240 Results for:udp
- Sort by:
Applying regular expressions (regex) to Windows PowerShell
04 Mar 2011It may seem daunting at first, but the combination of regular expressions (regex) with PowerShell can be an admin’s best friend when it comes to certain complex tasks. Read More
Cut-through versus store-and-forward in Ethernet switch architecture
04 Dec 2012Switches in the data center can push frames using either store-and-forward or cut-through. Is one Ethernet switch architecture better than the other? Read More
How to implement firewall policy management with a 5-tuple firewall
30 Jan 2013Matt Pascucci explains how to implement firewall policy management for 5-tuple firewalls when ports must be kept open for business reasons. Read More
Compare Grafana vs. Datadog for IT monitoring
06 Mar 2020Before committing to either Grafana or Datadog, understand how the two monitoring tools compare in terms of supported data sources, visualization features and more. Read More
IPSec and NAT incompatibility
26 Aug 2006Learn why Authentication Header (AH) doesn't work with Network Address Translation (NAT) or Port Address Translation (PAT) and that Encapsulating Security Payload (ESP) is also incompatible with PAT. Read More
New SMB vulnerability identified in Windows XP and Server 2003
17 Feb 2011A new SMB vulnerability discovered in Windows could open systems to DoS attacks and remote access. The vulnerability, tagged as CVE-2011-0654, has been rated "critical" and confirmed on Windows Server 2003 SP2 and ... Read More
VoIP bandwidth: Calculate consumption
26 Feb 2008The bandwidth needed for VoIP depends on compression technology, packet overhead and the protocol used. Learn how to figure out what bandwidth you'll need. Read More
Cisco hardening guides for IOS, IOS-XR and NX-OS devices
17 Aug 2011Patching routing and switching infrastructure in any organisation is often delayed, sometimes due to the potential impact on production systems and sometimes because the IT resources are simply too busy fighting ... Read More
Secure Cisco routers against IOS flaw attack
16 Aug 2007Learn how to secure Cisco routers against the recently announced Cisco IOS flaw, which could be exploited by hackers. Find out how to determine which routers are affected and ways to protect yourself from this ... Read More