=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
Oct. 8, 2003
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSOR:
Speedy, Secure Remote PC Access 
http://searchNetworking.com/r/0,,19510,00.htm?track=NL-314&netsupport
___________________________________________________________________
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Today's Featured Tip: What's new? Get a general network audit 
   - The dirt on Microsoft security  
   - Build your network utilization history

2. ESSENTIAL LINKS
   - Article: Maturity makes Linux a sure bet for the enterprise
   - Size matters: Using jumbo packets on Gigabit Ethernet
   - Featured Topic: WLAN security advice
___________________________________________________________________ 
********************>> Sponsored by NetSupport <<****************** 

FREE TRIAL - NetSupport Manager PC Remote Control Software

Perform remote support and management on multiple systems
simultaneously over a LAN, WAN and Internet with this powerful PC
remote control software. NSM provides speedy, secure remote PC
access, dynamic inventory, automated scripting, file transfer, system
monitoring, help requests and more. Network Computing Editor's Choice
Award winner. Click Here
http://searchNetworking.com/r/0,,19510,00.htm?track=NL-314&netsupport

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

WHAT'S NEW? GET A GENERAL NETWORK AUDIT 
Barrie Sosinsky
 
You should perform a network audit every time your network changes in
any substantial way. But more than that, you should conduct one at
regular intervals, and even when a network administrator is new to a
network or group. 
 
A general audit doesn't have to be a full-dress exercise. You can do
them in an informal way, building a chart in an Excel spreadsheet; or
collecting the data and entering it into a database.
 
Read the entire tip here: 
http://www.searchNetworking.com/tip/1,289483,sid7_gci930916,00.html?track=NL-314  
 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
THE DIRT ON MICROSOFT SECURITY | The Lippis Report

MICROSOFT AND SECURITY: A SLEEPING GIANT IS AWAKENED 
In the past, "Microsoft security" has been as much of an oxymoron as
"jumbo shrimp," but that may be changing. Many dismissed the
company's Trustworthy Computing initiative, and recent viruses and
Windows vulnerabilities have called even more attention to
Microsoft's security issues. But Microsoft is driving forward in
earnest and promises to be a major player in the network and
application security industry. 

This week's Lippis Report focuses on Microsoft's security push and
how it can help make your core network more resistant to security
threats and vulnerabilities. 
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci918038,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
BUILD YOUR NETWORK UTILIZATION HISTORY | Barrie Sosinsky

Creating a historical record of network utilization is an important
tool for optimizing your applications, planning hardware and software
upgrades, and setting a baseline for many other types of future
projects.  Network monitoring and performance logging should be part
of your administrator's toolbox, but often, busy network admins don't
put these tools in place until they are absolutely required to.
 
Read more about utilization history here:
http://www.searchNetworking.com/tip/1,289483,sid7_gci894880,00.html?track=NL-314

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
ENTERPRISE MATURITY MAKES LINUX A SURE BET | SearchNetworking.com

Thanks to better reliability and stability, Linux is now finding its
way onto mission-critical database transaction servers,
high-performance computing clusters and even desktops.
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci930606,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
USING JUMBO PACKETS ON GIGABIT ETHERNET  | Apparent Network

Gigabit Ethernet (GigE) has rapidly gained prominence and acceptance
as the next step in the evolution of corporate networks. Relatively
low-cost, high-speed, and interoperable with today's de facto
standard, 100 Mbps Fast Ethernet, are just a few of GigE's promises.
At the same time these manufacturers introduced changes to Gigabit
Ethernet Maximum Transmission Unit (MTU). The 1500 byte standard MTU
for 10 and 100 Mbps networks has been replaced with... no standard at
all! Packets on Gigabit Ethernet can be any size that is supported by
network manufacturers. 

This white paper written by Loki Jorgenson, Ph.D. explains network
idiosyncrasies and degradations and discusses both the benefits and
hidden perils of using jumbo packets on Gigabit Ethernet.

Click here for direct access this white paper:
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci930507,00.html?track=NL-314

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FEATURED TOPIC: WLAN SECURITY ADVICE | SearchNetworking.com

While wireless LANs pose security challenges that shouldn't deter you
from discovering their benefits. Site expert Lisa Phifer has her ear
to the floor and shares her security knowledge and experience with
our readers. This feature also covers the latest in WLAN news and
tips and tricks to keep your WLAN and users secure.
http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci930351,00.html?track=NL-314


===================================================================
To subscribe to "Voice Over IP Tips " go to:
http://searchNetworking.techtarget.com/OptIn/1,290894,sid7,00.html?track=NL-314&cid=469625&em=&tid=180&FE=1

Not a SearchNetworking.com member? We'll activate your membership
with your subscription.
===================================================================


___________________________________________________________________
****************  CONTACT SEARCHNETWORKING.COM   *****************

E-mail us at mailto:[EMAIL PROTECTED]

Click here for specific contact information and to meet our editorial
team:
http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media.  http://www.techtarget.com?track=NL-314

Copyright 2003 TechTarget. All rights reserved.
____________________________________________________________________

To unsubscribe from "Network and Systems Management Tip":

Reply to this e-mail with REMOVE in the Subject line
 - OR -
Go to unsubscribe:
http://SearchTechTarget.com/u?cid=469625?track=NL-314
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.


Reply via email to