Gary C. Kessler

Gary C.
Kessler

Gary C. Kessler is a consultant and the program coordinator of the networking major at Champlain College in Burlington, Vermont.

Articles
Hiding Data in Data
Does your encrypted data stick out like a sore thumb? Try these techniques for hiding it.
Other Forms of Steganography
Steganography doesn’t need to be high tech or in written form. Here are some examples of different types of steganographic methods.
DNS Resources
Gary Kessler provides a list of third-party products that let you provide a DNS service on an NT server.
Subnetting and Variable-Length Subnet Masks
Understand VLSMs and get a handle on your organization's IP address setup.
How DNS Works
Is your organization preparing to connect to the Internet? Use these DNS references and tools to help get the job done right.
The Power of Packet Filtering 2
Follow these guidelines for securing your server.
Deciphering Cryptography
Decrypt the basics of cryptography, discover the different cryptographic algorithms, and decode how NT uses cryptography.
Add Fuel to Your Firewall
Discover several security tools that help you spot potential problems before attackers exploit them.
Routing, NT, & RIP 9
Learn how to use NT Server as a software-based router.
IP Addressing Basics 115
Learn everything there is to know about IP addresses, from classful addresses to subnetting.
Alternative Address Conservation Schemes
In the past few years, developers have created several methods that cleverly use available IP address space. Here are some of them.
Windows NT and DHCP
The NT version of DHCP lets you assign almost 50 network settings, but most network administrators use this full-featured tool to conserve network IP addresses.
Hyper-V Master Class

Hyper-V Master Class with John Savill
Live Online Training: Thursdays, April 27th to May 18th
Register by April 20th and Save 20%!

John Savill provides 12 hours of detailed instruction covering all the key aspects of a Hyper-V based virtualization environment covering both capabilities in Windows Server 2012 R2 and Windows Server 2016. John will walk attendees through resource allocation and architecture, storage, networking (including Network Virtualization), clustering, migration technologies, replication, private cloud, session virtualization, migration from other technologies, integration with Microsoft Azure, and more. At the end of this class, attendees will be able to architect and manage an enterprise-level Hyper-V environment.

 

Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×