Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • Podcasts // Nov 2011

    Visual Studio 2010 "Quick Hit" - Code Optimized Profile

    In this podcast, the speaker will explain the user how to use the "Web Development (Code Optimized)" profile option in Visual Studio 2010 that hides the designer tab and focuses on a source-only editing experience.

    Provided By Oleksiy Kovyrin

  • Podcasts // Mar 2012

    Railscasts #336: Copycopter

    Copycopter provides a nice interface that clients can use to edit the text in a Rails application. In this podcast, the speaker explains how to deploy a Copycopter server using Heroku and integrate it in a Rails application through I18n.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #243: Beanstalkd and Stalker

    In this podcast, the speaker going to explain about Beanstalk. Beanstalk which is a fast and easy way to queue background tasks. Stalker provides a nice wrapper interface for creating these jobs.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #229: Polling for Changes

    If the user have frequently changing data on the server side, it's helpful to automatically display this to the them as well. In this podcast, the speaker going to show how to accomplish this with polling in jQuery.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2013

    Collaborating for the Internet of Things

    When it comes to developing solutions for the Internet of Things (IoT), they need to be connected, managed and secure. Learn from Tom Moore of McAfee, Jim Douglas of Wind River, and Kumar Balasubramanian of Intel how they are collaborating to streamline IoT integration by delivering consistent, reliable, integrated, end-to-end...

    Provided By Wind River

  • Podcasts // Aug 2013

    Trends in Video Collaboration and Unified Communications

    Unified communication solutions can help organizations improve their productivity, stay competitive and be more agile. But knowing what type of communication solutions your organization solutions your organization needs can be difficult and time-consuming. In this on-demand webinar, AVI-SPL's vice president of Collaboration Solutions, Shai Moshe, shares insights and advice...

    Provided By AVI-SPL

  • Podcasts // Jan 2013

    Endpoint Management: Challenges and Observations

    This podcast reveals why the users' need to manage endpoints, and what's at stake if they don't. End users can accidentally or intentionally compromise the information on their Blackberries, thumb drives, and laptops. And malware, direct attacks, and phishing scams, can actually threaten their ability to run their business. The...

    Provided By Novell

  • Podcasts // Jan 2013

    Tips for Managing and Securing Endpoints in the Enterprise

    In today's economy, organizations are becoming more complex everyday and devices are exploding in the enterprise. This growth creates IT challenges. In this podcast, the speakers offer tips to help organizations manage, optimize and secure their endpoints.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Your Environment Using Novell ZENworks Endpoint Security Management and Novell ZENworks Network Access Control

    In this podcast, learn how the users' can leverage the power of ZENworks endpoint security management. The speaker will also examines ZENworks network access control across their enterprise, so their users can stay productive.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Endpoints With Novell Endpoint Security Management

    In this podcast, the speaker explains the need for ZENworks endpoint security management and how ZESM addresses those needs. ZENworks endpoint security is agent based solution for enforcing information security policies.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Your Infrastructure Using ZENworks Endpoint Security Management and ZENworks Network Access Control

    Organizations everywhere are providing users with more mobile devices - with the ability to connect to more networks - than ever before. Why? Because mobility equals productivity, and organizations benefit from every additional degree of mobile enablement they provide to their people. In this podcast, the speaker will help the...

    Provided By Novell

  • Podcasts // Jan 2013

    Endpoint Security Best Practices From IDC and Novell

    To ensure that the users' infrastructure is protected against external threats, it's critical to not only secure the infrastructure at the perimeter, but also at the endpoint. In this podcast, the speakers will discusses about the business endpoint security issues, business at the endpoint and endpoint case studies.

    Provided By Novell

  • Podcasts // Jan 2013

    What's New in ZENworks Endpoint Security Management 11

    In this podcast, the speaker going to explain about the latest features of ZESM 11 endpoint security management. The speaker will also explain how to deploy and configure integrated ZESM, UI for ZESM policies, location assignment policy and conflict resolution.

    Provided By Novell

  • Podcasts // Jan 2013

    Wi-Fi Security - White List Access Points by SSID

    In this podcast, the speaker going to explain about the Wi-Fi security policy of endpoint security management. The speaker will also explain the how to allow access to a specific SSID and block other APs and enforce minimum wireless security.

    Provided By Novell

  • Podcasts // Jan 2013

    VPN Enforcement

    In this podcast, learn how to configure the VPN enforcement, locations and network environments, firewalls for office and VPN enforcement, VPN enforcement setup, trigger location, switch to location, and invoke VPN.

