Home > Articles > Home & Office Computing > Microsoft Windows Server

Microsoft Windows Server

182 Items

Sort by Date | Title

Dealing with Fallout from Windows Update
Sep 19, 2011
Ed Tittel explains how to handle the occasional wobbles that sometimes follow in the wake of Windows Update.
Introduction to the Microsoft System Center Enterprise Suite
Apr 30, 2010
This chapter introduces the System Center family of products and what each of the components are.
A Brief History of Microsoft Windows
Aug 3, 2009
Michael Miller is your tour guide for 25 years of Windows: from Windows 1.0 to Windows 7.
Media Improvements in Windows 7
Aug 3, 2009
This chapter reveals the improvements in Windows Media Player and Windows Media Center that enhance your audio and video experience in Windows 7.
Top Five Sysinternals Windows Utilities
Jun 30, 2009
Ed Tittel and Kim Lindros profile a handful of tools that Windows users of all stripes are likely to find invaluable.
Ten Tricks for Speeding Up an Old Computer
Jun 29, 2009
Is your computer slowing down? If so, check out these 10 tricks from Michael Miller that will help speed up any older PC!
Defragmenting the Windows Registry
Jun 16, 2009
Ed Tittel explains why it’s a good idea to defragment the Windows registry and explores a handful of tools available to perform this task.
Printer Sharing In-Depth: Permissions and Internet Sharing
Jun 9, 2009
Eric Geier discusses setting up and using Windows printer permissions and remote internet printing.
Sharing Windows Permissions in Depth, Part 3
Apr 27, 2009
Eric Geier continues his discussion on sharing permissions and settings.
Sharing Windows Permissions in Depth, Part 2
Apr 20, 2009
Eric Geier continues showing you how to use advanced sharing to better secure your files on the network.
Sharing Windows Permissions in Depth, Part 1
Apr 14, 2009
Eric Geier shows you how you can use advanced sharing to help better secure your files on your Windows network.
Using HWMonitor to Track Windows System Temps and Health
Feb 3, 2009
Ed Tittel explains how the free Windows utility HWMonitor can help to prevent overheating.
Installing and Configuring TrueCrypt for Full Disk Encryption
Nov 24, 2008
Security expert Randy Nash describes how he deployed a FDE solution using the free, cross-platform, and open-source solution from TrueCrypt.
Windows Server 2008 Hyper-V Technology Primer
Sep 17, 2008
Rand Morimoto and Jeff Guillet introduce the Hyper-V server role in Windows Server 2008.
Programming the Windows Script Host
Apr 29, 2008
Paul McFedries shows how to execute scripts and runs through the various elements in the Windows Script Host object model.
IT Management Using C# with WMI
Sep 21, 2007
If you find the acronym-rich area of management one big yawn, you'll be pleased to see how easy it is to get started with WMI.
Changing Windows Administrator Passwords Across The Enterprise: Automate The Gosh-Durned Process
Aug 19, 2005
When the word comes down that every Windows Admin password in the company has to be changed, life can get ugly for the IT department. Lynn Greiner shows you how to automate the process, so that you don't have to walk from one computer, to another, to another.
Authentication Auditing in Windows 2000
Jul 29, 2005
Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
Five Things Wrong With SharePoint
Jul 8, 2005
Collaboration is what Microsoft's Sharepoint is best at. But there are several real problems with it... and somehow, nobody's been talking about them. That is, until Mike Drips arrived. And boy, does he have strong opinions.
Anatomy Of A Hack—The Rise And Fall Of Your Network
Jul 1, 2005
There are myriad ways that a network can be compromised, and an administrator needs to be aware of them all (and anticipate new ways coming around the corner). This chapter will not to show how to attack something, but show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.

Page 1 2 3 4 5 Next >