On CHOW: 10 perfect grilled cheese sandwiches
 
Implementing Microsoft ForeFront Security for Exchange
You've seen the Microsoft ads saying how it's easier to defeat viruses using ForeFront than it is to kill zombies. Maybe. But just how hard is it to get ForeFront up and running? And what does it do? Brien Posey explains. Keeping viruses out of an...
Article, 2008-02-22
Tags: Message, Software, Antivirus Product, Screen, Anti-spam, Antivirus, Installation, Microsoft Exchange Server, Microsoft Corp., Virus, Exchange, Setup, Microsoft Antimalware Engine, Viruses And Worms, Cyberthreats, Security, Servers, Hardware, Brien M. Posey MCSE
Configuring Exchange 2007 to be an Edge Transport Server
One of the new server roles that was introduced in Exchange 2007 was that of an edge transport server. An edge transport server is a specialized server, running a hardened version of Exchange, that sits between your Exchange organization and the...
Article, 2008-02-21
Tags: Message, Microsoft Exchange Server 2007, Screen, Component, Microsoft Exchange Server, Problem, Exchange, Setup, Edge Synchronization, Figure H Setup, Servers, Hardware, Brien M. Posey MCSE, tag
Installing System Center Essentials 2007
For some time, Microsoft has focused on large enterprises and small business, as evidenced by products such as Small Business Server. The midmarket (500 PCs, a couple dozen servers) has very similar needs as smaller and larger enterprises, but faces...
Article, 2008-02-06
Tags: Microsoft Windows Server, Microsoft SQL Server, Installation, SQL, Microsoft Corp., Microsoft SQL Server 2005, Microsoft IIS Server, SCE 2007, Figure C Prerequisites, Microsoft Windows, Servers, Databases, Operating Systems, Software, Hardware, Enterprise Software, Data Management, Scott Lowe, tag
SolutionBase: Enterprise-ready Process Automation with Interleave
With Interleave, the Linux community has a tracking system as powerful as any Windows offering. And equally as simple to install. And reliable. And user-friendly. Jack Wallen shows how it works. When corporations get to a certain size...
Article, 2008-01-31
Tags: linux, Data Management, Enterprise Software, John Sheesley, Software, Hardware, Databases, Storage, Process Automation, Productivity, Repository, File, Tool, Interleave
SolutionBase: Administer PacketFence with ease via Web interface
PacketFence is fairly demanding to install, but once you get into the administration of the system via the Web-based administration tool, things become a whole lot easier. Jack Wallen guides you through installation of the tool. PacketFence is one...
Article, 2007-12-21
Tags: PacketFence, Administration, Network, Configuration Sub-tab, MAC, Networking, Jack Wallen, Problem, Solution, Web, Machine, Location, Executable, Information, Server, IP, Dashboard, IP Address, MAC Address
SolutionBase: Installing and configuring Network Access Control with PacketFence
PacketFence is the next big thing with network security and open source. Jack Wallen shows you how to run this installation completely by command line. PacketFence is the open source community's answer to NAC. Being a solid supporter of the open...
Article, 2007-12-20
Tags: Ubuntu, PacketFence, Server, Apache Software Foundation, Command, Installation, MySQL, Jack Wallen, Data Management, Software, Enterprise Software, Databases, Open Source, News, Network, Password
SolutionBase: Block unwanted network access with PacketFence
PacketFence does, via open source, what many applications costing hundreds to thousands of dollars do. Jack Wallen explains what makes this system a fully viable solution for a variety of situations. Recently, I spent a good amount of time...
Article, 2007-12-19
Tags: PacketFence, Author, Security, Networking, Jack Wallen, Option, Machine, Registration, Open Source, Network, Authentication
SolutionBase: Use PacketFence to stop unwanted network traffic
Looking for a system that blocks illegal downloads without breaking your IT budget? Jack Wallen introduces PacketFence, an open-source network access control (NAC) system. How many times have you administered a network only to find certain users...
Article, 2007-12-18
Tags: Databases, Hardware, PacketFence, LimeWire, Networking, Section, User, Storage, Data Management, Software, Jack Wallen, Command, Network, Enterprise Software, Database
SolutionBase: Take a NAP to secure your network
Searching for a way to prevent misconfigured clients from using your company's network resources? Scott Lowe assists you in your research by presenting three product options in the world of Network Access Proctection. The scenario: A sales person...
Article, 2007-12-17
Tags: Packet Fence, Networking, Cisco NAC Appliance, Scott Lowe, Network Access Protection, Author, Open Source, Solution, Network, NAP
SolutionBase: Cisco's NAC hardware explained
If you're considering using Cisco Network Admission Control to enforce the security policy of your company, it's helpful to know the pieces of the solution. David Davis explains Cisco's NAC hardware. Cisco Network Admission Control (NAC) is a...
Article, 2007-12-13
Tags: Cisco NAC, David Davis, ACS Server, ACS, Cisco NAC Solution, Hardware, Cisco Systems Inc., Network, Solution, Security
SolutionBase: Does the Cisco Self-Defending Network really work?
