240 Results for:udp

  • Sort by: 

6 steps to troubleshoot remote printing via VPN

By Brien Posey 25 May 2021

While each organization's printing infrastructure is different, IT administrators should follow these six general steps to determine the cause of remote printing issues over a VPN. Read More

How does Citrix traffic cross the wire(less)? An overview of Citrix networking technologies.

By Jo Harder 01 Feb 2017

Jo Harder takes us on a tour of ICA, Session Reliability, HDX, Framehawk, and Enlightened Data Transport. Read More

5 steps to troubleshoot a virtual machine problem in Azure

By Glen Kemp 11 Feb 2019

If you're wrestling with a virtual machine problem, like a faulty connection issue, be sure to check the domain name system and network traffic routing. Read More

How to check for high network utilization

By Terry Slattery 30 Jul 2018

Learn why high utilization issues in the network arise, how to detect them, and two ways to grapple with the problem to keep network latency low and application performance high. Read More

How should enterprise firewall settings be reviewed?

By Judith Myerson 11 Jan 2018

Getting firewall settings right is one of the most basic ways to protect enterprise data from accidental exposures. Expert Judith Myerson discusses how to review firewall policies. Read More

What are top SMB backup services and platforms?

By Paul Kirvan 17 May 2019

Many on-site and cloud-based services are available for small to medium-sized business backup. Pay particular attention to the deciding factors for cloud SMB backups. Read More

How are Windows shortcut files vulnerable to attacks?

By Judith Myerson 10 Oct 2017

A Windows vulnerability targets shortcut files and enables hackers to automatically execute code. Expert Judith Myerson explains the flaw and how to stop it. Read More

Implement API rate limiting to reduce attack surfaces

By Kyle Johnson, Manning Publications Co. 28 Feb 2022

Rate limiting can help developers prevent APIs from being overwhelmed with requests, thus preventing denial-of-service attacks. Learn how to implement rate limiting here. Read More

Guide to identifying and preventing OSI model security risks: Layers 4 to 7

By Daniel Allen 24 Oct 2018

Each layer of the Open Systems Interconnection presents unique vulnerabilities that could move to other layers if not properly monitored. Here's how to establish risk mitigation strategies for OSI layer security ... Read More

Essential desktop troubleshooting tools for every IT pro

By John Powers 25 Sep 2018

Remote access tools, help desk systems and others are essential to managing end users. Without these tools, IT would have a much tougher time with even the simplest tasks. Read More