Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.

Share tech news, updates, or what's on your mind.

Sign up to Post

We currently have a windows domain.  When thinking about Patch management on the network and thru Windows 10, doesn't the OS automatically handle patches through the updates on each system?  Is WSUS really necessary to push out patches, when the Windows 10 platform does a fine job on its own to apply updates?
So here is a broad topic, which is encryption.  When looking at the security controls of a network, it seems that encryption is a must.  My question is what things should be encrypted on a network?  Are we talking encryption on a intranet?  Email? File sharing?  What are some of the suggested practices in terms of what items need to be encrypted and HOW can that be implemented?  Does it happen at the firewall level?  Is it configured on the switch?  This is a broad question, but it will give me some direction when seeing the replies.

If a 802.11. network did not encod data, would signal to noise ratio, be still an issue?
Throughout the day a good portion of my users experiences internet dropouts and waiting on proxy tunnel when they are on a browser. I have inherited just recently our proxy server. I don't know how it was built or for that matter how it works. The user who did know has left the company and I'm not sure where to start. Any help would be brilliant?

Need to save money on Verizon Portable MiFi

I spend about $45/month for unlimited bandwidth and wonder if I can save money with pay-as you go?

I use almost none each month.

Who can I switch to and still have the Verizon cell network, or similar?

EIGRP Summarization:

in the EIGRP summarization like the example below , I would like to know for instance when R1 Receives  a query for a route Will it check its routing table before it decides to put it in a bit bucket  (Null0) ?
Also for instance R1 will receive a query for a route , will  it also check its routing table to see if it has a route for it before it decides to send it to  Null0 ?

R1(config)#router eigrp 1
R1(config-router)#no auto-summary 
R2(config)#router eigrp 1
R2(config-router)#no auto-summary 

R2#show ip route eigrp is subnetted, 2 subnets
D [90/30720] via, 00:02:28, FastEthernet0/0
D [90/30720] via, 00:02:28, FastEthernet0/0

R1(config)#interface fastEthernet 2/0
R1(config-if)#ip summary-address eigrp 1

R2#show ip route eigrp is subnetted, 1 subnets
D [90/30720] via, 00:00:53, FastEthernet0/0

R1#show ip route eigrp is variably subnetted, 3 subnets, 2 masks
D is a summary, 00:01:38, Null0

Open in new window

How uninstall old version of .net framework and install new version with logging into user devices
a client has a Hyper V machine, server 2012 r2 standard.  this acts as their Domain Controller, recently they ran out of IP addresses and a new PC wouldn't get an IP address, so we expanded the scope from 1.1 - 1.200 to 1.1 - 1.254 so it gives them more IP's.  obviously they have servers with static IP's of .222 etc so we made sure all these would be put as reservations for those devices (i believe they were exclusions anyway).  when we did all of that the problematic PC got an IP and it was fine,  this morning the client has come in to say that the PC hasn't got an IP address again, in DHCP the lease is still valid for that machine, so i deleted it, got the PC rebooted and then it got an IP address, the same IP as it had the day before.

can anyone shed some light on this issue and why it would do this?
We have a new building and I'm wondering what is the best to use, either a ladder rack or conduit for running about 70 cat6a cables and some fiber cables about 70 foot distance and about 20 ft in elevation from the basement to the 1st floor.  There is a hall way and 2 or 3 rooms between my server room and data closet.  There are tiles in the ceiling.
My general contractor is stating that ladder trays would be best and my low voltage is saying conduit is best.

I'm looking at it from a long term  situation, I want to make it as easy as possible for me to pull more cables as needed.  In the past, I had a conduit that was full of cables, and when I tried to pull more, my run got stuck and I couldn't pull any more, had to get a company to bore and install new conduit, so I don't want to experience the same situation.
With a ladder rack  or wire basket, I'll have to pop the tiles every 10 feet or so and get on ladders, so I guess it's more work, but I wont' have to worry about not able to pull more cables in the future.

Any suggestions?
I ran a web app on a EC2 instance, which is using port 3003. But it  cannot be accessed from external network

With logged in with SSH, I curled 'localhost:3003', then response returned as expected.

WAF: Mojolicious
App start command: morbo "http://*:3003"

This is obviously insufficient configuration on web server, but I don't know how.

I am grateful if you could advise me.
Is there a good tutorial or explanation of the RDN (Names) Identifying the various Groups and Users I have listed here. I assume some are defaults and some may be OS specific and others specific to applications I have installed. I understand a fair amount about users and rights however.

My goal is to understand the following better:

Authenticated Users

I am curious to know the differences between:

Local Account vs Local Account & Member & Administrator Group

I assume that the "In Folder" means that the Name RDN (image below) is included in the Permissions setting. Therefore the member of the group or the specified user has permissions to use RDP. I used to set up Business Objects Enterprise Users Groups Object and Folder Rights. So I have basic understanding.
Any direction "pointable" is appreciated. Thank you.
What I am hoping to understand better.

I've been fine-tuning my javascript for a little while, and this page below has helped me most understand everything needed for gaming. . .
but, it doesnt do networking, which I'd like to discuss...
Is / an MMO, or computer enemies? They have what seems to be a score table with different names, but I question whether they are people or not, since there seem to be so many?
Is it datagrams over TCP?  Many connected servers all over the world?
Is a game like pure Javascript?

