=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management Oct. 29, 2003 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSOR: Speedy, Secure Remote PC Access http://searchNetworking.com/r/0,,20520,00.htm?track=NL-314&netsupport ___________________________________________________________________ IN THIS ISSUE | Table of Contents
1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Today's Featured Tip: Get a little backbone - Security policy and employee access - Extend your wireless networks 2. ESSENTIAL LINKS - Preaching the merits of protocol analysis - Will 2004 be the year of IM management? - Featured Topic: Crash Course - Firewalls ___________________________________________________________________ ********************>> Sponsored by NetSupport <<****************** FREE TRIAL - NetSupport Manager PC Remote Control Software Perform remote support and management on multiple systems simultaneously over a LAN, WAN and Internet with this powerful PC remote control software. NSM provides speedy, secure remote PC access, dynamic inventory, automated scripting, file transfer, system monitoring, help requests and more. Network Computing Editor's Choice Award winner. Click here: http://searchNetworking.com/r/0,,20520,00.htm?track=NL-314&netsupport =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP GET A LITTLE BACKBONE Barrie Sosinsky The recent emergence of Gigabit Ethernet, along with relating technologies such as iSCSI, provides an opportunity to upgrade even small workgroup or departmental sized networks significantly with new and enhanced capabilities. Many new computers such as the higher end Apple Macintoshes, motherboards from the major manufacturers, and others now come with Gigabit Ethernet included. You can also buy Gigabit Ethernet switches and hubs for relatively low cost. Combining these can help you create the equivalent of a local "backbone" in your network. Read the entire tip here: http://www.searchNetworking.com/tip/1,289483,sid7_gci933804,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SECURITY POLICY AND EMPLOYEE ACCESS | TechTarget In this piece, we'll discuss the importance of managing employee access to data as a matter of security policy. Research into this subject shows that data access policy ideally involves not only full-time employees, but should also cover part-timers, temp workers, contractors, customers, partners or anyone else who might occasionally have a legitimate need to access an organization's data. It's also interesting to find two basic forms of access policy: http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci932788,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Extend your wireless networks | Barrie Sosinsky So you got a wireless network, (access point, wireless NICs, etc.) and now you find out that not everyone can get onto the network, because the signal strengths just aren't great enough to get through the walls, up to the next floor, and so forth. So? Make the signals stronger. Here's how: http://www.searchNetworking.com/tip/1,289483,sid7_gci914718,00.html?track=NL-314 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= PREACHING THE MERITS OF PROTOCOL ANALYSIS | SearchNetworking.com Protocol analysis expert Laura Chappell, who will be speaking at next week's Networking Decisions conference, offers her thoughts on common network security mistakes, XML traffic monitoring and the merits of teaching "black hat" techniques. http://searchnetworking.techtarget.com/qna/0,289202,sid7_gci933675,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= WILL 2004 BE THE YEAR OF IM MANAGEMENT? | SearchNetworking.com Interoperability and enterprise management were the hot issues at last week's IM Planet conference. Many believe that 2004 will be the year enterprise IM management takes off. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci932873,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FEATURED TOPIC: CRASH COURSE - FIREWALLS | SearchNetworking.com Firewalls aren't as simple as they used to be. Use our Crash Course to learn the latest and make sure your firewall is right for your network. http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci933216,00.html?track=NL-314 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314 ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This newsletter is published by TechTarget, the most targeted IT media. http://www.techtarget.com?track=NL-314 Copyright 2003 TechTarget. All rights reserved. ____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Reply to this e-mail with REMOVE in the Subject line - OR - Go to unsubscribe: http://SearchTechTarget.com/u?cid=470944?track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.