Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of lori h

lori h

Send lori h an email

Latest from lori h

  • Cisco ASA’s new Botnet Traffic Detector: Too good to be true?
    Developer

    Cisco ASA’s new Botnet Traffic Detector: Too good to be true?

    Lori Hyde discusses the new Botnet Traffic Detector feature in the latest version of the Cisco ASA firewall. She explains how it's supposed to work but wonders how it will fare in the real world.

    lori h
    Published:  May 28, 2009, 3:03 AM PDT Modified:  May 28, 2009, 3:03 AM PDT Read More See more Developer
  • Cisco ASA Packet Trace: Your firewall debug friend
    Security

    Cisco ASA Packet Trace: Your firewall debug friend

    Lori Hyde explains how the Packet Trace tool works to help you debug firewall configurations. You can use this handy tool to see how a packet will be handled by your ASA in its current configuration.

    lori h
    Published:  May 21, 2009, 1:13 AM PDT Modified:  May 21, 2009, 1:13 AM PDT Read More See more Security
  • Secure your Cisco Network Time Protocol with these tips
    Networking

    Secure your Cisco Network Time Protocol with these tips

    Lori Hyde makes recommendations for your Cisco routers to secure Network Time Protocol, a critical function for your network, which affects crucial items such as VPNs, time-based ACLs, and authentication.

    lori h
    Published:  May 14, 2009, 1:21 AM PDT Modified:  May 14, 2009, 1:21 AM PDT Read More See more Networking
  • Understand the pros and cons of using Cisco ASA Multiple Context Mode
    Security

    Understand the pros and cons of using Cisco ASA Multiple Context Mode

    Lori Hyde explains the circumstances in which you would and wouldn't want to use multiple security contexts, or Multiple Context Mode, in the Cisco ASA.

    lori h
    Published:  May 7, 2009, 12:00 AM PDT Modified:  May 7, 2009, 12:00 AM PDT Read More See more Security
  • Customize the SSL portal for remote users in the Cisco ASA
    Developer

    Customize the SSL portal for remote users in the Cisco ASA

    Lori Hyde explains how to customize the SSL portal for remote users with customizations that can be configured via the Adaptive Security Device Manager (ASDM) interface in the Cisco ASA.

    lori h
    Published:  April 30, 2009, 2:36 AM PDT Modified:  April 30, 2009, 2:36 AM PDT Read More See more Developer
  • fig1.png
    Image: Microsoft
    Networking

    Clientless SSL VPN remote access set-up guide for the Cisco ASA

    Lori Hyde explains the initial setup and configuration of Clientless SSL VPN for remote users who need access to resources in a very controlled environment.

    lori h
    Published:  April 22, 2009, 11:30 PM PDT Modified:  April 22, 2009, 11:30 PM PDT Read More See more Networking
  • Maximize your network training budget, even if it’s zero
    After Hours

    Maximize your network training budget, even if it’s zero

    Cisco expert Lori Hyde tells you how to get the most out of your slashed training budget, and shake up your team's routine at the same time. Take advantage of Cisco's Game Arcade to sharpen your skills.

    lori h
    Published:  April 15, 2009, 11:30 PM PDT Modified:  April 15, 2009, 11:30 PM PDT Read More See more After Hours
  • Easy packet captures straight from the Cisco ASA firewall
    Data Centers

    Easy packet captures straight from the Cisco ASA firewall

    Lori Hyde tells you how to capture packets directly from the Cisco ASA without using a separate packet-sniffing utility, first by setting up an ACL to define the traffic and then using the capture command.

    lori h
    Published:  April 9, 2009, 6:11 AM PDT Modified:  April 9, 2009, 6:11 AM PDT Read More See more Data Centers
  • Create router menus to suit your needs
    Enterprise Software

    Create router menus to suit your needs

    Lori Hyde tells you how to create router menus that allow you to control user access to a limited set of commands.

    lori h
    Published:  April 1, 2009, 11:30 PM PDT Modified:  April 1, 2009, 11:30 PM PDT Read More See more Enterprise Software
  • Use sequence numbers for easy Access Control List modifications
    Networking

    Use sequence numbers for easy Access Control List modifications

    Lori Hyde shows you an example of how Cisco's introduction of sequence numbers makes it easier to manage Access Control Lists.

    lori h
    Published:  March 26, 2009, 5:33 AM PDT Modified:  March 26, 2009, 5:33 AM PDT Read More See more Networking
  • 1
  • 2
  • Next
13 results

TechRepublic Premium

  • TechRepublic Premium

    Hiring kit: Community engagement manager

    PURPOSE Recruiting a community engagement manager with the right combination of experience and communication skills will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY ...

    Published:  March 28, 2023, 12:00 PM EDT Modified:  March 29, 2023, 10:12 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Chief experience officer

    PURPOSE Successful chief experience officers combine excellent communications skills with an intimate knowledge of customer expectations, company operations and industry standards. This hiring kit from TechRepublic Premium provides a workable framework you can use to find, recruit and ultimately hire the best candidate for CXO of your organization. From the hiring kit: DUTIES AND RESPONSIBILITIES ...

    Published:  March 28, 2023, 12:00 PM EDT Modified:  March 29, 2023, 10:26 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Automation specialist

    PURPOSE Recruiting an automation specialist with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS ...

    Published:  March 27, 2023, 12:00 PM EDT Modified:  March 28, 2023, 12:48 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Cybersecurity engineer

    PURPOSE Recruiting a cybersecurity engineer with the right combination of technical and industry experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS ...

    Published:  March 27, 2023, 12:00 PM EDT Modified:  March 28, 2023, 12:18 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice