240 Results for:udp
- Sort by:
Businesses need to equip staff with the tools to do the job
17 Mar 2015Workforces will become frustrated if they do not have the technology they need to deliver what their organisation wants Read More
Cisco SNMP flaw allows for DoS attacks
20 Apr 2004A coding flaw in Cisco's IOS software for certain routers and switches could leave networks vulnerable to denial-of-service attacks. Read More
VPN client alternatives: Layer 2 Tunneling Protocol (L2TP) over IPsec
31 Oct 2006This month, Lisa Phifer discusses a robust VPN client alternative: Layer 2 Tunneling Protocol (L2TP) over IPsec. Read More
High availability guidelines and VMware HA best practices
02 May 2011Elias Khnaser discusses VMware High Availability best practices in this chapter excerpt. After you read the excerpt, download the full backup and high availability chapter. Read More
How to test Snort
15 Aug 2007VARs should test Snort to ensure the open source IDS is detecting malicious activity. Read More
Hacking Windows: MSRPC vulnerabilities
06 Nov 2005In this excerpt from "Hacking Exposed, Fifth Edition: Network Security Secrets & Solutions," authors Stuart McClure, Joel Scambray and George Kurtz introduce MSRPC vulnerabilities and countermeasures. Read More
What OSI Layer 4 protocol does FTP use to guarantee data delivery?
11 Dec 2008What OSI Layer 4 protocol does FTP use to guarantee data delivery? Read More
NAS: How does a client access files?
19 Jul 2006NAS expert Randy Kerns offers advice to a reader who asked: "How does NAS appear to machines accessing files from it?" Read More
What are the network security risks of streaming video?
13 Sep 2007Streaming video and audio sites are frequently visited on both home computers and work computers. Learn about streaming video security risks and what to do to protect your client's network. Read More
Protocols, Lesson 3: The Internet Protocol header
16 Oct 2004This article gives you a straight-to-the-point lesson on the IP header. Read More