Search result for "firewall"

  1. Microsoft Windows Server vs Chevy Camaro

    This article discusses the changes being made in Microsoft Windows Server.

  2. Office 365 Migration Considerations (Part 3)

    The third and final article of a three-part series of articles describing various networking and planning considerations relating to Office 365 migration.

  3. Software Review: Network Server Monitor 5.5

    As Network Administrators, we are usually expected to keep our servers up and running without interruption for as long as we possibly can. Of course, no-one knows as well as we do just how temperamental those servers can be. To help you in your quest for high server availability, there are a number of utilities out there that will automatically ...

  4. Windows 7 Simple TCP/IP Services - What and How?

    What the Windows 7 Simple TCP/IP Services are and how they can help you.

  5. SCCM 2012 Client Deployment (Part 3)

    In this part, you will learn about the various methods by which the SCCM 2012 client can be deployed to the various machines in your organization.

  6. Introduction to the Simple Network Management Protocol (SNMP) Part 1

    In this two part article we will look at how to use SNMP, the Simple Network Management Protocol, and install the service on Windows Server 2003. We will cover the essentials of the SNMP protocol, how it is used and how to install it and configure it to work within a Community.

  7. Server Hardware Explained (Part 1)

    This article series is designed to teach beginners about server hardware. The first article in the series discusses the differences between PCs and servers and also talks about server form factors.

  8. Non Microsoft Internet Connection Sharing for ADSL

  9. Optimize VPN in Windows Server 2012 R2

    This month I’ll provide guidance for optimizing the protocol support and security for VPN in Windows Server 2012 R2.

  10. OSI Reference Model: Layer 7 Hardware

    A continuation in a series; this article will discus the seventh layer of the OSI Reference Model from a hardware perspective.

  11. Managing your network remotely with Cellular Routers

    How to use cellular Internet routers to manage your network remotely; how it is done and the technology used.

  12. What’s New in Windows Server 2012 Remote Access (Part 1)

    In this article, we begin our introduction to the new Remote Access Server Role in Windows Server 2012.

  13. IBM Launches New Data Security Software

    ARMONK, N.Y., - 13 Sep 2010: IBM (NYSE: IBM) today announced new software that helps businesses protect customer data and other sensitive information from security breaches. The new software automatically monitors structured data and application usage across the enterprise and immediately alerts management to unusual activity. Today, organizations are struggling to manage a variety of complex data security threats, from ...

  14. 3CX Proves That Soft Is Better Than Hard - When It Comes To Phone Systems

    PRESS RELEASE 3CX's software-based phone system frees businesses from proprietary hardware with an easy to install, manage and use SIP-based IP PBX London, UK - 05/12/07 – 3CX has announced the release of version 5 of 3CX Phone System for Windows; the newest version of their award-winning software-based VOIP PBX for Windows which helps businesses give employees mobility, rids them ...

  15. Configuring a Syslog Agent in Windows Server 2012

    This article takes a look at what you need to know about syslog and how to configure your Windows Servers to send syslog.

  16. Remote Desktop Services in Windows Server 2012/2012 R2 and Windows 8/8.1 (Part 1)

    In this article, we'll look at what's new in Remote Desktop Services in Windows Server 2012 and Windows 8/8.1 and how you can use the new features to improve administrative and user experience in your business environment.

  17. Troubleshooting Connectivity Problems on Windows Networks (Part 4)

    This article continues the series on troubleshooting connectivity problems on Windows based networks by taking a look at the problem of packet loss, and by showing you how to trace the route that a packet takes across the network.

  18. Windows Server 2016 Alive (Part 2)

    In this article we’ll wrap up the virtualization discussion and then talk about new networking and storage features, as well as what’s new in the all-important area of security.

  19. Containerization Proliferation: The Docker Effect (Part 3)

    Here in Part 3, we will take up the (sometimes touchy) subject of container security in general and Docker security in particular, what has been done and is being done to improve it, and third party security solutions that can make Docker and other containerization methods more secure.

  20. Getting to Know the Enterprise Mobility Suite (Part 3)

    In this Part 3 we'll look at how to deploy Microsoft Azure Rights Management.