The need for security is more important than ever in the business world. It's tough to decide how much to invest and what solutions to choose, but you must ensure that your network is reasonably secure. David Davis explains why the Cisco...
Article, 2007-12-12
Tags: Networking, Network Admission Control, Figure B, CSDN, Security, Theory, Network, Cisco Systems Inc., Cisco Self-Defending Network, David Davis
SolutionBase: Learn how NAC improves network security
A NAC solution can help you become more efficient by keeping end-user devices compliant, supplying a safe, easy way for guests to have access to your network, and giving you an audit trail of user access in your network. David Davis explains how NAC...
Article, 2007-12-11
Tags: Security, NAC, Networking, David Davis, Network Admission Control Solution, Efficiency, Network Admission Control, Network Security, Solution, Network
SolutionBase: Discover open source alternatives for NAC on your network
Are commercial NAC products not in your budget? David Davis explains why you should consider open source NAC solutions. Network Access Control (NAC) is a buzzword in networking today, although the products are still in their early stages. Large...
Article, 2007-12-10
Tags: Zero Effort NAC, Open Source, Networking, David Davis, Network Access Control, Open Source Network Access Control, StillSecure, Product, Client, Commercial Version, NAC, Network
SolutionBase: Five steps to implementing Cisco NAC on your network
NAC can be a large and complex project, no matter whose product you're implementing. Don't fall into the trap of buying something just because it's hyped: take the questions asked in this article and use them to ensure that your NAC implementation...
Article, 2007-12-06
Tags: Cisco NAC, Network, Implementation, David Davis, Cisco Systems Inc., Network Admission Control, Networking
SolutionBase: Understanding the critical role of Cisco's Access Control Server in Cisco NAC
The Cisco ACS server is a vital part of Cisco's NAC solution. Besides being a Cisco NAC AAA server, Cisco ACS also performs AAA for wireless LAN devices, dial-up users, VPN users, and more. David Davis explains the role of the Cisco ACS server as...
Article, 2007-12-05
Tags: Server, David Davis, CNAC, Cisco NAC, Cisco Secure Access Control Server, Appliance Version, Authentication, Access Control, Cisco Systems Inc.
Installing System Center Essentials 2007
For some time, Microsoft has focused on large enterprises and small business, as evidenced by products such as Small Business Server. The midmarket (500 PCs, a couple dozen servers) has very similar needs as smaller and larger enterprises, but faces...
Article, 2008-02-06
Tags: Data Management, Databases, Enterprise Software, Figure C Prerequisites, Hardware, Installation, Microsoft Corp., Microsoft IIS Server, Microsoft SQL Server, Microsoft SQL Server 2005, Microsoft Windows, Microsoft Windows Server, Operating Systems, SCE 2007, Scott Lowe, Servers, Software, SQL, tag
Configuring Exchange 2007 to be an Edge Transport Server
One of the new server roles that was introduced in Exchange 2007 was that of an edge transport server. An edge transport server is a specialized server, running a hardened version of Exchange, that sits between your Exchange organization and the...
Article, 2008-02-21
Tags: Brien M. Posey MCSE, Component, Edge Synchronization, Exchange, Figure H Setup, Hardware, Message, Microsoft Exchange Server, Microsoft Exchange Server 2007, Problem, Screen, Servers, Setup, tag
Implementing Microsoft ForeFront Security for Exchange
You've seen the Microsoft ads saying how it's easier to defeat viruses using ForeFront than it is to kill zombies. Maybe. But just how hard is it to get ForeFront up and running? And what does it do? Brien Posey explains. Keeping viruses out of an...
Article, 2008-02-22
Tags: Anti-spam, Antivirus, Antivirus Product, Brien M. Posey MCSE, Cyberthreats, Exchange, Hardware, Installation, Message, Microsoft Antimalware Engine, Microsoft Corp., Microsoft Exchange Server, Screen, Security, Servers, Setup, Software, Virus, Viruses And Worms
Anonymous User
Job Role:
Member Since:
Already a Member? Log in
Loading....

TechRepublic Featured Jobs

Job Title/Location Posted
  • Powered by: Simply Hired
  • .

Article Categories

Security
Security Solutions, IT Locksmith
Networking and Communications
E-mail Administration NetNote, Cisco Routers and Switches
CIO and IT Management
Project Management, CIO Issues, Strategies that Scale
Desktops, Laptops & OS
Windows 2000 Professional, Microsoft Word, Microsoft Excel, Microsoft Access, Windows XP,
Data Management
Oracle, SQL Server
Servers
Windows NT, Linux NetNote, Windows Server 2003
Career Development
Geek Trivia
Software/Web Development
Web Development Zone, Visual Basic, .NET


Quick Guide: 802.11g Wireless Networking
This Quick Guide examines critical technical and management details to review before a deployment and presents important information on transmission, ...
Buy Now
Wireless Communications Policy
Wireless networks are becoming more and more popular. They're also an easy way for hackers and competitors to hack your network if improperly configur ...
Buy Now
advertisement
Click Here