Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
The Journey Is the Objective
PO-22947-Photocase-suze_photocase_com-Mekong_Delta_resized.png
If you run a web server and a mail server and anticipate that users from Asia are headed towards your dedicated server, it's time to get it ready for IPv6.
Cloudy Outlook
123RF_9978332_cloud-globe-box_illustrator_resized.png
Is your data really secure in the cloud? If a compromise occurs, current forensic approaches will not work and new techniques and standards will be needed.
Detention
123RF_5329325_computers-classroom_BenisArapovic_resized.png
Most clients on a network need both an address and some environmental information such as a name server or a web proxy. This article investigates whether a recent operating system on an IPv6-only LAN can handle this.
No Magic Needed
PO-20341-Fotolia-sTan_Fotolia-Balance_resized.png
Simple VPNs might not provide enough security alone; instead, try a carefully crafted mix of OpenVPN and Aladdin e-tokens.
Acceptable Risk
123RF_798535_fiber-optic-cable_AndrewBrown_c_resized.png
ReconTime
123RF_5100651_Recon_WojciechKaczkowski_resized.png
Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network's security. We'll show you some tools intruders use to gather information.
Made to Measure
123RF_4233536_Pulse-Monitor_spectral_4_resized.png
We look at two tools for Windows network monitoring – PRTG Network Monitor and NetCrunch – that allow you to monitor servers at work or on the road.
Rendezvous
123RF_4707600_business-people_YuriArcurs_resized.png
Any implementation of the standard-based IPsec is supposed to work with any other implementation – but sometimes you need a little extra effort. This article tests some IPsec implementations to see how well they fit.
Players
123RF_5396782_Game-Pieces_jirkaejc_resized.png
We take an in-depth look at three important scripting players: grep, awk, and sed.
News
« Previous
Next »
1
...
437
438
439
440
441
442
443
444
445
446
447
448
449
450
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.