    Provided By Novell

  • Podcasts // Jan 2013

    Application Control

    In this podcast, the speaker going to explain about the application control policies at ZENworks endpoint security management. The speaker will also explain the how to block the execution of files and network access of files.

    Provided By Novell

  • Podcasts // Jan 2013

    Hardware Control-Disable Wi-Fi When Wired

    In this podcast, the speaker going to explain communication hardware policy of how to disable Wi-Fi when wired, disable modems, disable modems when wired, manage 1394 (Firewire), IDA, Bluetooth, serial/parallel, and adapter bridging.

    Provided By Novell

  • Podcasts // Jan 2014

    TDL4 Rootkit - Being Used as a Proxy

    In this podcast, the speaker will explain the TDL4 Rootkit. It helps the user to learn how the new TDL4 Rootkit uses an infected PC as a proxy server. The TDL4 Rootkit claimed to support all versions of Microsoft Windows, since XP including Windows 7 sp1, inclusive, and supports both...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Proxy Server

    Proxy server works as intermediate server to send the requests to main servers on internet on behalf of other computers, so that can hide the identity of actual requester or user using internet. It is like a middleone that works between the user's computer and the server.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Load Balancing Apache Server

    In this podcast, the listener can learn how to setup Load Balancing on Apache server. The speaker will explain how this load balancing works on two apache server and why load balancing is important for security.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    SSH Gymnastics Using Proxychains

    Proxychains is a Linux dynamically loadable library that will intercept any TCP and UDP traffic from a specific process and tunnel it over HTTP, SOCKS4 or SOCKS5 proxy. In this podcast, the speaker will explain how to Use Proxychains to pivot through SSH servers to reach internal systems.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Using Security Tools - Paros Proxy

    Paros is a program for people who need to evaluate the security of their web applications. It is free of charge and completely written in Java. Through Paros's proxy nature, all HTTP and HTTPS data between server and client, including cookies and form fields, can be intercepted and modified.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Messaging Architects: Upgrading to GroupWise 8, 'TOP' Grading to Compliance

    Risk free e-mail infrastructure products to provide 100 percent up time and compliance. Includes policy enforcement and management. In this podcast, the presenter explains about how to utilize Messaging Architects products with GroupWise 8.

    Provided By Novell

  • Podcasts // Jan 2014

    NetBackup 7.5 for VMware

    In this podcast, the speaker will explain about NetBackup 7.5 for VMware. Get a deep dive look into how the NetBackup Platform provides a superior solution for protecting virtual servers which includes a technology overview.

    Provided By SYMA S.C.

  • Podcasts // Aug 2013

    Cloud Networking: What It Means for App Development

    In this podcast, the speaker will look at the application delivery controller's effect on the development, deployment and maintenance of applications, and web applications in particular. Starting with an overview of the evolution of load balancers into Application Delivery Controllers (ADCs), the speaker will then dive deeper into how the...

    Provided By oreilly

  • Podcasts // Apr 2010

    Preparing for a Cyber Attack

    In this podcast, the speaker will separate the hype from the facts regarding ongoing foreign intrusions into government networks and the targeting of government employees. It will also provide practical advice on how to protect the users' and their organization from the actors orchestrating these intrusions.

    Provided By oreilly

  • Podcasts // May 2008

    The Top Five Log Analysis Mistakes

    In this podcast, the speaker will explains how to avoid the log analysis mistakes and how to get the most value out of various log files, generated by systems, applications and security devices.

    Provided By oreilly

  • Podcasts // Jan 2013

    Symantec Certificate Intelligence Center - Overview

    In this podcast, the speaker going to discuss about the Symantec Certificate Intelligence Center who discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Symantec File Share Encryption

    Learn how Symantec File Share Encryption encrypts files and folders based on policy and enables end users to continue normal business operations with zero disruptions. All while contributing to a more secure and effective work environment.

    Provided By Symantec Corp.

  • Podcasts // Dec 2013

    Excluding an IP Address from Video Caching on a Citrix CloudBridge Appliance

    The CloudBridge appliance proxies every HTTP connection as a result the user may want certain source or destination IP address from the proxy behavior. This may be needed to access application that are configured for 1:1 access.

    Provided By DABCC

  • Podcasts // Dec 2013

    Configuring Domain Append on a CloudBridge Appliance

    Internal servers in an enterprise are part of a domain and are resolved using the domain. The CloudBridge appliance proxy's users on the network, but does not resolve the domain suffix.

    Provided By DABCC