Beth Cohen is president of Luth Computer Specialists, Inc., a consulting practice specializing in IT infrastructure for smaller companies. She has been in the trenches supporting company IT infrastructure for over 20 years in a number of different fields including architecture, construction, engineering, software, telecommunications, and research. She is currently consulting, teaching college IT courses, and writing a book on Wireless Network security and another about IT for the small enterprise.
» LDAP Searches From Darn Near Anywhere http://networking.earthweb.com/netsysm/article.php/10954_3322861 The search continues! In Part 3 of our four-part series, we look at performing LDAP search queries from e-mail clients, Web browsers and a command-line interface. (3/8/04)
Unmasking the LDAP Search Filter
Need to locate critical information in your corporate LDAP directory but have shied away from learning how? Relax. In part 2 of our series, we explore the core of the LDAP search function — the search filter syntax itself. (2/25/04)
LDAP Searches Provide a Gateway to Company Data
Did you know that LDAP packs a powerful search and query engine? Savvy admins are finding that these are great tools for analyzing company data, networks, and security capabilities from your LDAP directories. In part 1 of our series, we show you how to prepare searches properly. (2/11/04)
Is Your ISP Working for You? Renegotiating Your Connectivity Contracts
The telecom and datacom industries have changed enormously over the past few years, opening up opportunities for significantly reducing your company costs and improving service on all of your connectivity needs. Learn how careful planning coupled with some sharp negotiations can lead to substantial savings and better service. (11/3/03)
Practically Painless NT to Windows Server 2003 Migration: Implementation and Beyond (with Hallett German)
Windows NT to 2003 migrations are serious business, but they are not impossible. Beth Cohen and Hallett German continue a new series of articles designed to help you plan and administer a successful, and practically pain-free, NT/2003 migration. (9/10/03)
Practically Painless NT to Windows Server 2003 Migration: Preparation and Planning (with Hallett German)
For Windows NT-based network admins, the decision to migrate your NT servers to Windows Server 2003 is not a matter of if, but rather a matter of when. To this end, Beth Cohen and Hallett German kick off a new series of articles designed to help you plan and administer a successful, and practically pain-free, NT/2003 migration. (9/3/03)
802.16 Part 2: A Look Under the Hood (with Debbie Deutsch)
802.16 promises to deliver true broadband speed wirelessly, but when will products be available and how important a role should the so-called WiMAX standard play in your future network plans? Join Beth Cohen and Debbie Deutsch as they continue their in-depth look at the wonderful world of WiMAX. (8/26/03)
802.16 Part 1: The Future in Last Mile Wireless Connectivity (with Debbie Deutsch)
802.16 promises to deliver true broadband speed wirelessly, but when will products be available and how important a role should the so-called WiMAX standard play in your future network plans? Join Beth Cohen and Debbie Deutsch as they take an in-depth look at the wonderful world of WiMAX. (8/18/03)
RADIUS: Secure Authentication Services at Your Service (with Debbie Deutsch)
RADIUS ensures that remote users are who they say they are, keeps track of their network usage, and secures your network infrastructure from intrusion. Learn how deploying RADIUS in-house or as a managed service can benefit you and your company's network. (7/29/03)
Searching for Wi-Fi Security Solutions (with Debbie Deutsch)
Security has long been the Achilles heel of the wireless industry. Set aside the security issues, though, and the case for wireless networking is overwhelmingly compelling — it's cheap, easy, and portable. Now that the industry is addressing the problem head-on with new solutions for manageable and acceptable network security, Wi-Fi may well be a choice that enterprises should be considering (or reconsidering). (7/14/03)
NT Domains to Active Directory - Time to Upgrade? (with Hallett German)
Microsoft has launched an initiative to 'encourage' the many companies that still have Windows NT 4 servers running to upgrade to one of its newer server releases, but the challenge of migrating from NT Domains to Active Directory remains one of the critical inhibitors to upgrading, especially for smaller and mid-sized companies. Beth Cohen and Hallett German delve into the murky details of converting to Active Directory with the goal of helping you pull off a NT/Windows Server 2003 migration project with aplomb. (6/23/03)
Public Key Infrastructure: Invisibly Protecting your Digital Assets (with Debbie Deutsch)
Public Key Infrastructure (PKI) offers the opportunity to streamline your procedures for protecting and sharing sensitive and valuable information. As Beth Cohen and Debbie Deutsch report, when it comes to protecting your company's valuable digital assets, you owe it to yourself to investigate what doors PKI can open for you and your organization. (6/17/03)
A Primer to Active Directory: Microsoft's System Information Repository (with Hallett German)
Active Directory is a potent tool for managing large networks of systems across WANs and LANs, but it can be complex to understand and administer. Beth Cohen and Hallett German's primer is designed to help you get acquainted with the tool that can help you create a robust and flexible architecture for addressing your company's needs, now and in the future. (6/12/03)
Is RFID in Your Future?
Radio Frequency Identification (RFID) technology has the potential to revolutionize business much as ERP and supply chain integration did in the late 1990s, but it can also have some serious security risks if you are not careful when deploying it. Beth Cohen reveals the power and the pitfalls of this exciting new technology so you can determine for yourself whether your company is ready to ride the next technology wave. (6/3/03)
'Good Enough' Security: Computer Security on a Shoestring Budget
In an environment where most of us are continually squeezed for time, resources, and funds, how can we possibly hope to fix and prevent all of our network's security problems? Beth Cohen presents principles of "good enough" computer security that might not prevent a massive targeted attack, but that will prevent 90% of your problems while keeping your finance department happy and your job secure. (5/29/03)
Power over Ethernet -- Ready to Power On? (with Debbie Deutsch)
Imagine what you could do if your existing Ethernet network cabling could be combined with electrical power to fully support wireless access points, VoIP phone systems, security cameras, and a variety of other appliances. With an official IEEE standard for Power over Ethernet (PoE) expected to debut next month, now is a good time to evaluate the advantages that PoE can bring to your organization. (5/19/03)
DNSSEC: Security for Essential Network Services
DNS has been a major security hole since it was first deployed, but until recently, not much had been done to patch the network service's security vulnerabilities. Beth Cohen reveals the largest DNS security holes, explores how you can protect your network from them, and introduces the IETF's new DNSSEC standard designed to prevent potential future catastrophic attack. (5/12/03)
Corralling those Wild IT Assets!
IT asset tracking does not need to be a major IT project or an enormous undertaking. By implementing it as part of your regular IT support processes and by taking advantage of new automated tracking tools, you can get a handle on your IT assets and start working more effectively and efficiently in short order. Beth Cohen offers a few simple tips to help get you started. (3/31/03)
Not Just a User, a Customer!
Customer service is nothing new, so why do so many IT people ignore it at their peril? Beth Cohen explores the reasons why being technically competent is simply not enough these days, and why top-notch communication skills are the new IT differentiator in today's highly competitive IT job market. (3/27/03)
VoIP: Killer Technology or Yet Another Victim of Hype?
Voice over IP (VoIP) technology enables telephone calls to be transmitted over IP data networks or the Internet instead of over public switched networks, giving it the potential to revolutionize our use of telecom and IT infrastructures. Beth Cohen addresses the pros and cons of VoIP technology and discusses whether or not you should be seriously considering the technology as part of your IT infrastructure mix. (3/5/03)
Network Services: To Outsource or Not To Outsource?
Does outsourcing the monitoring and management of your network actually benefit your business and save you money? If you lack the in-house expertise, there's no question that taking advantage of the economies of scale and the special expertise of an outside company can be a real benefit, but a positive ROI is less clear if you already have good services and support in place. (2/26/03)
AMP: Novell Pumps up the Volume on Open Source (with Hallett German)
Linux developers have long enjoyed powerful Open Source web development tools. With the release of its AMP Developer Suite, Novell will finally deliver full support for Apache, MySQL, and PHP (or Perl) and show the Open Source community it is serious about its commitment to open source. (1/28/03)
Dirty Dancing with AppDancer
AppDancer is a sniffer and network analyzer rolled into one, but it is much more. Beth Cohen explains why this product should be part of your network-analysis arsenal. (1/7/03)
Back to CrossNodes