many enhancements to tools that existed in previous versions of the system.
|
- Workflow-Based Network Management
- Jul 30, 2004
- Network management specialist Stephen Morris discusses the benefits of modeling network management operations in advance of MIB design. This is a contrarian approach to the way network management is traditionally developed.
|
- Getting Data from Here to There: How Computers Share Data
- Jul 16, 2004
- Matt Hayden and Joe Habraken provide a brief run-down of the four most common types of network topologies: Ethernet, Token Ring, FDDI, and ATM. A Q&A section at the end provides answers to common questions about these topologies.
|
- The Scope of Network Distributed Computing
- May 28, 2004
- The scope of Network Distributed Computing (NDC) is quite impressive. This chapter presents an overview of some of the many relevant areas of NDC research and development today. If you're looking for a solid overview of all things NDC — from the Semantic Web, P2P, and Pervasive Computing to Distributed Databases, Filesystems, Media, and Storage — you've come to the right place.
|