Ask the Experts
Ask the Experts
Network device security: Appliances, firewalls and switches
-
How do circuit-level gateways and application-level gateways differ?
Learn how circuit-level gateways and application-level gateways differ in this network security Q&A. Continue Reading
-
How do proxy servers and proxy firewalls differ?
In this network security Ask the Expert Q&A, SearchSecurity's resident expert Mike Chapple examines how proxy servers and proxy firewalls differ and explains how they work together. Continue Reading
-
How can I open a closed port so my application can access the Internet?
In this network security Ask the Expert Q&A, Mike Chapple, our resident expert, reveals what should be done if you need to re-open a closed port to allow an application to work. Continue Reading
-
The pros and cons of proxy firewalls
In this Ask the Expert Q&A, our application security expert reviews the pros and cons of proxy firewalls. Continue Reading
-
How to detect rogue DHCP servers, routers and NICs on a network
In this Ask the Expert Q&A, our identity and access management expert identifiies techniques and tools that help detect rogue DHCP servers, routers and network interface cards on a network. Continue Reading
-
The pros and cons of application firewalls
In this Ask the Expert Q&A, our application security expert discusses the pros and cons of application firewalls. He also explains how they differ from packet filter and stateful inspection firewalls, and why they are not the preferred among some ... Continue Reading
-
Firewall responsibilities and firewall timeout features
-
The difference between TFTP and FTP
-
Firewall blocking network connection
-
The difference between a two-tier and a three-tier firewall
-
Relying on an ISP's firewall to protect your organization