- Diary of a Network Administrator: Planning for Success
- Feb 28, 2003
- In this diary entry, Joseph Phillips details his planning process for his client's network, servers, and rats.
|
- Diary of a Network Administrator: Project Management
- Oct 18, 2002
- Far too often, projects spin out of control due to a lack of vision, planning, and technical leadership. In this network administrator diary entry, Joseph Phillips discusses the importance of project management.
|
- Diary of a Network Administrator: The Project Launch
- Sep 20, 2002
- In this series, Joseph Phillips opens his diary for look into the life of network administrator. In this article covering the project launch, he shares his nightmare experience while creating a network plan for a new client.
|
- Forming and Managing an Incident Response Team
- Mar 22, 2002
- This sample chapter delves into forming and managing an incident response team - what a response team is, the rationale for forming an incident response team, major issues that must be addressed, and special management considerations.
|
- Getting Data from Here to There: How Computers Share Data
- Jul 16, 2004
- Matt Hayden and Joe Habraken provide a brief run-down of the four most common types of network topologies: Ethernet, Token Ring, FDDI, and ATM. A Q&A section at the end provides answers to common questions about these topologies.
|
- Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
- Jul 1, 2005
- Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
|
- Imaging for Intel Macs Part 1: Why Intel Macs Increase an Administrator's Workload and How Best to Manage Their Deployment
- Jul 28, 2006
- Deploying Intel Macs can add extra work for administrators because they require completely different Mac OS X releases and system images than Power PC Macs. Although it is possible to cobble a universal Mac OS X image together, is doing so really the best choice? In this first article in a two-part series, Ryan Faas looks at some of the specific challenges that relate to developing deployment strategies for Intel Macs and some of the ongoing issues if you opt to deploy a dual-platform environment using Mac workstations.
|
- Importing and Exporting Windows Network Settings
- Jun 14, 2010
- Need to back up or distribute your network settings? Eric Geier shows how to work with your wireless profiles, TCP/IP configuration, and 802.1X authentication settings.
|
- Interconnecting Data Centers Using VPLS: Data Center Layer 2 Interconnect
- Jun 24, 2009
- This chapter provides an overview of high availability (HA) clusters, legacy deployment models for interconnecting data centers, and problems related to extending Layer 2 networks.
|
- Introduction to Networking, Network Administration, and NetWare 6.5
- Apr 15, 2005
- The first thing you need to do as you begin your NetWare 6.5 journey is to briefly look at the historical roots of NetWare 6.5. This chapter looks at some of the new features of NetWare 6.5 and how Novell has classified some of these features and services. It also examines how NetWare 6.5 interacts with other operating systems.
|
- IP Routing: From Basic Principles to Link State Protocols
- Mar 29, 2002
- Control network traffic by learning the routing protocols and mechanisms that build and maintain route information.
|
- Is it Geek City Yet? Philadelphia, City-Wide Wi-Fi, and the Digital Inclusion Project
- Jul 8, 2005
- When "no child left behind" becomes "no household without Internet access," how will cities be affected? Who foots the bill? And how does the mechanism of government keep from hopeless entanglement with the objectives of the telecom industry? Sheryl Simons presents a fascinating tale of one big city's quest for the future: Wireless Philadelphia.
|
- J2EE Naming and Directory Services
- Aug 6, 2004
- Java Naming and Directory Interface (JNDI) can be used for much more than simply finding resources stored by your J2EE server. Find out how much more in this sample chapter on JNDI in Java 2, Enterprise Edition.
|
- Learn Host-Based Intrusion Detection
- Apr 5, 2002
- Follow the step-by-step examples to learn how to use five major host-based intrusion detection tools: TCP Wrappers, xinetd, Tripwire, Swatch, and PortSentry.
|
- Logs and Monitoring in Apache
- Aug 4, 2006
- Apache provides extensive facilities for recording information about every aspect of a request. This chapter covers the most common issues found when logging requests, such as conditional logging, log rotation, resolution of IP addresses, and piped logging. It also covers a number of bundled and third-party modules and utilities for monitoring the status of your Apache server and to analyze its logs.
|
- Make the Right Call: Cisco's AVVID
- Jun 21, 2002
- Robert Richardson discusses the pros and cons of Cisco's AVVID — what the industry's been talking about all along for pure IP convergence: smart IP phones plugged into an Ethernet network full of conventional switches and routers. Plenty of issues need to be ironed out, though.
|
- Managing Disk Partitions Over the Network with Ghost Corporate Edition
- Oct 31, 2003
- System administrators often need to deploy images to multiple machines, or they want to make and send images (including system images) to machines over a network. Daniel Dern explains the process using Symantec Ghost Corporate Edition as a solution.
|
- Managing Large Networks: Problems and Solutions
- Oct 17, 2003
- This chapter focuses on major issues of managing large networks, including bringing the managed data to the code, scalability, the shortage of development skills for creating management systems, and the shortage of operational skills for running networks.
|
- Monitoring Tools
- Jul 13, 2001
- Pat Eyler covers two of the best free tools for monitoring your Linux network[md]Ethereal and mon.
|
- NASCAR Tech Habits Stress Data Sharing And Security Best Practices
- Jul 21, 2006
- Have you dreamed of getting behind the wheel of a 750-horsepower stock car and taking charge of the race? If you're responsible for protecting and maintaining the data-sharing capabilities of your organization, you're already in the driver's seat. Erik Eckel explains how we can learn some lessons from the speedy racers of the NASCAR set.
|