=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management Oct. 8, 2003 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSOR: Speedy, Secure Remote PC Access http://searchNetworking.com/r/0,,19510,00.htm?track=NL-314&netsupport ___________________________________________________________________ IN THIS ISSUE | Table of Contents
1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Today's Featured Tip: What's new? Get a general network audit - The dirt on Microsoft security - Build your network utilization history 2. ESSENTIAL LINKS - Article: Maturity makes Linux a sure bet for the enterprise - Size matters: Using jumbo packets on Gigabit Ethernet - Featured Topic: WLAN security advice ___________________________________________________________________ ********************>> Sponsored by NetSupport <<****************** FREE TRIAL - NetSupport Manager PC Remote Control Software Perform remote support and management on multiple systems simultaneously over a LAN, WAN and Internet with this powerful PC remote control software. NSM provides speedy, secure remote PC access, dynamic inventory, automated scripting, file transfer, system monitoring, help requests and more. Network Computing Editor's Choice Award winner. Click Here http://searchNetworking.com/r/0,,19510,00.htm?track=NL-314&netsupport =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP WHAT'S NEW? GET A GENERAL NETWORK AUDIT Barrie Sosinsky You should perform a network audit every time your network changes in any substantial way. But more than that, you should conduct one at regular intervals, and even when a network administrator is new to a network or group. A general audit doesn't have to be a full-dress exercise. You can do them in an informal way, building a chart in an Excel spreadsheet; or collecting the data and entering it into a database. Read the entire tip here: http://www.searchNetworking.com/tip/1,289483,sid7_gci930916,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= THE DIRT ON MICROSOFT SECURITY | The Lippis Report MICROSOFT AND SECURITY: A SLEEPING GIANT IS AWAKENED In the past, "Microsoft security" has been as much of an oxymoron as "jumbo shrimp," but that may be changing. Many dismissed the company's Trustworthy Computing initiative, and recent viruses and Windows vulnerabilities have called even more attention to Microsoft's security issues. But Microsoft is driving forward in earnest and promises to be a major player in the network and application security industry. This week's Lippis Report focuses on Microsoft's security push and how it can help make your core network more resistant to security threats and vulnerabilities. http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci918038,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= BUILD YOUR NETWORK UTILIZATION HISTORY | Barrie Sosinsky Creating a historical record of network utilization is an important tool for optimizing your applications, planning hardware and software upgrades, and setting a baseline for many other types of future projects. Network monitoring and performance logging should be part of your administrator's toolbox, but often, busy network admins don't put these tools in place until they are absolutely required to. Read more about utilization history here: http://www.searchNetworking.com/tip/1,289483,sid7_gci894880,00.html?track=NL-314 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ENTERPRISE MATURITY MAKES LINUX A SURE BET | SearchNetworking.com Thanks to better reliability and stability, Linux is now finding its way onto mission-critical database transaction servers, high-performance computing clusters and even desktops. http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci930606,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= USING JUMBO PACKETS ON GIGABIT ETHERNET | Apparent Network Gigabit Ethernet (GigE) has rapidly gained prominence and acceptance as the next step in the evolution of corporate networks. Relatively low-cost, high-speed, and interoperable with today's de facto standard, 100 Mbps Fast Ethernet, are just a few of GigE's promises. At the same time these manufacturers introduced changes to Gigabit Ethernet Maximum Transmission Unit (MTU). The 1500 byte standard MTU for 10 and 100 Mbps networks has been replaced with... no standard at all! Packets on Gigabit Ethernet can be any size that is supported by network manufacturers. This white paper written by Loki Jorgenson, Ph.D. explains network idiosyncrasies and degradations and discusses both the benefits and hidden perils of using jumbo packets on Gigabit Ethernet. Click here for direct access this white paper: http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci930507,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FEATURED TOPIC: WLAN SECURITY ADVICE | SearchNetworking.com While wireless LANs pose security challenges that shouldn't deter you from discovering their benefits. Site expert Lisa Phifer has her ear to the floor and shares her security knowledge and experience with our readers. This feature also covers the latest in WLAN news and tips and tricks to keep your WLAN and users secure. http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci930351,00.html?track=NL-314 =================================================================== To subscribe to "Voice Over IP Tips " go to: http://searchNetworking.techtarget.com/OptIn/1,290894,sid7,00.html?track=NL-314&cid=469625&em=&tid=180&FE=1 Not a SearchNetworking.com member? We'll activate your membership with your subscription. =================================================================== ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314 ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This newsletter is published by TechTarget, the most targeted IT media. http://www.techtarget.com?track=NL-314 Copyright 2003 TechTarget. All rights reserved. ____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Reply to this e-mail with REMOVE in the Subject line - OR - Go to unsubscribe: http://SearchTechTarget.com/u?cid=469625?track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.