Network+resources

Showing results 1 to 20 of 60

HE.NET Network Tools

This suite of networks tools implements most of the network diagnostics that you need as a Network Engineer or System Administrator....

3 days ago by Hurricane Electric

System Center 2012 heads for the cloud

In the beginning, Microsoft's system management suite, System Center, was all about managing network servers and other physical resources. Then along came virtualisation, so Virtual Machine Manager was added to handle virtual as well as physical systems.

January 25, 2012

McAfee VPN Client

McAfee VPN Client provides a secure remote connection to your company network. Strong encryption prevents eavesdropping and modification...

December 15, 2014 by McAfee

Super VPN Free Client

VPN is a private network system that uses the public internet to "tunnel" traffic secretly and securely from your PC/phone to a computer...

December 10, 2014 by Zegopeda

Sega Pass website hacked

Sega has warned that the Sega Pass network of sites, which includes its gaming forums and press resources websites, has been hacked.The gaming company revealed the hack on Friday by sending an email to registered members.

June 17, 2011 by

Quigley puts past through fine-tooth comb

National Broadband Network (NBN) CEO Mike Quigley has devoted NBN Co resources to conduct an extensive review of his time with global technology company Alcatel-Lucent during its multi-national bribery scandal, in the face of persistent questioning from the Coalition.

June 16, 2011

Microsoft: Be secure, mind your drives

Businesses need to establish guidelines governing the use of removable storage devices and shared network resources to better protect their corporate networks, a Microsoft executive has urged.

December 9, 2009 by

NBN Co hires HR director

The National Broadband Network Company has nabbed Qantas's former executive general manager of human resources, Kevin Brown.

September 8, 2009 by

IT Dojo: Three tools that network administrators can't live without

Network administrators are always looking for tools that can save them time and help them optimize and secure their networks. I'm sure most, if not all, of you have your own list of favorite tools. In this IT Dojo video, Bill Detwiler talks about the following three net admin tools that our TechRepublic authors and members say they can't live without:1. PuTTY2. Wireshark3. NessusOnce you’ve watched this IT Dojo video, you can find a link to the original TechRepublic article, print the tip, and get links to additional Linux and open source resources from our IT Dojo Blog.

August 8, 2008 by

IT Dojo: How to spoof a MAC address

When you support small offices, home offices, and remote offices, you often run across older wireless equipment. Equipment that's likely secured with MAC filtering and perhaps a hidden SSID and WEP encryption.Most techs would agree that MAC filtering alone isn't going to secure a wireless network and that even WEP and a hidden SSID aren't much better. But does MAC filtering at least keep out the lazy hackers? In this IT Dojo video, Bill Detwiler shows you just how easy it is to spoof a MAC address.Once you've watched this IT Dojo video, you can find a link to the original TechRepublic article, print the tip, and get links to additional remote support and administration resources from our IT Dojo Blog.

July 14, 2008 by

How to detect network vulnerabilities?

Computer scientists at George Mason University (GMU) have developed a new software to identify complex cyber network attacks. This software is named CAULDRON (short for 'Combinatorial Analysis Utilizing Logical Dependencies Residing on Networks'). The developers claim that CAULDRON 'can reduce the impact of cyber attacks by identifying the possible vulnerability paths through an organization's networks.' Their research was funded by grants from the defense, homeland security and intelligence communities and the Federal Aviation Administration (FAA). The FAA has already installed CAULDRON in its Cyber Security Incident Response Center to prioritize security problems. According to the developers, this software can be used 'in almost any industry or organization with a network and resources they want to keep protected.' But read more...

March 18, 2008 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories