Last Updated on 2 Dec. 2014, Total: 240 Articles and Tutorials
This topic provides an overview of the elements and issues involved in Networking and the basics needed before setting up any type of network.
The different types of network connections, basic networking terminology, network hardware, and network setups are all discussed in this section.
In this article, we will discuss what every Microsoft Windows Administrator and Engineer should think about when trying to manage their environments in the scope of planning for Disaster Recovery and Business Continuity. In this article we will cover many of the details administrators and engineers need to know about planning Disaster Recovery (DRP) for Windows Systems, as well as... Read More
For several years now, there have been rumors that 64-bit computing would soon become mainstream. We may have finally reached that point, but there are some problems. The market is filled with competing 64-bit standards, each requiring their own special version of Windows. In this article, I will explain what you need to know about the various 64-bit systems that... Read More
As companies rely on applications like electronic mail and database management for core business operations, computer networking becomes increasingly more important. This tutorial helps to explain Ethernet and Fast Ethernet, which are two of the most popular technologies used in networking... Read More
If you are planning to use a Linux workstation in a Windows Network, one of the things you probably want to do is authenticate against the Windows Domain name server (s), i.e. Active Directory... Read More
Unauthorized software such as computer games decreases productivity, robs your network of resources, and jeopardizes your network’s security. However, you can preserve your network’s integrity by using software restriction policies to control what software users are and are not allowed to run... Read More
Microsoft’s soon to be released Virtual Server 2005 helps cut hardware cost by allowing you to simultaneously run multiple virtual machines on a single server. Before you consider deploying Virtual Server 2005 though, you need to understand the various caveats and implications associated with virtual machines... Read More
To ensure that systems are available for requests when called upon, you have to plan for the failure of those same resources that are being requested. Hard drives have MTBF (mean time between failure), viruses go undetected, name it… disaster can happen. The only way to keep systems ‘available’ to those who request them is to deploy those systems in... Read More
Small businesses are getting into the remote access market. No, I don’t mean that small businesses are becoming ISPs. What I do mean is that small businesses want to be able to access information stored on machines located on their small business network no matter where they go, in the same way big businesses do it... Read More
In this article, we’ll take a look at some of the factors you should consider when buying a firewall, features available on some of the most popular offerings, and how to compare the real cost of each (hint: the initial purchase price is only a starting point)... Read More