Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of laurataylor

laurataylor

Send laurataylor an email

Latest from laurataylor

  • Lock IT Down: Install Okena’s StormWatch to keep hackers out
    Security

    Lock IT Down: Install Okena’s StormWatch to keep hackers out

    Learn about a product that can help prevent attackers from gaining access to your network

    laurataylor
    Published:  February 13, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:35 AM PDT Read More See more Security
  • Track down lost data with the EnCase computer forensics tool
    Storage

    Track down lost data with the EnCase computer forensics tool

    Corrupted disks, hapless users, and cybercrimes can all mean one thing to the IT professional: lost data. But if you know how to use EnCase, the data won't be missing for long. Discover how helpful this computer forensics tool can be.

    laurataylor
    Published:  January 13, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:19 AM PDT Read More See more Storage
  • Lock IT Down: Track down lost data with EnCase
    Storage

    Lock IT Down: Track down lost data with EnCase

    EnCase can offer full data recovery for companies and clients doing forensic work

    laurataylor
    Published:  September 24, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:26 AM PDT Read More See more Storage
  • Use WEP to improve security on your wireless network
    Networking

    Use WEP to improve security on your wireless network

    Configure WEP correctly the first time by reading this Daily Drill Down from Laura Taylor. She covers the process from access point installation to adapter card configuration using the Cisco Aironet 350 wireless system as her model.

    laurataylor
    Published:  August 27, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:20 AM PDT Read More See more Networking
  • Lock IT Down: Intrusion detection is not intrusion prevention
    Security

    Lock IT Down: Intrusion detection is not intrusion prevention

    Know the distinction between intrusion detection and prevention

    laurataylor
    Published:  August 20, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:17 AM PDT Read More See more Security
  • Set up a StoneGate Firewall/VPN on your existing network
    Security

    Set up a StoneGate Firewall/VPN on your existing network

    The StoneGate Firewall/VPN solution is a strong choice for many network security administrators. In this Daily Feature, Laura Taylor walks you through the installation on a Sun SPARCstation 20.

    laurataylor
    Published:  July 23, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:32 AM PDT Read More See more Security
  • The Cisco Aironet PC350 adds extra security to VPN client wireless access
    Networking

    The Cisco Aironet PC350 adds extra security to VPN client wireless access

    The popularity of wireless networks has brought with it concerns for security. To help you make your wireless access more secure, follow Laura Taylor's instructions for installing the Cisco Aironet PC350 and learn how to use it with the Cisco VPN Client.

    laurataylor
    Published:  June 26, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:20 AM PDT Read More See more Networking
  • Old-school UNIX tools help track down hackers
    Security

    Old-school UNIX tools help track down hackers

    Take a look at how you can use Linux command line tools such as tcpdump, dig, and traceroute for security auditing.

    laurataylor
    Published:  June 19, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:30 AM PDT Read More See more Security
  • Guidelines for a disaster plan
    Data Centers

    Guidelines for a disaster plan

    Disaster planning guide

    laurataylor
    Published:  December 4, 2001, 12:00 AM PST Modified:  June 8, 2007, 9:26 AM PDT Read More See more Data Centers
  • Keep your network secure with WatchGuard’s hybrid firewalls
    Security

    Keep your network secure with WatchGuard’s hybrid firewalls

    In the market for a one-stop firewall shop? Look no further than WatchGuard and its Firebox line of firewall boxes. In this Daily Feature, Laura Taylor gives you the scoop on one of IT's best-kept secrets!

    laurataylor
    Published:  October 8, 2001, 12:00 AM PDT Modified:  June 8, 2007, 9:20 AM PDT Read More See more Security

TechRepublic Premium

  • TechRepublic Premium

    Hiring kit: Back-end developer

    PURPOSE Finding a back-end developer with programming and technical expertise as well as superior collaboration and communication skills will require a comprehensive recruitment strategy. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: TYPICAL ...

    Published:  March 21, 2023, 12:00 PM EDT Modified:  March 22, 2023, 3:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Application engineer

    PURPOSE Application engineers need to have technical expertise in programming, design, business and the software and hardware required to run the application. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE ...

    Published:  March 21, 2023, 12:00 PM EDT Modified:  March 22, 2023, 3:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Employee performance review policy

    PURPOSE The purpose of this policy from TechRepublic Premium is to provide guidelines for employee performance reviews, which will clearly document accomplishments and areas of opportunity via an encouraging and thought-provoking analysis. This will assist in determining the next steps for employees as well as their future at the organization. This policy can be customized ...

    Published:  March 20, 2023, 12:00 PM EDT Modified:  March 21, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Employee time off policy

    PURPOSE The purpose of this policy from TechRepublic Premium is to provide guidelines for requesting, filing and permitting paid/unpaid time off as well as to ensure coverage during holidays, vacation(s) and other absences where staffing levels must be consistent to meet the needs of the business. From the policy: TIME OFF GUIDELINES All time off ...

    Published:  March 20, 2023, 12:00 PM EDT Modified:  March 21, 2023, 4:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice