Data Center

Network, server, and storage administrators get valuable advice and best practices to help meet the challenges they face in keeping systems connected, available, and running at high efficiency.

  • Michael Kassner // November 11, 2008, 3:15 AM PST

    Botnets: Keep computers up to date or else

    Getting rooted by a drive-by dropper is fast becoming the predominate method of involuntarily joining a botnet. The simplest way to avoid this is to keep your computers up to date. Easier said than done? Well, it doesn't have to be.

    0

  • Rick Vanover // November 16, 2008, 10:15 AM PST

    Use iperf for quick and easy network tests

    Being able to quantify latency in terms other than millisecond response time is important when determining the quality of a network. One tool that can help administrators do just that is iperf.

    0

  • Michael Kassner // November 16, 2008, 10:59 AM PST

    Botnets: Web-hosting site closed down and spam drops 50 percent

    Two contracted ISPs stopped providing Web hosting firm McColo with Internet access, which immediately quieted several major botnets responsible for almost half of all delivered spam. Learning how and why this was done is worth your time.

    0

  • Selena Frye // November 19, 2008, 5:38 AM PST

    HomePlug revival continues with new Netgear Powerline gear

    Netgear has released the new Powerline HD Plus Ethernet Adapter Kit (HDXB111) and Powerline AV Ethernet Adapter Kit (XAVB101).

    0

  • David Davis // November 20, 2008, 10:00 PM PST

    Filter Web content with Cisco IOS routers

    Today, filtering content at many companies isn't just optional; it is a legal requirement and something you have to do to prevent employees from getting into trouble. David Davis explains how Cisco IOS routers can filter Web content with the help of outside services.

    0

  • Brad Bird // November 25, 2008, 2:37 AM PST

    Dissecting default NTFS permissions: Looking under the hood

    Consultant Brad Bird takes a look at NTFS file permissions and their default application. Make sure you understand what each of them includes and how they are inherited through the hierarchy to close up security gaps.

    0

  • Selena Frye // November 25, 2008, 5:52 AM PST

    The seven types of power problems

    One of the basic parts of your network infrastructure is, of course, your power supply. It's as basic as you can get, but you can't afford not to understand how your systems are powered and what kinds of problems to look out for.

    0

  • Michael Kassner // December 1, 2008, 5:21 AM PST

    Srizbi Botnet: Life after McColo

    After McColo was shut down, the Srizbi botnet, a major source of spam and over 300,000 strong, was effectively quieted. Not for long, Spam levels eventually started ramping back up. How is that possible with no command and control servers? Read on to find out.

    0

  • Brad Bird // December 2, 2008, 10:47 PM PST

    Are your virtual servers really secure?

    Brad Bird takes a look at virtual servers and their level of security compared to physical servers. What makes a virtual server a richer target for attack? Are you prepared for the security considerations?

    0

  • Michael Kassner // December 6, 2008, 10:26 AM PST

    MS08-067: Not updating has created a monster botnet

    Microsoft created MS08-067 to fix a serious vulnerability. MS even felt the problem was critical enough to justify an out-of-band release of the update. They were right; find out why.

    0

  • Rick Vanover // December 7, 2008, 10:13 AM PST

    Untangle version 6.0 released with new features

    The Untangle open source gateway is one of the more attractive free SOHO products. Version 6.0 has been released with new features and fixes. Rick Vanover showcases them in this blog post.

    0

  • Paul Mah // December 7, 2008, 1:59 PM PST

    Unorthodox applications of 3G video

    As of this past October, there were some 300 million 3G UMTS subscribers around the world. Actual airtime is not available, but anecdotal evidence suggests that uptake on the video abilities afforded by 3G remains dismally low. Paul Mah suggests some possible applications of 3G video for the IT professional.

    0

  • Michael Kassner // December 8, 2008, 7:37 AM PST

    CSRF attacks: Home DSL routers are vulnerable

    Home DSL routers aren't secure from specialized CSRF attacks. Once the DSL router is owned, attackers can have their way with the internal network. Read on to learn about CSRF and what you can do to prevent CSRF attacks.

    0

  • Brad Bird // December 9, 2008, 2:46 AM PST

    Take advantage of IT forums and user-group benefits: Get your Geek on!

    Community user groups are a great way to find other professionals in your area and expand your list of contacts. You can often leverage knowledge from these professionals or even obtain work for each other.

    0

  • Selena Frye // December 10, 2008, 5:18 AM PST

    Troubleshooting guide for common TCP/IP problems

    If your network troubleshooting is more art than science, then you might need to try a more methodical approach. Here is a basic guide that will help you organize your troubleshooting efforts.

    0