240 Results for:udp

  • Sort by: 

Applying regular expressions (regex) to Windows PowerShell

By Brandon Shell 04 Mar 2011

It may seem daunting at first, but the combination of regular expressions (regex) with PowerShell can be an admin’s best friend when it comes to certain complex tasks. Read More

Cut-through versus store-and-forward in Ethernet switch architecture

04 Dec 2012

Switches in the data center can push frames using either store-and-forward or cut-through. Is one Ethernet switch architecture better than the other? Read More

How to implement firewall policy management with a 5-tuple firewall

By Matthew Pascucci 30 Jan 2013

Matt Pascucci explains how to implement firewall policy management for 5-tuple firewalls when ports must be kept open for business reasons. Read More

Compare Grafana vs. Datadog for IT monitoring

By Walker Rowe 06 Mar 2020

Before committing to either Grafana or Datadog, understand how the two monitoring tools compare in terms of supported data sources, visualization features and more. Read More

IPSec and NAT incompatibility

26 Aug 2006

Learn why Authentication Header (AH) doesn't work with Network Address Translation (NAT) or Port Address Translation (PAT) and that Encapsulating Security Payload (ESP) is also incompatible with PAT. Read More

New SMB vulnerability identified in Windows XP and Server 2003

By Ron Condon 17 Feb 2011

A new SMB vulnerability discovered in Windows could open systems to DoS attacks and remote access. The vulnerability, tagged as CVE-2011-0654, has been rated "critical" and confirmed on Windows Server 2003 SP2 and ... Read More

VoIP bandwidth: Calculate consumption

By Gary Audin 26 Feb 2008

The bandwidth needed for VoIP depends on compression technology, packet overhead and the protocol used. Learn how to figure out what bandwidth you'll need. Read More

Cisco hardening guides for IOS, IOS-XR and NX-OS devices

17 Aug 2011

Patching routing and switching infrastructure in any organisation is often delayed, sometimes due to the potential impact on production systems and sometimes because the IT resources are simply too busy fighting ... Read More

Secure Cisco routers against IOS flaw attack

By David Davis 16 Aug 2007

Learn how to secure Cisco routers against the recently announced Cisco IOS flaw, which could be exploited by hackers. Find out how to determine which routers are affected and ways to protect yourself from this ... Read More