Computer networking news, reviews, solutions, and analysis for IT professionals
  • Spoofing the wardrivers: Protect your Wi-Fi network from unauthorized access

    Posted March 28, 2003 - 11:18 am

    Even with the WEP security protocol enabled, 802.11b networks are vulnerable to wardrivers - hackers who carry a Wi-Fi-enabled computer through public spaces, looking for nets they can latch on to. This article offers a series of custom techniques to keep unauthorized users from stealing your bandwidth or worse.
  • Is Wi-Fi's security going to win over network admins?

    Posted March 28, 2003 - 11:05 am

    Wi-Fi was initially criticized for its weak security - and the community has responded with the development of a bewildering array of standards and proposals to improve the situation. This article walks through the history of Wi-Fi security, looking at where the weaknesses are - and how seriously administrators in the field are taking them.
  • Are wireless networks secure yet?

    Posted March 28, 2003 - 10:44 am

    Once vendors and standard-setters solve the encryption and authentication problems facing WLANs, they will be able to attack new areas of network management, such as quality of service and network health.
  • New wireless security means costly upgrade

    Posted March 28, 2003 - 10:38 am

    Wireless users have been eagerly awaiting the new 802.11i standard, which aims to radically improve Wi-Fi security. But they may be in for some nasty sticker shock: most existing 802.11b hardware doesn't have the processing power needed to run the encryption routines that lie at the heart of the new standard. Find out what this might mean for your existing wireless infrastructure.
  • How to set up a VPN for wireless security

    Posted March 28, 2003 - 10:34 am

    By using a VPN, you can eliminate a lot of the security uncertainty involved in Wi-Fi networks. It's not a trivial task, however. This tutorial walks you through the process at both the server and the client ends.
  • Wi-Fi alliance replaces WEP security

    Posted March 28, 2003 - 10:28 am

    Wi-Fi Protected Access should bring tighter network protection to 802.11 by abandoning fixed keys and generating a new key for every 10K-bytes of data transmitted over the network.
  • WLAN security's slippery slope

    Posted March 28, 2003 - 10:13 am

    Companies specializing in wireless security products have blazed the way towards a safer Wi-Fi environment - but may have written the script for their own demise. As Wi-Fi security products and protocols enter the mainstream, giant equipment vendors like Cisco are entering the fray, threatening to squash the pioneers. Find out how this industry shake-out will affect your buying decisions.
  • Total cost of network ownership: Questions to ask

    Posted March 27, 2003 - 1:39 pm

    Most business owners understand the value of network support, but many are uncertain how to appraise available service options. These questions will help you evaluate potential service providers to ensure you optimize your system's efficiency while keeping your TCO as low as possible.
  • US lawmaker pushes mobile phone interests in Iraq

    Posted March 27, 2003 - 12:09 pm

    The U.S. war in Iraq could claim an unexpected victim: GSM (Global System for Mobile Communications) technology developed in Europe.
  • Wireless LAN policies for security and management

    Posted March 27, 2003 - 11:32 am

    Don't assume that your internal wireless network will require less maintenance and planning than your wired network does. This white paper offers a high-level overview of the steps needed to properly plan a WLAN that is secure and easily manageable. (In PDF format; free registration required.)
  • Determining WLAN hardware costs

    Posted March 27, 2003 - 11:23 am

    How much is it really going to cost to set up that wireless LAN that your CEO's been dreaming about? This article walks you step-by-step through the process of cost estimation for various types of WLANs, so you can tell for yourself whether the benefits of your wireless proposal will be worth the costs.
  • A checklist to help secure the small- to medium-sized company

    Posted March 26, 2003 - 1:33 pm

    It's not just high profile multinationals that must protect against digital threats: small- and medium-sized businesses (SMBs) are just as susceptible. Here's a ten-point guide to help SMBs protect their business.
  • Network planning

    Posted March 26, 2003 - 1:16 pm

    Network planning is the process of outlining business requirements and growth plans to build a blueprint for connecting computers and other equipment in your company. Thinking through your business needs before jumping into implementation eases the process, and increases the likelihood that the network solution will match your requirements and scale with your business. Check out these ideas to help you start the planning process.
  • Network security, keeping data safe

    Posted March 26, 2003 - 12:59 pm

    Network security is about making sure that only those people authorized to access your network or read certain files can do so. Security measures are designed to keep unauthorized users out of your network. They ensure trade secrets, strategic documents, customer files, and other data remain confidential and safe. See what steps to take to prevent significant damage in the form of network downtime, lost productivity, property theft and worse.
  • Backup and disaster recovery planning: Insuring the safety of your data

    Posted March 26, 2003 - 12:40 pm

    Protecting your company's data from disaster is all about planning for the worst so that the impact on your business operations is minimal. Learn where to start with this overview.
  • Enabling your network for e-business

    Posted March 26, 2003 - 12:19 pm

    This handbook provides a quick history of networking, and explains how to network your computers and participate in business over the Internet.
  • Worksheet: Network pre-installation checklist

    Posted March 26, 2003 - 11:28 am

    This checklist will help you prepare to plan and install a new or upgraded network. The questions will help you build a network action plan and to allocate resources correctly.
  • Networking essentials for small and medium-sized businesses

    Posted March 26, 2003 - 9:53 am

    Cisco offers this outline to help you understand the primary building blocks of networks and determine the approach to networking that works best for a particular situation. There's a particular emphasis on designing for growth from the beginning, since many network solutions that work for a very small business often don't scale well.
  • Symantec gateway antivirus adds spam blocking

    Posted March 24, 2003 - 5:33 pm

    A new version of Symantec Corp.'s gateway antivirus product adds features that will block spam e-mail messages, according to a statement released by the company on Monday.
  • Linux takes backseat in new Motorola phones

    Posted March 20, 2003 - 3:13 pm

    Motorola Inc. grabbed a lot of headlines in February when it announced the world's first mobile phone that runs Linux, however, developers won't be able to create Linux applications and run those on the phone because Linux is not secure enough, a Motorola spokesman said.
  • 3Com forms Chinese joint venture, narrows loss

    Posted March 20, 2003 - 12:07 pm

    3Com Corp. and Huawei Technologies Co. Ltd. will form a joint venture to build enterprise networking equipment, 3Com announced Wednesday. 3Com also reported financial results for its fiscal third quarter, showing a net loss of US$79.2 million, about a third of the loss it reported a year ago.
  • UPDATE: Cisco to buy Linksys in $500M stock deal

    Posted March 20, 2003 - 10:40 am

    Cisco Systems Inc. is back on the acquisition road, with plans to snap up wireless vendor Linksys Group Inc. Thursday in a stock deal valued at US$500 million.
  • Bug freezes Siemens mobile phones

    Posted March 19, 2003 - 12:15 pm

    A long-known bug can still freeze two series of cell phones manufactured by Siemens AG if users haven't yet installed a patch.
  • CTIA: Wireless visions collide in keynotes

    Posted March 19, 2003 - 12:01 pm

    Wireless executives at a Tuesday morning keynote session at the CTIA Wireless show looked toward ubiquitous high-speed services and new ways of using phones, but some disagreed as to how those services will be delivered.
  • CTIA: Samsung pushes CDMA as Wi-Fi alternative

    Posted March 18, 2003 - 10:21 am

    Samsung on Monday unveiled for the U.S. market a set of products that mobile operators can sell to their customers for local-area 3G, asserting that hospitals, office buildings and campuses can be networked more securely and with less interference using a 3G mobile wireless infrastructure than with Wi-Fi wireless LANs.
Join us:






NetworkingWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question