240 Results for:udp

  • Sort by: 

WAN/WAFS platform specifications

18 Jan 2007

Product snapshots highlighting key specifications for a cross section of WAFS and WAN optimisation products intended for small, medium, and large organisations. Read More

Tech innovation leads the 'slow demise of traditional broadcast'

23 Sep 2015

The broadcast sector is being revolutionised by internet technology, as delegates to the annual IBC show in Amsterdam found out Read More

Subpar security compromises compliance

07 Aug 2007

Pressure to keep trading applications available has nudged security to the back of the development line. Read More

Serious flaw affects BIND Internet server software

By Dennis Fisher 25 Jul 2007

BIND DNS software, used in translating domain names into IP addresses for Internet traffic, has a flaw that could trick users into visiting a malicious Web site. Read More

Guide to Internet Protocol

18 Oct 2004

In networking and communications, a protocol is the formal specification that defines the procedures that must be followed when transmitting or receiving data. Protocols define the format, timing, sequence, and ... Read More

Using Sysinternals tools in security management scenarios

By Kevin Beaver 18 Feb 2009

Discover three valuable Sysinternals tools and common Windows security management scenarios in which these tools would be used. Read More

Hardening your router in 9 easy steps

23 Aug 2005

For most enterprise LANs, the router has become one of the most critical security appliances in use. Configured properly, it can keep all but the most determined bad guys out, and if you want, it can even keep the ... Read More

Ethical hacking tools and techniques: Information gathering

15 Apr 2007

This portion of a tip on network penetration testing and ethical hacking tools and techniques discusses information gathering for security consultants and value-added resellers (VARs). Read More

Developing good troubleshooting technique -- from 'Network troubleshooting and diagnostics'

01 Oct 2007

The most important part of troubleshooting is technique. This excerpt examines several approaches such as Bottom-Up, Top-Down, and Divide-and-Conquer methods Read More

Should you use a voice VLAN

11 Dec 2002

Advantages and disadvantages of using a voice VLAN. Read More