Thursday, August 23, 2007
http://networking.ITtoolbox.com
Your weekly connection to the new and most popular entries from the Networking community.
**** CONTENTS ****
Groups: VLANS ACLS and DHCP ip helper command (+9)
White Papers: Minimize data loss in a disaster (+4)
Blogs: Rex's First Case...OR how the utility belt really... (+9)
Wiki: System Administration (+5)
Jobs: Computer Operator Needed (+5)
Events: IT Roadmap 2007 (+3)
**** SPONSOR MESSAGE: MICROSOFT CORPORATION ****
NCsoft Chooses Windows Over Linux
STATE OF ILLINOIS VOTES FOR WINDOWS SERVER OVER LINUX. State Government Decided Linux Was Too Big a Risk. See For Yourself.
http://www.ITtoolbox.com/erd/15733
**** SPONSOR MESSAGE: CASTELLE ****
Five Strategies for Fax Improvement
Network administrators and IT teams deal with complex, time-consuming challenges every day. Faxing shouldn't be one of them. Learn More.
http://www.ITtoolbox.com/erd/15729
**** SPONSOR MESSAGE: DATALINK CORPORATION ****
Calculate ROI for a Tape Project
Discover 5 key steps to calculating ROI for a tape consolidation project, including areas such as hardware maintenance savings, off-site media savings, staff productivity savings, etc. Learn More.
http://www.ITtoolbox.com/erd/15730
**** DOER GROUPS ****
http://networking.ittoolbox.com/groups
Most Popular Thread
VLANS ACLS AND DHCP IP HELPER COMMAND
By mathurmahesh, member since 8/1/2007, Group: cisco-infrastructure-l
I have 5 vlans and only one vlan can talk to all the vlans through access rules. But I have configured the DHCP server in one VLAN where it can't be access by other two VLANS...how can i configure that rule to access...
http://www.ittoolbox.com/da/583490
Recent Threads
SAVING DOCUMENT
By gwelte, member since 8/22/2007, Group: networkadmin-l
http://www.ittoolbox.com/da/583492
MS OUTLOOK
By gurnage, member since 10/7/2001, Group: networkadmin-l
http://www.ittoolbox.com/da/583494
HOW TO WORK WITH MAXTOR
By geetha_sg, member since 1/18/2007, Group: networkadmin-l
http://www.ittoolbox.com/da/583496
CONFIGURING QOS ON A VSAT LINK
By stamodu, member since 12/17/2005, Group: cisco-infrastructure-l
http://www.ittoolbox.com/da/583498
PRINTER
By himself90, member since 5/22/2006, Group: networkadmin-l
http://www.ittoolbox.com/da/583502
NETWORK
By himself90, member since 5/22/2006, Group: networkadmin-l
http://www.ittoolbox.com/da/583505
CONNECTING DIFFERENT LANS
By mccarron8452, member since 11/27/2006, Group: networkadmin-l
http://www.ittoolbox.com/da/583509
PIX 501 AND ISSUE WITH OPENING A PORT
By jafo18301, member since 8/21/2007, Group: cisco-infrastructure-l
http://www.ittoolbox.com/da/583512
NETWORK STOPS ON TOSHIBA LAPTOP
By himself90, member since 5/22/2006, Group: networkadmin-l
http://www.ittoolbox.com/da/583513
----------------------------------------------------------------------
IMPROVE DATA MANAGEMENT THROUGH VIRTUALIZATION
Go inside the technologies that improve data center TCO and management by reducing the time required to deploy and maintain servers. Discover how by virtualizing I/O connections to SANs and LANs.Read this free white paper.
http://www.ittoolbox.com/da/565878
----------------------------------------------------------------------
**** DOER WHITE PAPERS ****
http://networking.ittoolbox.com/documents/white-papers/
Recent White Papers
MINIMIZE DATA LOSS IN A DISASTER
By Enterprise Strategy Group, Inc.
If you still think of disaster recovery only in terms of data redundancy you're only getting half the story. True "bulletproof" disaster recovery requires both data stability and application availability for business continuance. Read why one independent lab gave HP XP disaster recovery software...
http://www.ittoolbox.com/da/580864
PLANNING FOR BUSINESS RESILIENCE
By Bill Hammond, Lakeview Technology
Business resilience is all about harnessing multiple complex, often competing, initiatives into a larger, strategic vision for IT that supports the business. To achieve true business resilience, you need resilient information and applications that can support the business wherever the future leads. This chapter explores...
http://www.ittoolbox.com/da/511196
HOW EFFECTIVE IS YOUR ANTIVIRUS?
By Sunbelt Software
Your antivirus software may stop viruses and worms, but what about keyloggers and backdoor Trojans? A lack of aggressive spyware detection and removal can result in spyware wreaking havoc throughout an organization's IT network. Read this paper to learn about the key differences between...
http://www.ittoolbox.com/da/551575
IPSEC VS. SSL VPNS FOR SECURE REMOTE ACCESS
By Aventail Corporation
Learn whether an IPSec or SSL VPN will best meet your needs for:<br>-Access control for unmanaged end points<br>-Support for a full range of applications <br>-End user ease-of-use <br>-Improving security and centralizing your control...
http://www.ittoolbox.com/da/538932
ESTABLISHING AN EFFECTIVE IM USAGE POLICY
By Symantec Corporation
This white paper provides a best practices overview for effectively managing the risks and costs associated with the corporate use of IM. Download this white paper today and learn more about security and legal risks associated with IM usage and how to overcome them...
http://www.ittoolbox.com/da/535381
To Signup for Networking White-Paper Alerts
http://www.ittoolbox.com/da/347720
**** DOER BLOGS ****
http://blogs.ittoolbox.com/
Most Popular New Blog Entry
REX'S FIRST CASE...OR HOW THE UTILITY BELT REALLY GOT STARTED PART 4
By KI4REX
Continued from Part 3 (Note: once again this is not the actual language used, but "angry sailor" does not meet the user agreement here at ITT) After Hauling the PC in question back up he narrow passageways and ladderwells back to the ADP center Rex...
http://www.ittoolbox.com/da/583481
Recent Blog Entries
TO FLAME OR NOT TO FLAME, WHO IS TO BLAME?
By KI4REX
There have been some ruthless flames on various blogs and forums recently and it has made me think. There has been a lot said here and else where about Why I pick this, and Why you should not pick that, Or you only say that...
http://www.ittoolbox.com/da/583479
WHAT DO I NEED TO BE THE "COMPUTER GUY"?
By Locutus
Not everyone can be in the IT business. As I mentioned before there is a huge rate of burnout mostly due to people not being the "right stuff (tm)" for the trade. Here is a sometimes humorous list off of the top of my head...
http://www.ittoolbox.com/da/583480
10 THINGS NOT TO TELL AN IT SECURITY PRO
By Mark Tordoff
Jon Espenschied's article, Oh, don't tell me: 10 claims that scare security pros, makes some humorous, but serious points about how organizations and individuals can brush off security concerns and leave themselves and others vulnerable. Here's Jon's 10 claims that should...
http://www.ittoolbox.com/da/583517
IF IT CAN HAPPEN TO SKYPE IT CAN HAPPEN TO ANYONE!
By Locutus
If you don't know the brouhaha that just recently involved Skype then I suggest you pull your head out of the sand :). The current story as of this writing is that a round of simultaneous windows updates overwhelmed Skype's network and caused a...
http://www.ittoolbox.com/da/583482
RESPECT IN THE WORKPLACE IS IMPORTANT.
By Locutus
The workplace is a very stressful area that we spend a lot of our time in. A lot of the time more than a third of our waking hours are spent working under stressful conditions. Being in the IT department is more stressful than most...
http://www.ittoolbox.com/da/583483
COULD THE CREDIT FALLOUT HIT IT?
By Mark Tordoff
eWeek.com shared several possible ramifications related to the collapse of the subprime mortgage space and the uncertainty surrounding who will be exposed. Here's some of the ways they felt IT could be impacted: More Industry Consolidation - companies operating on slim profit margins will...
http://www.ittoolbox.com/da/583519
IT MANAGER LOSES "LEG" DUE TO LOSS OF FOCUS
By KI4REX
Not really, but it got your attention though, did it not? How many times does an IT manager with the proverbial "blinders" on wind up like this man? When we focus on only one problem, and do not take a step back to see what...
http://www.ittoolbox.com/da/583485
MY OPERATING SYSTEM IS BEST BECAUSE...
