Data Center

Network, server, and storage administrators get valuable advice and best practices to help meet the challenges they face in keeping systems connected, available, and running at high efficiency.

  • David Davis // December 11, 2008, 10:00 PM PST

    The 10 Cisco IOS Router file management commands you must know

    David Davis goes over the Cisco IOS commands you must know to manipulate files on your Cisco router flash, nvram, or other filesystems, allowing you to back up your configuration, upgrade your router, or just maintain the IOS file system.


  • Michael Kassner // December 11, 2008, 5:54 AM PST

    New zero-day IE7 exploit is in the wild

    A new IE7 exploit is now making the rounds. It has already been incorporated in toolkits that install information-stealing trojans. Read on to learn more.


  • Selena Frye // December 10, 2008, 5:18 AM PST

    Troubleshooting guide for common TCP/IP problems

    If your network troubleshooting is more art than science, then you might need to try a more methodical approach. Here is a basic guide that will help you organize your troubleshooting efforts.


  • Brad Bird // December 9, 2008, 2:46 AM PST

    Take advantage of IT forums and user-group benefits: Get your Geek on!

    Community user groups are a great way to find other professionals in your area and expand your list of contacts. You can often leverage knowledge from these professionals or even obtain work for each other.


  • Michael Kassner // December 8, 2008, 7:37 AM PST

    CSRF attacks: Home DSL routers are vulnerable

    Home DSL routers aren't secure from specialized CSRF attacks. Once the DSL router is owned, attackers can have their way with the internal network. Read on to learn about CSRF and what you can do to prevent CSRF attacks.


  • Paul Mah // December 7, 2008, 1:59 PM PST

    Unorthodox applications of 3G video

    As of this past October, there were some 300 million 3G UMTS subscribers around the world. Actual airtime is not available, but anecdotal evidence suggests that uptake on the video abilities afforded by 3G remains dismally low. Paul Mah suggests some possible applications of 3G video for the IT professional.


  • Rick Vanover // December 7, 2008, 10:13 AM PST

    Untangle version 6.0 released with new features

    The Untangle open source gateway is one of the more attractive free SOHO products. Version 6.0 has been released with new features and fixes. Rick Vanover showcases them in this blog post.


  • Michael Kassner // December 6, 2008, 10:26 AM PST

    MS08-067: Not updating has created a monster botnet

    Microsoft created MS08-067 to fix a serious vulnerability. MS even felt the problem was critical enough to justify an out-of-band release of the update. They were right; find out why.


  • David Davis // December 4, 2008, 5:24 AM PST

    10 dumb things you can do to your Cisco router and how to fix them

    David Davis points out the dumb things you can do to mess up your Cisco router and how to fix them. He also lists some important resources for each step to give you even more detailed instructions.


  • Brad Bird // December 2, 2008, 10:47 PM PST

    Are your virtual servers really secure?

    Brad Bird takes a look at virtual servers and their level of security compared to physical servers. What makes a virtual server a richer target for attack? Are you prepared for the security considerations?


  • Michael Kassner // December 1, 2008, 5:21 AM PST

    Srizbi Botnet: Life after McColo

    After McColo was shut down, the Srizbi botnet, a major source of spam and over 300,000 strong, was effectively quieted. Not for long, Spam levels eventually started ramping back up. How is that possible with no command and control servers? Read on to find out.


  • Rick Vanover // November 30, 2008, 5:01 PM PST

    More tools for easy network testing: NTttcp and NetCPS

    Microsoft's NTttcp and NetCPS offer a quick and easy way to gauge the peformance of a network between two hosts in a listener and sender configuration. Rick Vanover introduces you to these two handy tools.


  • Michael Kassner // November 26, 2008, 10:20 AM PST

    Rootkits: Is removing them even possible?

    The people developing rootkits are smart and financially motivated to design rootkits that evade detection. So what’s the answer? Michael Kassner reviews some of the approaches you can try.


  • Selena Frye // November 25, 2008, 5:52 AM PST

    The seven types of power problems

    One of the basic parts of your network infrastructure is, of course, your power supply. It's as basic as you can get, but you can't afford not to understand how your systems are powered and what kinds of problems to look out for.


  • Brad Bird // November 25, 2008, 2:37 AM PST

    Dissecting default NTFS permissions: Looking under the hood

    Consultant Brad Bird takes a look at NTFS file permissions and their default application. Make sure you understand what each of them includes and how they are inherited through the hierarchy to close up security gaps.


