Advert

The Certificate Enrollment Process

Last edited by . Total of 6 comments in the discussion.

While encryption can be a robust security technology, users have to implement a public key infrastructure (PKI) to make it beneficial and trusted within an organization. The Windows 2000 and Windows Server 2003 PKI implementation resides in Certificate Services. A public key infrastructure is the collection of technology, protocols, services, standards, and policies that control the issuing and management of public and private keys using digital certificates. Certificates are the core of the PKI. Encryption is used to protect data messages as they are transmitted over the network and digital Read More

Share on:

Windows Networking

Last edited by . Total of no comments in the discussion.

Setting up a network of Windows computers is no longer a task that requires an Information Technology (IT) professional. A home network allows you to have a common printer for many computers, share removal drives, play multi-player games, store a single copy of files on a central server, and share a internet connection – the most common task. When setting up a home network, the central host computer should be running the newest version of Windows (normally the most powerful in a common household). Steps to Setting Up a Windows Read More

Share on:

Understanding Ethernet LAN Segmentation

Last edited by . Total of 1 comment in the discussion.

LAN Segmentation Overview Network segmentation is the terminology used to describe the process of dividing single Ethernet segments into multiple segments. Network segmentation has the following main advantages: Network performance of the LAN is improved. Network congestion issues can be resolved. Available bandwidth is maximized. A few technologies which you can use to perform network segmentation are listed here: The network can be physically segmented with bridges and routers. This type of segmentation directly decreases the number of workstations on the same physical segment. You can use a network switching Read More

Share on:

The VPN Gateway

Last edited by . Total of no comments in the discussion.

Virtual Private Networks (VPNs) enable users to connect to a remote private network through the Internet. Virtual private networks therefore span the Internet because the user connects over the Internet to the remote VPN server. With a VPN, data is first encrypted and encapsulated before it is sent to the remote VPN server. When the VPN server obtains the data, it decrypts the packet so that is can be interpreted. VPNs are usually implemented to: Enable remote access users to connect to and access the network. Provide connectivity between two Read More

Share on: