As a younger person, I thought I knew everything — especially about what appeared to be simple technical topics. But as the old adage goes, the older I get, the less I understand. This month we will ...
Real easy. We're putting a 2008 R2 box right against the internet. On its NIC, I'm going through the firewall to make sure it's as tight as I can make it. What are these 15ish Core Networking rules?
The core advancement of the Internet was the capability to move information very quickly across a decentralized network of nodes. That advancement was predicated on the development of protocols like ...
Another day, another global malware attack made possible by a Microsoft security hole. Once again, attackers used hacking tools developed by the U.S. National Security Agency (NSA), which were stolen ...
The Linux Foundation today announced the first protocols that it wants to address as part of its open-source code testing and security review. Not surprisingly, OpenSSL, where the infamous Heartbleed ...
The purpose of this policy is to establish standards for management of network access and communications. This policy applies to all information technology systems that are connected to and use the ...
The Spanning Tree Protocol, sometimes just referred to as Spanning Tree, is the Waze or MapQuest of modern Ethernet networks, directing traffic along the most efficient route based on real-time ...