An often overlooked part of IT network infrastructure management is network security. The majority of business networks, even for small businesses, have a large variety of heterogeneous devices that are working together to provide the services for the various...
network security
Network Storage – Getting the most from your filesystem
In my last blog entry, I mentioned that I would discuss how to roll your own network attached storage device. At first, this might sound trivial. Take any commodity PC hardware, throw a large disk in there, install linux, configure NFS, done. Not so fast, there are...
Security layers on a modern website
Last time, we looked at a basic website design. Now it’s time to start digging into the details around what’s really being used behind the scenes. This time, we’ll focus on security aspects. When a user starts their browser and connects...
Leveraging Group Policy to Setup Wireless Access
In my last post, I introduced Clonezilla as an easy way to deploy Windows-based workstations into a corporate environment. But once a workstation enters the corporate network, what sort of policy applies to it? What sort of actions can a user take on their...