Networking

RSS
Computer networking news, reviews, solutions, and analysis for IT professionals
  • Mobile phone hacking expected to spread

    Posted April 14, 2003 - 2:30 pm

    A denial of service vulnerbility could allow pranksters to crash your mobile phone. The vulnerability is not critical. You simply must "reboot" the phone to resolve the issue. However analysts predict the flaw will renew interest in security vulnerabilities in increasingly complicated mobile phones.
  • What to include in a network usage policy

    Posted April 14, 2003 - 11:39 am

    Many companies believe that employee privacy ends where the company communications infrastructure begins. In turn, the courts are supporting this position. This reviews how to create a clear, comprehensive, communicated, and compelled network usage policy.
  • Employers exercise legal right to monitor e-mail

    Posted April 14, 2003 - 11:20 am

    A heightened awareness of the dangers in workplace computer use have spurred employers to take steps to reduce liabilities. Nearly 62% of organizations surveyed monitor employees' e-mail and Internet connections. Among employers who monitor, over 68% cite legal liability as the primary reason to keep an eye on employees' online activity.
  • USB drives make small work of large file transfers

    Posted April 2, 2003 - 10:30 pm

    Business users are getting more and more accustomed to casually sending enormous files over the network - but this can cause so much strain that you'll need an expensive upgrade in order to handle the strain. A more cost-effective solution might be to buy a pocket-sized USB hard drive or flash storage device that your users can swap from machine to machine in the office. That way your employees can still get the data they need from computer to computer, but won't be stressing your already overworked network with funny pictures or MP3s. (Free registration required.)
  • Wireless security - Some surprising conclusions

    Posted April 2, 2003 - 6:06 pm

    No topic in wireless attracts more attention than security. And that's really how it should be. An insecure wireless network isn't really a network at all. It's an open invitation for hackers and crackers and all other evils that inhabit the communications world.
  • Storage basics: Storage area networks

    Posted April 2, 2003 - 2:42 pm

    Many small businesses typically find that their most vital documents are distributed across dozens of hard drives in individual employees' workstations - and, worse, that multiple versions of these documents exist. Bring order to this chaos with a storage area network. This article outlines the basics.
  • IBM, VeriSign security services target SMBs

    Posted April 1, 2003 - 9:06 pm

    VeriSign, Inc. and IBM offer a set of security services designed to deliver access management and authentication technology to small and medium businesses. The new offering consists of two services: the VeriSign Access Management Service and the IBM-VeriSign Trusted e-Business Integration Solution.
  • WLAN infrastructure: Build it before they come

    Posted March 30, 2003 - 7:29 pm

    Over the last few years, network managers have been reacting to users' demands for (and sometimes independent introduction of) wireless infrastructure. But as the technology has matured, it's now time for managers to take charge of the process. Plan now for the wireless LANs your users will expect in the next few years. This article provides some ideas on how to start.
  • Mobile success hinges on today's planning

    Posted March 30, 2003 - 7:25 pm

    According to Gartner vice president Ken Dulaney, the PDA situation in the enterprise today is similar to the situation with PCs in the 1980s: they're purchased haphazardly by individual employees and department heads, and IT isn't involved in managing new systems. He suggests that you take a more active and organized approach to your workforce's wireless platforms.
  • CeBIT overdoes the Wi-Fi - and it falls over

    Posted March 30, 2003 - 7:16 pm

    Last month's CeBIT trade show in Hannover, Germany featured dozens of Wi-Fi access points - some set up by show organizers, some by those manning the booth. Disaster ensued: all those points set up by different organizations interfered with one another. Show attendees who had paid CeBIT for access overwhelmed the tech support booth. Read this cautionary tale to find out what might happen as Wi-Fi starts to approach saturation.
  • Bluetooth group aims for '5-minute ready'

    Posted March 30, 2003 - 7:07 pm

    Bluetooth has hit numerous snags on the way to wide adoption; one of the worst is the fact that in practice it's extremely tricky to get Bluetooth-enabled devices to recognize one another. An initiative from the Bluetooth Special Interest group is urging manufacturers to try to get those connect times down to five minutes. But will anyone but the most hard-core techies even want to spend that much time fiddling with a handheld gadget?
  • Should you monitor your employees' Web use?

