Data Center

Network, server, and storage administrators get valuable advice and best practices to help meet the challenges they face in keeping systems connected, available, and running at high efficiency.

  • David Davis // August 14, 2008, 11:00 PM PST

    How can Cisco Automatic Signature Extraction prevent zero-day virus attacks?

    The Cisco IOS is powerful and already running on your routers. You would think that it could play a part in this virus detection and prevention, right? Luckily, it can. David Davis explains how it works.

    0

  • Michael Kassner // August 17, 2008, 10:23 AM PST

    DNS: Patched but not totally fixed

    DNS isn't out of the woods yet; there's a proof-of-concept exploit that successfully poisons the cache of a fully-patched and up-to-date DNS server. In order to keep everyone up to speed, I'd like to describe the attack vector and some possible fixes that we will be hearing about.

    0

  • Rick Vanover // August 17, 2008, 6:01 PM PST

    Virtual switching configurations require network admin

    The virtual switch concept in virtualization environments is critical to an agile installation. Be sure to get a network admin checkout of the configuration, as the configurations could stand to be optimized based on the physical configuration.

    0

  • Andy Moon // August 18, 2008, 1:33 PM PST

    Is your wireless network secure?

    In a recent tour of San Francisco, Oakland, and Palo Alto, a leading security expert discovered over 2600 networks, nearly a third of which were not using any encryption at all.

    0

  • Kris Littlejohn // August 19, 2008, 12:58 AM PST

    What IT pros should know about repetitive stress injuries

    Long hours at the keyboard can lead to a host of problems for IT professionals. Here's a look at symptoms to watch out for, steps you can take to prevent injuries, and what to expect if you seek treatment for any type of RSI.

    0

  • Andy Moon // August 19, 2008, 1:13 PM PST

    The cloud is getting more secure, except from the government

    Cloud computing is poised to be the next "disruptive technology" on the scene. It's a powerful concept, but the price may be your privacy. A little known provision of federal law allows officials to snoop into data stored at an ISP without taking the trouble of narrowly scoped warrants based on probable cause presented to a judge.

    0

  • Michael Kassner // August 19, 2008, 10:07 PM PST

    HTTPS: Surf jacking makes it vulnerable

    Cookies and redirection seem to be this year's "attack vector du jour." At DefCon, Mike Perry gave a rather disconcerting talk about surf jacking and how it can be used to capture SSL session cookies. Michael Kassner would like to explain how surf jacking compromises HTTPS security.

    0

  • David Davis // August 21, 2008, 11:00 PM PST

    Learn how PCI affects Cisco network configuration

    If your business accepts credit cards and you haven't yet had to get tough with your network security, you will eventually. David Davis explains how the PCI data security standards affect your Cisco router and switch security configuration.

    0

  • Rick Vanover // August 24, 2008, 6:01 PM PST

    Untangle appliance offers free QoS

    The Untangle appliance offers many free services in its gateway product.One more feature is the QoS network application that adds to the compelling list of features that make up a strong solution for the SOHO.

    0

  • Rick Vanover // September 16, 2008, 2:25 AM PST

    Untangle's free Re-Router gateway for Windows is good bet for SMBs

    The popular Untangle gateway product now offers a Windows-based solution. The best part is, no dedicated hardware or extra interfaces are required. The Re-Router product makes protecting the SOHO much easier.

    0

  • Rick Vanover // September 8, 2008, 1:22 PM PST

    Untangle appliance tackles spyware at the gateway

    Protecting clients against spyware using only URL filtering is not enough. Here is a free solution that will inspect traffic for known malicious content and protect in three ways other than URLs alone.

    0

  • Justin James // September 9, 2008, 12:47 AM PST

    What type of spam annoys you the most?

    The proliferation of e-mail spam was bad enough, but now there is phone, IM, and TXT spam to add to users' frustrations. Take this quick poll to let us know which type of spam you find most annoying.

    0

  • Michael Kassner // September 10, 2008, 11:48 PM PST

    Google changes data retention policy for Google search

    Google just announced changes to their data retention policy. Are you curious about the policy? What it means to use Google search? It might be a good time to review the policy.

    0

  • David Davis // September 11, 2008, 11:00 PM PST

    Increase network bandwidth using Cisco's EtherChannel

    David Davis explains how to configure EtherChannel to increase your bandwidth and provide redundancy on a Cisco network.

    0

  • Michael Kassner // September 14, 2008, 12:41 PM PST

    BGP: Yet another Internet time bomb

    BGP is the core routing protocol of the Internet and yet it appears that BGP's trusting nature allows attackers to intercept Internet traffic. The problem has been known for a long time so why hasn't it been fixed? Michael Kassner answers that and points out a new twist.

    0