Wi-Fi technology has resulted in an explosion of connectivity, but this communication medium has some vulnerabilities. If proper precautions aren't taken, networks may...
When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity.
VoIP is well known for its cost effectiveness, but security should be considered before you embark on a VoIP implementation.
So just how safe is your data? Here we take a deeper look at the PKI technology designed to protect it.
There are still a few wrinkles to be ironed out, but IT professionals are excited about virtualization's boundless potential.
The automation, technical support and easy installation of a Microsoft platform make it seem like an easy choice over Linux distros for system administrators. But is the...
IPv6 infrastructure appears to be on the way, but the switch from IPv4 won't come without obstacles. Find out more here.
Learn about the Linux operating system and its value in a small - or medium-sized business's network architecture.
Find out why the distinction between voice and data services is quickly falling by the wayside.
Snort is a passive tool for network packet analysis and network forensics, but it isn't a security solution. Learn more about it here.
BackTrack Linux can reveal some very serious shortcomings within a given network. It can also reveal some viable methods to fix them.
Although the 802.11ac standard is still a few years away from implementation, the time to start thinking about whether to focus on Ethernet or go wireless is now.