    Posted March 29, 2003 - 1:30 pm

    Employee-monitoring devices - known to many as "spyware" - have become more attractive, affordable and easy to use. Companies hope these products will increase security, improve productivity, and reduce employee misbehavior, competitive information leaks and liability risks. However, employees believe it infringes on their privacy rights. Here are some things to consider before deploying surveillance software.
  • VPN: Extend your network and keep hackers out

    Posted March 28, 2003 - 9:39 pm

    According to analysts, some smaller businesses are just getting to look at virtual private networks (VPN) to handle remote access. However, a perception exists among some that VPNs aren't that secure. Analysts provide guidance on when to know a VPN is required, and how to secure it to the max.
  • End-to-end wireless security: An IP VPN conspiracy theory

    Posted March 28, 2003 - 11:28 am

    3G wireless wide area network (WWAN) carriers have been hyping ever-improving data transfer rates - but those rates require compression that won't work with most encryption techniques. Find out more about how this clash of interests might compromise your end-to-end security.
  • A comprehensive review of 802.11 wireless LAN security and the Cisco Wireless Security Suite

    Posted March 28, 2003 - 11:21 am

    This detailed white paper reviews the authentication and data-privacy functions described in the IEEE 802.11 specification. It describes the inherent security vulnerabilities and management issues of these functions. While there is a particular focus on Cisco's own offering in this area, the technical information here applies to most networks of this type.
  • Is Wi-Fi's security going to win over network admins?

    Posted March 28, 2003 - 11:05 am

    Wi-Fi was initially criticized for its weak security - and the community has responded with the development of a bewildering array of standards and proposals to improve the situation. This article walks through the history of Wi-Fi security, looking at where the weaknesses are - and how seriously administrators in the field are taking them.
  • Are wireless networks secure yet?

    Posted March 28, 2003 - 10:44 am

    Once vendors and standard-setters solve the encryption and authentication problems facing WLANs, they will be able to attack new areas of network management, such as quality of service and network health.
  • New wireless security means costly upgrade

    Posted March 28, 2003 - 10:38 am

    Wireless users have been eagerly awaiting the new 802.11i standard, which aims to radically improve Wi-Fi security. But they may be in for some nasty sticker shock: most existing 802.11b hardware doesn't have the processing power needed to run the encryption routines that lie at the heart of the new standard. Find out what this might mean for your existing wireless infrastructure.
  • Wi-Fi alliance replaces WEP security

    Posted March 28, 2003 - 10:28 am

    Wi-Fi Protected Access should bring tighter network protection to 802.11 by abandoning fixed keys and generating a new key for every 10K-bytes of data transmitted over the network.
  • WLAN security's slippery slope

    Posted March 28, 2003 - 10:13 am

    Companies specializing in wireless security products have blazed the way towards a safer Wi-Fi environment - but may have written the script for their own demise. As Wi-Fi security products and protocols enter the mainstream, giant equipment vendors like Cisco are entering the fray, threatening to squash the pioneers. Find out how this industry shake-out will affect your buying decisions.
  • You too can understand device numbers and mapping in Solaris

    Posted October 31, 2001 - 2:58 pm

    mapping in Solaris?

  • Our six-step program to network computing success

    Posted October 31, 2001 - 12:32 pm

    columns.

  • Hardening a Unix computer for Internet use

    Posted October 31, 2001 - 12:01 pm

    covering performance and security concerns.

  • A TCP/IP primer

    Posted October 19, 2001 - 11:00 am

    and resolve user complaints has also increased in magnitude.

Join today!

See more content
Ask a Question