Over the last few years, VPNs have gone from relative obscurity to great popularity. Even so, you don’t want to throw together a VPN haphazardly. After all, a VPN is a direct portal into your private network, and it is essential that it be secure. If your VPN isn’t secure, then nothing else on your network will be secure either. In this article, I will help you to plan your corporate VPN. In doing so, I will discuss the various components that make up a VPN and some of the decisions that you will have to make regarding those components.
Who amongst us doesn’t like getting email? We all do of course! It is just like looking in the mailbox every morning after the postman comes by. How does email work though, and just what makes it arrive to our inbox? This will all be explained in this article giving you a far better understanding of how email works.
If your IIS Server hosts multiple Web sites, then buggy code within any one of those sites can bring down the other sites. I should know; it happened to me. Fortunately, there is something that you can do to prevent this from happening. In this article, I will show you how you can use application pools to prevent problems with a Web site from causing stability problems across your IIS server.
In part one of this article series, we covered the HTTP traffic metrics that come from a web browser client. This second part will cover what the web server itself will send, and expand a little more on HTTP itself.
Tracert (also known as traceroute) is a Windows based tool that allows you to help test your network infrastructure. In this article we will look at how to use tracert while trying to troubleshoot real world problems. This will help to reinforce the tool's usefulness and show you ways in which to use it when working on your own networks.