  • Rick Vanover // November 16, 2008, 10:15 AM PST

    Use iperf for quick and easy network tests

    Being able to quantify latency in terms other than millisecond response time is important when determining the quality of a network. One tool that can help administrators do just that is iperf.


  • David Davis // November 13, 2008, 10:00 PM PST

    Check out the most powerful Cisco routers ever made

    They may not be appropriate for your home, office, or even your enterprise, but some of the most powerful routers in the world make it possible for you to surf the Web and send e-mail around the globe. David Davis introduces you to Cisco's lineup of service-provider routers.


  • Rick Vanover // November 2, 2008, 10:17 AM PST

    Kicking the tires on Untangle's Re-Router gateway

    Managing a SOHO's network can be a daunting challenge. The good news is that with limited resources of staff and equipment, a network can be protected and given network management for free.


  • Michael Kassner // November 2, 2008, 10:43 AM PST

    Botnets: How to get rooted in one easy lesson

    In discussions about botnets, how and why a computer becomes part of a botnet are two questions that get asked quite often. Like most things in life, the answers aren’t simple. Michael Kassner sets out to provide some answers about the origins of botnets.


  • David Davis // November 5, 2008, 10:00 PM PST

    Learn how the Cisco IOS parser command can speed up response time

    On routers with large running configurations, the parser cache is used to speed up the "parsing" of that IOS configuration when the configuration is accessed and processed by the router. David Davis explains what the parser cache does and how it can help you.


  • Rick Vanover // November 10, 2008, 2:39 PM PST

    How do you manage a mobile mini-datacenter?

    Every network administrator may at some point create or support a mobile collection of equipment for use between sites or at other destinations. Rick Vanover shares some strategies that can be used to manage this type of network.


  • Michael Kassner // November 11, 2008, 3:15 AM PST

    Botnets: Keep computers up to date or else

    Getting rooted by a drive-by dropper is fast becoming the predominate method of involuntarily joining a botnet. The simplest way to avoid this is to keep your computers up to date. Easier said than done? Well, it doesn't have to be.


  • Michael Kassner // December 29, 2008, 3:00 AM PST

    DNS Changer trojan: Latest variant is certainly unique

    The developers of the DNS Changer trojan have been busy, three generations just in the past year. The newly released version is the one we need to worry about. Learn how to find and combat it.


  • Brad Bird // December 28, 2008, 10:00 PM PST

    Enhance your skills and meet others: How to create a certification study group

    Blogger Brad Bird describes how his local group of IT pros created a study group to help prepare for certification exams and stay current on technology. Read about his experience with the many benefits of user groups.


  • Rick Vanover // December 28, 2008, 12:57 PM PST

    Terminal Services Gateway is a good way to go for remote desktop

    The Terminal Services Gateway is simply a HTTPS-based connection for remote desktop. It does this by providing native encryption, using port 443, allowing enhanced logging, policy configuration, and centrally controlling the remote desktop connections. The Terminal Services Gateway is a new role that is made available with Windows Server 2008, and it can provide some features that network administrators may be excited to use.


  • Michael Kassner // December 23, 2008, 11:44 PM PST

    TechRepublic's networking host: My dream come true

    I've been living a dream this past year. Simply being here, having a great son, and writing about techy things for TechRepublic is something I'm very thankful for.


  • Paul Mah // December 23, 2008, 4:01 PM PST

    A closer look at femtocells

    Femtocell technology has been hailed as an alternative to deliver the advantages of fixed mobile convergence. Poised for commercial launches by Telcos around the world in 2009, we take a closer look at this nascent new wireless mobile technology.


  • Michael Kassner // December 21, 2008, 9:14 PM PST

    Phorm's Webwise: It's back and gaining traction

    Michael Kassner has been keeping up with news about Phorm and Webwise. Webwise is a behavioral targeting application offered by Phorm, and now major ISPs are seriously considering using Webwise. Knowing what that means is important to all of us who care about privacy issues.


  • Rick Vanover // December 21, 2008, 2:46 PM PST

    Protocol control made easy for the SOHO

    Managing what network traffic occurs on a small office network is a great challenge. The Untangle gateway offers a free way to block certain protocols from being used on a network.


  • Michael Kassner // December 21, 2008, 7:50 AM PST

    Linksys WVC54GC: Exploit discloses system configuration

    A Linksys Web camera is vulnerable to SetSource() boundary error. This vulnerability will disclose sensitive system information in plain text to an attacker.