Securing Wireless Network Traffic (Part 7)
Introduction In my previous article, I explained that one of the best ways to secure wireless network traffic is to treat the wireless network as an unsecured medium. The idea …
Introduction In my previous article, I explained that one of the best ways to secure wireless network traffic is to treat the wireless network as an unsecured medium. The idea …
Configuring the Network Policy Server The first step in the configuration process is to make the Network Policy Server aware of your wireless access point. To do so, make sure …
Introduction So far in this article series I have spent a lot of time talking about security settings that you can configure on your wireless access points, as well as …
Introduction There are endless free and open source software solutions and services out there for use in the network—for small, medium, and enterprise environments. You aren’t limited to Microsoft, Cisco, …
It’s amazing the way that time can go by. People tend to think of computers as being high tech, but the TCP/IP protocol has been around in one form or …
In this article we will take a look at the proper steps to troubleshooting routing problems. Although this methodology and approach can be used in just about any troubleshooting scenario, …
One of my favorite Windows tools is pathping. Pathping is a Windows based command-line tool used to provide information about the path data takes to its intended destination, network latency …
Tracert (also known as traceroute) is a Windows based tool that allows you to help test your network infrastructure. In this article we will look at how to use tracert …
An in depth view of current technology and strategies used to create redundancy in your WAN and how to properly design, implement, monitor and test in case of any disaster …
In this article, we’ll go over some of the new and cool features included in the Windows Server 2008 R2 DHCP server. Introduction DHCP is something most IT pros take …