• OSI: Securing the Stack, Layer 5 -- session hijacking

    To help secure your systems against session hijacking, this tip walks you through the steps hackers use to hijack active sessions and take over your network. You'll also learn how to detect and prevent session hijacking attacks, a major security ...  Continue Reading

  • Making sense of Windows routing tables

    When routing packets across a network, things do occasionally go wrong. In these situations, it is helpful to be familiar with the Windows routing tables. Routing tables dictate the flow of packets from the machine in question. This tip will show ...  Continue Reading

  • Network security checklist

    While 100% security is hardly a possibility, there are several things that you can do to make your network more secure. Learn about them with this network security checklist.  Continue Reading

  • VRFs and routing

    Doug Downer continues his series about VPN routing and forwarding instances focused on the task of configuring and verifying a VRF scenario with a requirement for separate customers on a shared device. In this tip, he shows how to configure a method...  Continue Reading

  • Router numbers

    Many of the routing protocols implemented in Cisco's IOS require a number to follow the command that enables the routing protocol in question. If you're new to routing, these numbers can be a little confusing, as they mean something different to ...  Continue Reading