240 Results for:udp
- Sort by:
WAN/WAFS platform specifications
18 Jan 2007Product snapshots highlighting key specifications for a cross section of WAFS and WAN optimisation products intended for small, medium, and large organisations. Read More
Tech innovation leads the 'slow demise of traditional broadcast'
23 Sep 2015The broadcast sector is being revolutionised by internet technology, as delegates to the annual IBC show in Amsterdam found out Read More
Subpar security compromises compliance
07 Aug 2007Pressure to keep trading applications available has nudged security to the back of the development line. Read More
Serious flaw affects BIND Internet server software
25 Jul 2007BIND DNS software, used in translating domain names into IP addresses for Internet traffic, has a flaw that could trick users into visiting a malicious Web site. Read More
Guide to Internet Protocol
18 Oct 2004In networking and communications, a protocol is the formal specification that defines the procedures that must be followed when transmitting or receiving data. Protocols define the format, timing, sequence, and ... Read More
Using Sysinternals tools in security management scenarios
18 Feb 2009Discover three valuable Sysinternals tools and common Windows security management scenarios in which these tools would be used. Read More
Hardening your router in 9 easy steps
23 Aug 2005For most enterprise LANs, the router has become one of the most critical security appliances in use. Configured properly, it can keep all but the most determined bad guys out, and if you want, it can even keep the ... Read More
Ethical hacking tools and techniques: Information gathering
15 Apr 2007This portion of a tip on network penetration testing and ethical hacking tools and techniques discusses information gathering for security consultants and value-added resellers (VARs). Read More
Developing good troubleshooting technique -- from 'Network troubleshooting and diagnostics'
01 Oct 2007The most important part of troubleshooting is technique. This excerpt examines several approaches such as Bottom-Up, Top-Down, and Divide-and-Conquer methods Read More
Should you use a voice VLAN
11 Dec 2002Advantages and disadvantages of using a voice VLAN. Read More