That Javascript game overview is . . .


I have handheld devices that I cannot change the domain path ( They point to an address and work perfectly outside the building. Once inside they cannot route to the external address. I have a ddwrt router and I need to be able to create a table edit to resolve that address locally. How can I configure this ?
Bit of a quandary.

I need to a) rename a Active Directory Domain and b) upgrade servers to either 2012 R2 or 2016 (heard a few issues with 2019, so that can wait).

Would you rename, then upgrade, or would you upgrade first, then rename?


The internal domain name is from a previous company ( that was upgraded over the years from the NT days, so the network is actually quite old.
New company bought all the equipment because the old one went belly up, but continued using domain internally, except for email.

Exchange had been outsourced with new company, so all the clients were pointed to the email hosting company. Old company's email has been offline for a number of years now.

Idea was to be as least disruptive, but that may have been a bad call at the time.

Now I want to fix it all up.

The new has their own web presence under I was thinking of just using internally, which is actually what the current email points to.

Just trying to get a feel before proceeding.
I currently have an issue with 3 thin clients that are not maintaining wireless stability and constantly disconnect.   I am told updating the firmware will fix this however I wanted to check with the pros to get their opinion.   I am not familiar with any of these units as far as the admin console on how to manually flash the firmware as well as obtain the actual correct firmware itself.   Could someone assist?  I have attached the screen shots of all 3 units.
I need to design a topology of our network for a meeting that shows all the network servers and communication appliances.  What software can I use that is simple or free to do so?

We run several protections on our web traffic, Firewall, IPS, web filter, how can I determine what is blocking a website? I've looked in all devices and cannot find anything being blocked for this one specific site, so I am assuming it's a secondary resource being blocked? I can load it just fine on my phone?
Attachments is taking too long for scanning with ATP attachments enabled in office 365. Why and how to fix this? Is there way to exclude from scanning?
Hi all,

we work with a Windows 10 image and deploy that on many machines. We doing that in the same network we will get problems (and do have them right now) caused by the same SID. The question now is: how to change a SID on a Windows 10 system without killing the system. Thing is that I ran a tool NewSid.exe (from Microsoft) and that totally killed 2 machines. I red something about sysprep /generalize, but we do not work with sysprep. The tool we use to deloy images is Acronis, but whatever tool it is, the problem is the same: we cannot have equal SID's in one network.
What is the command to check remote mgmt card is installed on windows server using command prompt?

Is there any other way to find that card is there or not?
If I were to use Nagios, would it need to be on the same network as the infrastructure it is monitoring?
Hello fellow Experts Exchange members:

I have a very strange situation.  This morning, one of our workstations with a static IP address set reported "IP address conflict" upon logon to Windows.

The IP address in question was reserved in DHCP, and there are no rogue DHCP servers on the network.

After modifying the DHCP reservation to use a different IP address, I tried to determine the device using the conflicting IP address but was unable to do so.

The device responds to pings and somehow acquired an IP address that is valid for accessing on our network but would not have been assigned by DHCP.

Here is one of the unusual parts: the device has an unregistered MAC address.  By that, I mean that when I enter the MAC address into online MAC address vendor query websites I get a "Not found"-or-similar message.

I have also tried to isolate which part of the network the device could be on, and here is the second unusual part: with the servers off, a static IP address (using public DNS servers) set on one of the workstations not using the conflicting IP address, and all network devices disconnected from the network switch besides the perimeter firewall, the conflicting IP address *STILL RESPONDS TO PINGS*.

Neither the perimeter firewall nor the managed switch nor the workstation used the conflicting IP address, and there were no other network devices of any kind including the wireless router and any wireless clients reachable.  (They were physically disconnected …
hi guys

So I'm about to work on a project for a firm and one of the people I am going to be interviewing is a CISO. I will be directing the strategy and implementation of the infrastructure and security. The CISO will report directly to me. This individual has highlighted the following areas as their strengths:

IT Security & Information Assurance
Data Protection, EU GDPR, Privacy & Online Safety
Governance and regulatory compliance
Security Incident Response, e-litigation & RCA
CyberEssentials, NIS directive, CoCo, PCI DSS

I have some questions of my own. But I wanted broader perspectives from people like you. So if you had the opportunity to ask some questions from such an individual, what sort of questions would you ask them in order to understand the spectrum of their security understanding/experience?

Thanks for helping
Sounds strange:
I have an VPN to a foreign network which is established by the two routers.
The network mask is
I can't ping the computer with the address x.x.x.1
I can ping every other comuter in the foreign network.
I can establish a RDP connection to x.x.x.1
I can't reach the x.x.x.1 through port 1433 (SQL)
From a computer inside the foreign network everything works fine which does'nt work through the VPN.

This behaviour ist new. A couple of days bevor, everything worked fine.

I have no idea!
This customer started out with a class C subnet of They are at the point where they need more IP addresses. They have a ton if wireless APs and little switches that I could move to another subnet which would give them a lot of room to expand. The problem is that if I move the APs and switches to another subnet they lose internet on those devices and a lot of nice things that go with it. They have a real nice SonicWall TZ300. How can I move those devices to a different subnet and still give them internet?






Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.