Home > Articles > Operating Systems, Server > Microsoft Servers

Microsoft Servers

276 Items

Sort by Date | Title

Changing Windows Administrator Passwords Across The Enterprise: Automate The Gosh-Durned Process
Aug 19, 2005
When the word comes down that every Windows Admin password in the company has to be changed, life can get ugly for the IT department. Lynn Greiner shows you how to automate the process, so that you don't have to walk from one computer, to another, to another.
Getting the Most from Microsoft Window's Encrypted File System
Aug 12, 2005
Built into Windows 2000, 2003, and XP is a clever system for easy encryption of files and folders. The Encrypted File System (EFS) is fast, free, and easy to use. Rick Cook's rapid-fire overview of EFS covers how it works, what it does, what it doesn’t do, and what you need to know to make the best use of EFS to protect your precious data.
Authentication Auditing in Windows 2000
Jul 29, 2005
Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
Five Things Wrong With SharePoint
Jul 8, 2005
Collaboration is what Microsoft's Sharepoint is best at. But there are several real problems with it... and somehow, nobody's been talking about them. That is, until Mike Drips arrived. And boy, does he have strong opinions.
Anatomy Of A Hack—The Rise And Fall Of Your Network
Jul 1, 2005
There are myriad ways that a network can be compromised, and an administrator needs to be aware of them all (and anticipate new ways coming around the corner). This chapter will not to show how to attack something, but show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.
Managing Files with Windows XP
Jun 24, 2005
As you work with a computer creating more and more documents, you need to find a way to keep this information organized. Without a good organizational method, all your files are lumped together in one place. This chapter will help you get started organizing your files in a logical and meaningful way.
Using WSH Scripts with the Windows Management Interface
Jun 3, 2005
Network monitors — who needs them? Learn how to use the Windows Management Interface (WMI) to monitor hardware and services.
Windows' Roaming Profiles to the Rescue
Apr 29, 2005
Depending on how you apply them, roaming profiles can do anything from making your life easier to saving your bacon. If a user needs access from all over the building, roaming profiles are a convenience. If you have 50 users and only 10 computers, roaming profiles are an easy solution. If an entire department's computers die in the middle of a critical project, roaming profiles are a lifesaver.
BizTalk Server 2004 to the Rescue
Mar 11, 2005
This article looks at the order-fulfillment problems faced by a fictitious e-commerce company: PinkAndBlue, Inc. Ravindra Okade shows how BizTalk Server 2004 is used to provide an elegant solution within a small budget and a very short implementation time. The proposed solution has all the required ingredients: scalability, failover support, message tracking, flexible transport protocols, and business rules support.
DoS Attacks! How to Protect Your Windows 2003 Server
Mar 4, 2005
As long as there are TCP/IP packet transmissions, those pesky DoS (denial of service) attacks are here to stay. You'd better understand how these attacks happen and learn to harden your Windows 2003 Server against them. Jesse Smith gives you information and encouragement.
Terminal Server Security
Feb 25, 2005
Regardless of the size of your Terminal Server environment, it is imperative that you take the time to properly assess the security requirements of your infrastructure. This chapter will help you do just that.
Windows Processes and Threads: Weaving It All Together
Feb 18, 2005
A process contains its own independent virtual address space with both code and data, protected from other processes. Each process, in turn, contains one or more independently executing threads. A thread running within a process can create new threads, create new independent processes, and manage communication and synchronization between the objects. Whew! This chapter explains the basics of process management and also introduces basic synchronization operations. If you're at all interested in Windows system programming, this is the place to start.
What's New in Windows Server 2003 and ProLiant Architecture and Tools
Feb 11, 2005
Moving to Windows 2003 from Windows 2000 won't be nearly as dramatic as was moving from NT to Windows 2000, but there are some significant benefits. This chapter explains in detail all of the new features in Windows Server 2003 and ProLiant Architecture and Tools.
SharePoint Site Collections Demystified
Jan 21, 2005
In this sample book chapter, you'll learn about SharePoint site collections and their main components — top-level sites and subsites — and about document and meeting workspaces.
Building the Foundations for a Highly Available Windows Server Architecture
Jan 14, 2005
This chapter teaches you how to set up a Windows-based network around a single support server used for updates, patches, tools, installation bits, and DHCP services.
Mapping UNIX/Linux Shares On a Windows Server 2003 Network
Dec 30, 2004
Mapping drives from a UNIX/Linux file server doesn't only expand the scope of user storage on your network; it is also a good way for getting rid of complicated worms or viruses on Windows networks. Jesse Smith demonstrates dynamically mapping UNIX/Linux shares on a Windows Server 2003 network.
Windows Forensics: Using the Forensic Server Project
Dec 30, 2004
Collecting data from a potentially compromised system is relatively simple, especially if you know your way around the Forensics Server Project. Find out how to use this tool to learn where security holes exist to tighten up your network in this chapter.
Domains and Objects in Windows Server 2003
Dec 23, 2004
Jesse Smith reviews two of the new features of Windows Server 2003 Active Directory 1.1: raising domain functional levels and using saved queries to simplify administrative tasks.
Organizing Shares with Windows Server 2003 DFS
Oct 29, 2004
Want to reduce administration time and user frustration? Streamline your network file sharing with DFS. Jesse Smith tells you how to set up a DFS root, and you'll learn some good practices for managing one or more DFS roots on your network.
Staying in Sync: Time Synchronization Capabilities of Windows 2000
Oct 15, 2004
Are you out of sync with the world? Can't help you. But Kulvir Singh Bhogal explains how Windows 2000 can automatically keep your computer systems on time.

<< < Prev Page 3 4 5 6 7 Next >