Windows Networking

Last Updated on 26 Jan. 2006, Total: 7 Articles and Tutorials

  1. TCP and IP Options

    Going back over the basics is always a good idea. One of the most fundamental pieces of knowledge in regards to computer communications are the four core protocols; IP, TCP, UDP, and ICMP. What we shall do over the course of this article is cover the options for both TCP and IP to see what, if any, security implications they... Read More

  2. Switching Technologies

    With the advent of faster computer networks and a far more stable infrastructure has come the need for a quicker way to “switch” this information around. Two of the best known methods for doing so are ATM and Frame Relay. Within the confines of this article we will discuss just what they are and where they fit in... Read More

  3. HTTP Tunnels

    The computer security world has come a long way over the past decade or so. There are all kinds of programs to mitigate external threats and the ever present spectre of viruses. What about those programs that are initiated from the trusted internal network though? Read on to learn more about the threat of HTTP tunnels... Read More

  4. Studying Network Activity Using the Chaosreader Tool

    I have written quite a bit about investigating network activity at the packet level. This practice can yield some key information about your network. Another tool that can help you discern network activity is a program called Chaosreader. Read on to find out more about this outstanding tool, and its ability to help you... Read More

  5. NAT Traversal (NAT-T) Security Issues

    In this article, we’ll look at how NAT-T (Network Address Translation-Traversal) works and what the security issues are, help you decide whether to take the risk, and show you how to restore XP’s ability to connect to servers behind a NAT if you choose to do so... Read More

  6. The Microsoft’s .NET strategy

    “The influence of the Internet is already enormous, but with the rate of innovations which will be introduced in the next five years, it will increase further. Our aim is to move from the present world of autonomous web sites to an Internet of exchangeable components, where tools and services could be united in aggregates. This would secure compact usage... Read More

  7. Creating a Poor Man’s DMZ Part 1 - Using TCP/IP Security

    A common issue that pops up on the web boards is how to configure a DMZ segment on a trihomed ISA Server. Setting up a trihomed ISA Server with a directly attached segment acting as a DMZ is fairly simple... Read More

Featured Links