Firewalls 101
Firewalls have become an indispensable part of computer security, but they can be intimidating for a new administrator. In this article I will explain the inner workings of a firewall …
Firewalls have become an indispensable part of computer security, but they can be intimidating for a new administrator. In this article I will explain the inner workings of a firewall …
There comes a time when a network becomes too big and performance begins to suffer as a result of too much traffic. When that happens, one of the ways that …
How recursive DNS queries work. The basic concept of DNS name resolution is fairly simple. Every Web site is assigned a unique IP address. In order to access a website, …
In this article, I’ll run through the 7 steps you should take to successfully troubleshoot a Windows network. I’ll cover what you need to check on your local PC and …
This article series will examine various techniques for securing Wi-Fi networks. This first article in the series deals with understanding the vulnerabilities associated with wireless networks. Introduction Even though Wi-Fi …
The Great Default Password Debate Almost every wireless access point and wireless router has a Web interface that an administrator can use to configure the device to work with their …
Introduction In my previous article, I discussed the debate over whether or not you should change your wireless access point’s default password. In this article, I want to continue the …
Introduction In my previous article, I discussed the importance of a wireless access point’s SSID and I also talked about MAC address filtering. In this article, I want to continue …
Introduction So far in this article series, I have talked about some of the various security features that are commonly built into wireless access points. Now, I want to turn …
Introduction In my previous article, I explained that one of the best things that you can do to secure your wireless network is to avoid attaching wireless access points directly …