240 Results for:udp
- Sort by:
Cisco patches IOS in major rollout, releases 10 security advisories
04 Oct 201119 bugs and 10 security advisories released to address flaws in Cisco’s IOS network OS, Unified Communication Manager and Series 10000 routers. Read More
NAS product specifications
17 Feb 2008NAS is so easy to install and manage that NAS sprawl is a common problem. This is why NAS is often a prime candidate for consolidation initiatives. Learn how to purchase NAS appliances with an eye toward NAS ... Read More
How to use a netstat command in Windows to watch open ports
09 Sep 2009Mike Cobb shows how a simple command line tool can provide invaluable information about what's happening on your system Read More
Flaws reported in Trend Micro ServerProtect
14 Dec 2005Storage and security managers should be wary of vulnerabilities in the AV product that could enable a denial-of-service and malicious code execution. Workarounds are available. Read More
Can a TCP connection be made without an open port?
19 Feb 2007A company may claim it has an "application" that allows computers to communicate without opening any ports, but network security expert Mike Chapple reveals whether you should believe the hype or not. Read more in ... Read More
What you need to know about improving iSCSI performance
29 Nov 2012Storage expert Dennis Martin discusses how technologies like Data Center Bridging, CHAP, IPsec and iSCSI offload adapters affect iSCSI performance. Read More
What is the ISAKMP policy and how does it impact IPsec VPN router configuration?
30 Sep 2008Learn how to implement ISAKMP policies using IKE to ensure secure VPN configuration, in part three of our VPN guide. Read More
Troubleshooting remote scripting using Network Monitor 3.0 -- Managing Windows networks using script
27 Feb 2008Learn how to use Network Monitor 3.0 for troubleshooting a remote scripting error in this tip originally published on WindowsNetworking.com. Read More
Ten hacker tricks to exploit SQL Server systems
17 Jan 2008SQL Server hackers have a medley of tricks and tools to gain access to your database systems. Learn their techniques and test SQL Server security before they do. Read More