By Locutus
With every operating system there is always positive, mixed and negative reviews. You know the saying, whats one mans food is another mans poison. The thought that then came to mind is why is this so? Why do some people have so many problems with...
http://www.ittoolbox.com/da/583522
UBUNTU V.S. KUBUNTU
By Dru
For those of you who prefer KDE to Gnome, there's a more effective way of running Kubuntu on Ubuntu than from installing Kubuntu through the Kubuntu CD. Circular logic, yes, but experientially it works. From an Ubuntu installation, click System -> Administration -> Synaptic Package Manager...
http://www.ittoolbox.com/da/583524
**** DOER WIKI ****
http://wiki.ittoolbox.com
Most Popular New Wiki Contribution
SYSTEM ADMINISTRATION
By blueknight
System administration involves managing the servers within a data center. System Administrators supply technical support to keep the systems up and running, administering usernames/passwords and more. System Administrators manage one or more servers depending on the size of the data center or the organization...
http://www.ittoolbox.com/da/567351
Recent Wiki Contributions
ROUTED PROTOCOL AND NON-ROUTABLE PROTOCOL
By dewritermd
Whereas TCP/IP, IPX-SPX are Internet Protocols (IPs) which may use a Local Area Network (LAN) so computers can communicate between with each other and with other computers on the Internet, it does not need to be routable. Routed protocol is defined as the...
http://www.ittoolbox.com/da/583529
NETWORKING PROTOCOL
By dewritermd
A networking protocol is the standard communication method for computing hardware, such as servers, hosts, or workstations, to transmit data through a network. An example of such a protocol would be the Internet Protocol (IP). A network protocol is a set of rule which govern...
http://www.ittoolbox.com/da/562566
CISCO CERTIFICATION
By dlavigne6
Cisco was one of the first companies to offer technical certification exams with the introduction of the CCIE program in September 1993. Since then Cisco has introduced three levels of certification: <br>*Associate <br>*Professional <br>*Expert...
http://www.ittoolbox.com/da/583532
IP ADDRESS
By dewritermd
IP or Internet protocol addressing utilized either IPv4 classfull 32-bit (hexadecimal) number-based addressing or the newer IPv6 protocol formats to transport electronic information between computers or servers across the Internet. CIDR (Classless Inter-Domain Routing) addressing system has replaced this the original classful...
http://www.ittoolbox.com/da/583534
IPV6
By dewritermd
IPv6 stands for Internet Protocol Version 6, which is based on 128 bit IP address and provides a standardized method of transporting information across the Internet in packets of data from one computer to another. It is designed by the IETF to replace the current...
http://www.ittoolbox.com/da/128037
----------------------------------------------------------------------
WIKI TOP CONTRIBUTOR: AKSHAYA BHATIA
Created: Packet Filtering FirewallContents: "A packet-filtering firewall is a software firewall that is router based or run through the computer that is configured to monitor the incoming and outgoing packets..."...Continued at ITtoolbox Wiki.Become a top contributor as you share and learn with the community at ITtoolbox Wiki.
http://www.ittoolbox.com/da/523146
----------------------------------------------------------------------
**** JOB POSTINGS ****
http://jobcenter.ittoolbox.com/
Most Popular New Job Posting
COMPUTER OPERATOR NEEDED
Company: Global Technical Talent
Location: Piscataway, NJ
Global Technical Talent is currently recruiting for a contract opportunity in Piscataway, NJ for a Computer Operator. Run and monitor job streams, trouble shoot routine Windows and UNIX...
http://www.ittoolbox.com/da/583537
Recent Job Postings
WEBMETHODS ADMINISTRATOR NEEDED
Company: Fidelity Investments
Location: Covington, Kentucky
Fidelity Investments is seeking a WebMethods Administrator who has at least 3 years of experience with proven WebMethods Administration skills in a UNIX environment. Description: If you're...
