Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of mikemullins

mikemullins

Send mikemullins an email

Latest from mikemullins

  • Defend your network from idle scanning
    Security

    Defend your network from idle scanning

    Black hats employ several stealth scanning techniques, and one of those threats is the idle scan. Find out more about idle scanning, and learn best practices for protecting your network from this threat. If your organization’s intrusion detection system (IDS) identifies a scan of your network, and you just block that IP address, you likely ...

    mikemullins
    Published:  September 13, 2007, 5:20 AM PDT Modified:  September 13, 2007, 5:20 AM PDT Read More See more Security
  • Force users to log off when their time is up
    Enterprise Software

    Force users to log off when their time is up

    Last time, I told you how to control access to home and workgroup machines by implementing logon restrictions using the net user command (“Restrict logon access with this command“). In response, a loyal reader pointed out that, while this restricts logon, it does not force logoff. Essentially, that means a user could remain logged on ...

    mikemullins
    Published:  September 6, 2007, 5:24 AM PDT Modified:  September 6, 2007, 5:24 AM PDT Read More See more Enterprise Software
  • Restrict logon access with this command
    Collaboration

    Restrict logon access with this command

    Do you need to make sure employees aren’t cruising the Internet or using the network to browse inappropriate sites or copy proprietary data? What if you just want to control when your children can use the computer so they’re not on the Internet without supervision? You can restrict the times that specified accounts can log ...

    mikemullins
    Published:  August 30, 2007, 6:49 AM PDT Modified:  August 30, 2007, 6:49 AM PDT Read More See more Collaboration
  • Pinpoint vulnerabilities on your system with Nessus
    Security

    Pinpoint vulnerabilities on your system with Nessus

    Fixing vulnerabilities is an ongoing process that requires diligence — it’s not something you can ever cross off your task list. However, there are plenty of excellent tools available that will assess your systems for known vulnerabilities. Let me introduce you to one of the best. Finding and fixing vulnerabilities on your systems isn’t a task you ...

    mikemullins
    Published:  August 23, 2007, 4:33 AM PDT Modified:  August 23, 2007, 4:33 AM PDT Read More See more Security
  • Troubleshoot IPSec with these tips
    Networking

    Troubleshoot IPSec with these tips

    Running IPSec to secure your network’s communication traffic provides a very strong layer of defense to your network. However, it’s important that you test these policies before deploying them and verify that they’re running properly. Here are some troubleshooting tips for when you run into trouble. Securing your organization’s LAN and WAN traffic from prying eyes is ...

    mikemullins
    Published:  August 16, 2007, 5:04 AM PDT Modified:  August 16, 2007, 5:04 AM PDT Read More See more Networking
  • Two proactive steps to protect data when using Windows EFS
    Microsoft

    Two proactive steps to protect data when using Windows EFS

    Depending on the community that your network serves and the information contained on that network, the government may require you to encrypt that data. But even if you’re not subject to such legislation, encryption can be a good idea. Users have many responsibilities, and low on their list of priorities is managing security for the ...

    mikemullins
    Published:  August 9, 2007, 6:25 AM PDT Modified:  August 9, 2007, 6:25 AM PDT Read More See more Microsoft
  • Beef up Active Directory security with these three steps
    Microsoft

    Beef up Active Directory security with these three steps

    The Active Directory (AD) structure and the data contained in that structure are the keys to a Windows domain, and it’s vital that you implement the proper security and delegation. Here are three simple steps you can take to boost AD’s security. The Active Directory (AD) structure and the data contained in that structure are ...

    mikemullins
    Published:  July 31, 2007, 3:55 AM PDT Modified:  July 31, 2007, 3:55 AM PDT Read More See more Microsoft
  • Windows rootkits 101
    Security

    Windows rootkits 101

    When administrators and security professionals hear the word rootkit, most think first of a UNIX-based system. Unfortunately, this only leads to a false sense of security for Windows-based systems. The fact is that Windows rootkits do exist, and you need to be able to detect them. What is a rootkit? To clarify, a rootkit is ...

    mikemullins
    Published:  July 26, 2007, 7:27 AM PDT Modified:  July 26, 2007, 7:27 AM PDT Read More See more Security
  • Just say no to WEP
    Networking

    Just say no to WEP

    Whether you’re running a home wireless network or a corporate wireless network, you need to know the truth about Wired Equivalent Privacy (WEP). When WLAN hardware first came out, WEP was the standard encryption scheme offered to secure that wireless network. By design, WEP protects a wireless network from eavesdropping. However, it has significant and ...

    mikemullins
    Published:  July 18, 2007, 5:03 AM PDT Modified:  July 18, 2007, 5:03 AM PDT Read More See more Networking
  • Manage patch deployment with these five steps
    Security

    Manage patch deployment with these five steps

    While recently working on a network with roughly 10,000 hosts, I discovered two machines that had gone unpatched for 11 months. This might not seem like a big deal — .02 percent of machines that remained unpatched doesn’t sound too bad. But it only takes one unprotected machine to infect or disable an entire network. ...

    mikemullins
    Published:  July 12, 2007, 3:51 AM PDT Modified:  July 12, 2007, 3:51 AM PDT Read More See more Security
  • Prev
  • 1
  • 2
  • 3
  • 4
  • Next
33 results

TechRepublic Premium

  • TechRepublic Premium

    How to recruit and hire a Scrum Master

    Recruiting a Scrum Master with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit provides a customizable framework your business can use to find, recruit and ultimately hire the right person for the job. This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  August 5, 2022, 5:00 PM PDT Modified:  August 7, 2022, 4:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Web 3.0 quick glossary

    Knowing the terminology associated with Web 3.0 is going to be vital to every IT administrator, developer, network engineer, manager and decision maker in business. This quick glossary will introduce and explain concepts and terms vital to understanding Web 3.0 and the technology that drives and supports it.

    Downloads
    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 1:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire a User Experience Designer

    While the perfect color palette or the most sublime button shading or myriad of other design features play an important role in any product’s success, user interface design is not enough. Customer engagement and retention requires a strategic plan that attempts to measure, quantify and ultimately create a complete satisfying user experience on both an ...

    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 3:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice