Network Administration
Microsoft Eschews Patch, Gives Exploit Code for IIS 5.0 Bug
Saying that an Internet Information Server exploit is due to a feature, not a flaw, Microsoft has published exploit code for the flaw but no workaround or patch....
Active Directory: Questions and Answers
What is the difference between Windows 2000 Active Directory and Windows 2003 Active Directory? Is there any difference in 2000 Group Polices and 2003 Group Polices? What is meant by ADS and ADS services in Windows 2003? Windows 2003 Active Directory introduced a number of new security features, as well...
Four steps to secured VoIP
Securing Voice over IP (VoIP) doesn't have to be a challenge for small and medium-sized businesses (SMBs). VoIP is basically a phone call over the Internet. It offers the same promises - and pitfalls - as the Internet. The promises are cheap and easy communication over a readily available and...
Define server roles, counterattack zero-day threats
Zero-day exploits are an unsettling issue for any administrator who is concerned with security. A zero-day exploit is an exploit against a previously undiscovered and undocumented vulnerability. The problem with zero-day exploits is that you are trying to protect the system against security holes that may or may not even...
Harden your network services and contain zero-day threats
We all dread the thought of zero-day threats; they arrive and you have no vaccine for them. These exploits are all too common in recent months and years. Fortunately, there are some common sense steps you can take to harden your network layer against these threats....
Eliminate zero-day threats with virtual server technology
One solution when fighting zero-day attacks is to take advantage of virtual server technology. If you have several server roles that require a minimal amount of system resources, you could consolidate those roles onto a single physical server that is hosting multiple virtual servers. Doing so provides better security than...
Permitting Ping: ICMP Exceptions
When Windows Firewall first appeared in XP SP2, I started getting odd questions on email. They all went something like, "Hey, something's weird on my system now that I'm running SP2. I've got two computers, A and B. A can ping B, but B can't ping A. What's going on?"...
Eight daily steps to a more secure network
While many companies have a 9-to-5 security staff, hackers don't punch a clock. However, your network can still remain secure in the 16 hours in-between - you just need to focus activities to provide maximum coverage for the network....
What you need to know about OSPF
As I mentioned in the "What you need to know about EIGRP" article, EIGRP and Open Shortest Path First (OSPF) are the two most popular routing protocols for today's midsize and large companies—both offer a huge breadth of features that can cover just about any routing scenario such companies would...
What you need to know about EIGRP
When it comes to internal routing protocols, the two most popular in use today at midsize and large companies are Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF). Both of these routing protocols offer a huge breadth of features that can cover just about any routing...
More Articles in Network Administration
- Network Load Balancing: Economical means to scalability, fault tolerance
- Using the new DFS in Windows Server 2003 R2
- Active Directory scripting secrets: When GUI just isn't enough
- Extracting Active Directory info quick and easy with LDIFDE
- Taking out the Active Directory trash
- Document your network with help from the OSI model
- Network documentation outline
- Monitoring Active Directory performance
- Reorganizing Active Directory
- Modifying Active Directory's schema