http://www.ittoolbox.com/da/583538
ERP PRINCIPLE SECURITY ARCHITECT NEEDED
Company: Accenture
Location: Overland Park, KS
Accenture is seeking an ERP Principle Security Architect who has at least five years of security architecture experience within an SAP environment - Five years of SAP development experience....
http://www.ittoolbox.com/da/583539
SR. SYSTEM ADMINISTRATOR NEEDED
Company: Bristlecone
Location: Milpitas, CA
Bristlecone is seeking a Sr. System Administrator who has at least 8 years overall IT experience, preferably in a software or consulting environment. Job Detail:Provide 24 x...
http://www.ittoolbox.com/da/580879
CYBER INFRASTRUCTURE - SENIOR PROJECT MANAGER NEEDED
Company: Northwestern University
Location: Evanston, IL
Northwestern University is seeking a Cyber Infrastructure-Senior Project Manager who has at least 4-year degree in Computer Science, Engineering, Math, Science or related technical discipline along...
http://www.ittoolbox.com/da/578228
SYSTEM ADMINISTRATOR NEEDED
Company: ITtoolbox
Location: Scottsdale, Arizona
ITtoolbox is seeking a System Administrator who has at least 2 years experience with Microsoft Windows Support, server and XP-Pro, Networking fundamentals, including diagnostics with Unix and...
http://www.ittoolbox.com/da/578227
Related Jobs (North American candidates only)
CCIE - Cisco Networking (CCIE/LAN/WAN) Expert
http://www.ittoolbox.com/ext/41592
Networking // Security // CISCO // Consultants needed all over US
http://www.ittoolbox.com/ext/41593
Cisco Firewall Engineer
http://www.ittoolbox.com/ext/41594
Cisco Network Engineer
http://www.ittoolbox.com/ext/41595
Sr. Cisco Network Engineer / Support
http://www.ittoolbox.com/ext/41596
**** NEW EVENTS & WEBCASTS ****
http://networking.ittoolbox.com/events
IT ROADMAP 2007
12/13/2007 by Network World
Date: December 13, 2007 Location: Washington, D.C. Venue: Washington Convention Center 1 day, 8 tracks, 40 all-stars, analysts, vendors, and end users with new technology, best practices, case histories and practical solutions for IT's best and brightest! At IT Roadmap Conference & Expo...
http://www.ittoolbox.com/da/583536
**** UPCOMING EVENTS & WEBCASTS ****
http://networking.ittoolbox.com/events
THE SECURITY STANDARD
9/10/2007 by IDG
Date: September 10-11, 2007 Location: Chicage, IL Venue: The Fairmont Hotel Security today isn't just a matter of new technology and new threats. Security is about doing business in new ways that reflect the emerging dangers in our world, the evolving concerns of...
http://www.ittoolbox.com/da/564858
THE 3RD ANNUAL LEAN SIX SIGMA SUMMIT
9/18/2007 by IQPC
Date: September 18-21, 2007 Location: Las Vegas, NV Venue: The Venetian Lean Six Sigma is delivering millions of dollars worth of financial benefit to over 80% of the USA's top-100 companies - how does the dollar margin on your Lean Six Sigma Improvement...
http://www.ittoolbox.com/da/567261
MOBILE BUSINESS EXPO
10/22/2007 by CMP
Date: October 22-25, 2007 Location: New York, NY Venue: Javits Convention Center With case studies, demonstrations, keynotes, workshops and conference tracks covering the latest mobile technologies, and issues such as security and infrastructure decisions, Mobile Business Expo helps you build and manage a mobile...
http://www.ittoolbox.com/da/583461
_____________________________________________________________________
*Manage ITtoolbox Subscriptions: http://www.ittoolbox.com/da/81423
*Leave Newsletter: mailto:Leave-Networking-Doers@Updates.ITtoolbox.com
*View All Newsletters: http://www.ittoolbox.com/da/215184
*Advertising Information: http://www.ittoolbox.com/da/101378
*Suggest Content: mailto:Content@ITtoolbox.com
*Recommend this Newsletter: http://www.ittoolbox.com/da/82380
*Additional Questions: mailto:ITtoolboxNewsletters@ITtoolbox.com
Copyright (c) 1998-2007 Information Technology Toolbox, Inc. All rights reserved.
No comments:
Post a Comment