Skip to main content

Home/ Groups/ IT Industry Articles & Resources
1More

Cisco Blog » Blog Archive » Securing IPv6 - 0 views

  •  
    In the previous installment of our series of IPv6 security posts, we covered some of the ways addressing has changed in IPv6 compared to IPv4. In this post, we'll talk about some of the things to consider when securing IPv6 compared to IPv4. Before digging into this topic, however, it is important to remember that while IPv6 may have different security concerns than IPv4, it is not necessarily any more secure than IPv4. Furthermore, the post will focus on those aspects that are different or unique to IPv6, since many of the common best practices for IPv4 networks also apply to IPv6 networks.
1More

Building Your Own Router with a NetFPGA - 0 views

  •  
    Project being run out of Stanford University: NetFPGA, a Field-Programmable Gate Array (FPGA) geared toward network device development. As in, building your own hardware IP router and/or Ethernet switch. It's essentially a mini-computer with four GigE interfaces that can be installed as a PCI card.
1More

Insert MP3 Files In PowerPoint Presentations Using MP3 AddIn - 0 views

  •  
    Didn't actually know this was a problem, but I'm sure it'll be one a encounter soon.
1More

Unlocker Deletes Locked Files, Now Works for 64-bit Windows - 0 views

  •  
    Windows only: Freeware system utility Unlocker deletes, moves, or copies locked files that you normally can't access, and the latest version finally adds much-needed support for 64-bit Windows.
1More

All Systems Down - An Epic IT failure - 0 views

  •  
    A blow-by-blow record of one of the worst health-care IT crises in history and what CareGroup CIO John Halamka learned from it. What can happen if an old network is asked to carry new applications How standard disaster recovery protocols can fail Lessons learned from the four-day crisis
1More

Troubleshooting Commands for IOS Devices - 0 views

  •  
    A wiki page dedicated to explaining Troubleshooting Commands for IOS Devices in practical terms. The intent is to compile commands relevant to troubleshooting the behavior of a Cisco IOS device itself (CPU, memory, performance, etc.) and to provide an accompanying description of each.
1More

Bios Beep Codes Viewer - 0 views

  •  
    Part of a computer's boot process is the Power On Self Test (POST) that tests the hardware of the computer. POST communicates successful or failed tests with beep codes. These BIOS beep codes provide the user with information about the system's state and aid in the troubleshooting process in case one of the boot tests failed.
1More

Downloading Youtube Videos for Use In the Classroom - 0 views

  •  
    Just a couple of apps for downloading youtube video.
2More

Google Wave Will Revolutionize Online Classroom Instruction « So You Want To ... - 0 views

  •  
    Can't wait to play around with it.
  •  
    Can't wait to play around with it.
1More

Windows 7: The 10 Things to Do First for Windows 7 - 0 views

  •  
    This is more in the context of managing Win7 workstations on an enterprise network.
1More

WPBeginner - Beginner's Guide for WordPress - 0 views

  •  
    WPBeginner offers a collection of tips, tools, and resources for WordPress. Articles at WPBeginner include WordPress themes, WordPress plugins, WordPress hacks, and other tips.
1More

Cisco IOS Hints and Tricks: EIGRP myths debunked - 0 views

  •  
    Matthew Norwood performed a really thorough EIGRP research and unearthed a lot of myths around it, some of them coming from official documentation, Cisco Press books (hopefully not mine) and other sources. It's time to debunk a few of them (read the comments to Matthew's post to find the sources of the following "wisdoms").
1More

Route Preference - 0 views

  •  
    Some rules on route selection
1More

Media Monitoring Configuration Guide, Cisco IOS Release 15.1M&T - Configuring... - 0 views

  •  
    Configuring IOS Performance Monitoring
1More

Open Source Digital Forensics - 0 views

  •  
    The Open Source Digital Forensics site is a reference for the use of open source software in digital investigations (a.k.a. digital forensics, computer forensics, incident response). Open source tools may have a legal benefit over closed source tools because they have a documented procedure and allow the investigator to verify that a tool does what it claims.
1More

Arduino Tutorials « t r o n i x s t u f f - 0 views

  •  
    Arduino is an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software. It's intended for artists, designers, hobbyists, and anyone interested in creating interactive objects or environments.
1More

PDF Rider - 0 views

  •  
    PDFRider is a GUI for "pdftk" and allows you to make some simple manipulations to PDF documents. It is written in c#/.net 3.5 (WPF), with the aim to be simple and user friendly.
1More

D&T team - Cisco CCNA Training Information - 0 views

  •  
    You will find many useful informations created with only one goal ... to help you prepare youreself for CCNA 640-802 exam.
1More

Routed or Switched Access Layer: Why not Both? - Packet Life - 0 views

  •  
    A major consideration when designing an enterprise network is whether traffic at the access layer will be switched or routed toward the distribution layer. Placing multilayer switches in the access layer yields significant advantages; chief among them is the ability to fully utilize all uplinks to the distribution layer (as loops are no longer broken by STP)
1More

Networking Technology Crosswords and Puzzles - 0 views

  •  
    Crossword puzzle for network engineering.
1 - 20 Next › Last »
Showing 20 items per page