Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of mikemullins

mikemullins

Send mikemullins an email

Latest from mikemullins

  • Keep your router configurations secure
    Networking

    Keep your router configurations secure

    The security you add when managing routers can make the difference between providing a functional and responsive network or an isolated intranet that provides services to no one. Take these steps to maintain router security.

    mikemullins
    Published:  December 6, 2007, 5:23 AM PST Modified:  December 6, 2007, 5:23 AM PST Read More See more Networking
  • Why your registry doesn’t need cleaning
    Security

    Why your registry doesn’t need cleaning

    If you're not too familiar with the registry and how it works, there are a slew of different companies that would like to sell you a registry cleaner. Do you need to clean your registry? Let's look at the facts.

    mikemullins
    Published:  November 29, 2007, 5:09 AM PST Modified:  November 29, 2007, 5:09 AM PST Read More See more Security
  • Defend your network from slow scanning
    Security

    Defend your network from slow scanning

    Most serious attackers aren't going to advertise their intentions by performing a broad scan -- the smartest attackers will try to come in under your detection radar. Learn why attackers prefer slow scanning, learn about the tools they use, and find out how to defend against this low-and-slow approach.

    mikemullins
    Published:  November 15, 2007, 5:01 AM PST Modified:  November 15, 2007, 5:01 AM PST Read More See more Security
  • Protect IIS log files by moving them to a secure location
    Data Centers

    Protect IIS log files by moving them to a secure location

    Internet Information Services (IIS) continues to be a favorite target for hackers. Make their job harder by moving IIS log files to a secure remote location.

    mikemullins
    Published:  October 31, 2007, 11:24 PM PDT Modified:  October 31, 2007, 11:24 PM PDT Read More See more Data Centers
  • Eight daily steps to a more secure network
    Security

    Eight daily steps to a more secure network

    While many companies have a 9-to-5 security staff, hackers don't punch a clock. However, your network can still remain secure in the 16 hours in-between -- you just need to focus activities to provide maximum coverage for the network. Get started with this list of eight daily tasks.

    mikemullins
    Published:  October 24, 2007, 10:13 PM PDT Modified:  October 24, 2007, 10:13 PM PDT Read More See more Security
  • Protect corporate data with these physical security precautions
    Security

    Protect corporate data with these physical security precautions

    Not all attacks on your organization's data come across the network. Once someone gains physical access to your data, you become vulnerable to further attacks, not to mention a lot of bad publicity. Get some guidelines for locking down physical access.

    mikemullins
    Published:  October 18, 2007, 7:13 AM PDT Modified:  October 18, 2007, 7:13 AM PDT Read More See more Security
  • Restrict users’ access on Linux systems
    Open source

    Restrict users’ access on Linux systems

    In a recent article, I told you how to force Windows users to log off at a specific time by using a third-party utility. Here's how to implement a similar solution for Linux users.

    mikemullins
    Published:  October 11, 2007, 5:31 AM PDT Modified:  October 11, 2007, 5:31 AM PDT Read More See more Open source
  • Establish a patch management policy
    Security

    Establish a patch management policy

    Given the current state of security, patch management can easily become overwhelming, which is why it's a good idea to establish a patch management policy to define the necessary procedures and responsibilities. Here's a sample policy you can modify for your organization's needs.

    mikemullins
    Published:  October 4, 2007, 6:36 AM PDT Modified:  October 4, 2007, 6:36 AM PDT Read More See more Security
  • Make sure security logs exhibit accurate time with NTP
    Networking

    Make sure security logs exhibit accurate time with NTP

    It’s vital that organizations take steps to synchronize the time on their network and devices, but it’s even more important to make sure the logs produced by security devices reflect the accurate time. Find out why accurate time is so important for security logs, and walk through the process of synchronizing your network. It’s important to synchronize the ...

    mikemullins
    Published:  September 27, 2007, 7:07 AM PDT Modified:  September 27, 2007, 7:07 AM PDT Read More See more Networking
  • Be aware of the threat of hidden keystroke-logging devices
    Tech & Work

    Be aware of the threat of hidden keystroke-logging devices

    Keystroke loggers are a particularly dangerous security threat because users typically don’t realize they’re even there. Learn about the different versions of keystroke loggers, and get tips for protecting your organization and your users from this threat. More and more people have made the switch to using the Internet for personal tasks — online bill paying and shopping ...

    mikemullins
    Published:  September 20, 2007, 3:13 AM PDT Modified:  September 20, 2007, 3:13 AM PDT Read More See more Tech & Work
  • Prev
  • 1
  • 2
  • 3
  • 4
  • Next
33 results

TechRepublic Premium

  • TechRepublic Premium

    How to recruit and hire a Scrum Master

    Recruiting a Scrum Master with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit provides a customizable framework your business can use to find, recruit and ultimately hire the right person for the job. This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  August 5, 2022, 5:00 PM PDT Modified:  August 7, 2022, 4:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Web 3.0 quick glossary

    Knowing the terminology associated with Web 3.0 is going to be vital to every IT administrator, developer, network engineer, manager and decision maker in business. This quick glossary will introduce and explain concepts and terms vital to understanding Web 3.0 and the technology that drives and supports it.

    Downloads
    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 1:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire a User Experience Designer

    While the perfect color palette or the most sublime button shading or myriad of other design features play an important role in any product’s success, user interface design is not enough. Customer engagement and retention requires a strategic plan that attempts to measure, quantify and ultimately create a complete satisfying user experience on both an ...

    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 3:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice