240 Results for:udp
- Sort by:
6 steps to troubleshoot remote printing via VPN
25 May 2021While each organization's printing infrastructure is different, IT administrators should follow these six general steps to determine the cause of remote printing issues over a VPN. Read More
How does Citrix traffic cross the wire(less)? An overview of Citrix networking technologies.
01 Feb 2017Jo Harder takes us on a tour of ICA, Session Reliability, HDX, Framehawk, and Enlightened Data Transport. Read More
5 steps to troubleshoot a virtual machine problem in Azure
11 Feb 2019If you're wrestling with a virtual machine problem, like a faulty connection issue, be sure to check the domain name system and network traffic routing. Read More
How to check for high network utilization
30 Jul 2018Learn why high utilization issues in the network arise, how to detect them, and two ways to grapple with the problem to keep network latency low and application performance high. Read More
How should enterprise firewall settings be reviewed?
11 Jan 2018Getting firewall settings right is one of the most basic ways to protect enterprise data from accidental exposures. Expert Judith Myerson discusses how to review firewall policies. Read More
What are top SMB backup services and platforms?
17 May 2019Many on-site and cloud-based services are available for small to medium-sized business backup. Pay particular attention to the deciding factors for cloud SMB backups. Read More
How are Windows shortcut files vulnerable to attacks?
10 Oct 2017A Windows vulnerability targets shortcut files and enables hackers to automatically execute code. Expert Judith Myerson explains the flaw and how to stop it. Read More
Implement API rate limiting to reduce attack surfaces
28 Feb 2022Rate limiting can help developers prevent APIs from being overwhelmed with requests, thus preventing denial-of-service attacks. Learn how to implement rate limiting here. Read More
Guide to identifying and preventing OSI model security risks: Layers 4 to 7
24 Oct 2018Each layer of the Open Systems Interconnection presents unique vulnerabilities that could move to other layers if not properly monitored. Here's how to establish risk mitigation strategies for OSI layer security ... Read More
Essential desktop troubleshooting tools for every IT pro
25 Sep 2018Remote access tools, help desk systems and others are essential to managing end users. Without these tools, IT would have a much tougher time with even the simplest tasks. Read More