- EFS Best Practices
- Oct 4, 2000
- Windows 2000 expert Bill Boswell provides an invaluable list of best practices for deploying and managing encrypted files with the Encrypting File System.
|
- EFS Issues in Windows XP/2003
- Jun 25, 2004
- Compared to Windows 2000, the new implementation of the Encrypting File System (EFS) in Windows XP/2003 has some pitfalls. Zubair Alexander examines these issues and provides some pointers for planning an EFS strategy for your business environment.
|
- Enhancing Remote Installation Services
- Dec 13, 2000
- Windows 2000 deployment expert Jeffrey Ferris discusses the advantages of 3Com's RIS Menu editor, which enables you to add tools and utilities to Microsoft's Windows 2000 RIS boot screen.
|
- Essential Windows Workflow Foundation: Activity Execution
- Feb 23, 2007
- This sample chapter introduces the activity automaton, which describes the lifecycle of any activity in a WF program instance. It describes the service-chaining capabilities of the WF runtime, as well as the use of bookmarks (and associated WF program queues) as a mechanism by which activities can receive stimulus from external entities.
|
- Examining Replication and Trusts
- May 25, 2001
- Windows 2000 expert Curt Simmons discusses replication and trust relationships in the Active Directory.
|
- Exploring ISA Server 2004 Tools and Concepts
- Aug 26, 2005
- This chapter covers the high-level details of each portion of the ISA Management Console, with emphasis placed on introducing ISA administrators to the tools available to make their lives easier.
|
- Exploring Windows 2000 Memory
- Jul 30, 2001
- Memory management is one of the most important and most difficult duties of an operating system. This chapter presents a comprehensive overview of Windows 2000 memory management and the structure of the 4-GB linear address space.
|
- Exploring Windows XP's Interface
- Dec 28, 2001
- John Mueller explores Windows XP by looking at the most important tool in the Windows user interface, Windows Explorer, and discussing how to manage and customize the user interface.
|
- Extending the Active Directory Schema To Track Custom Info
- Feb 27, 2004
- You can modify the Active Directory database to track almost anything you want: ID info, social security numbers, etc. Kurt Hudson shows how to track additional information about user accounts.
|
- Fax Servers: Serving Faxes More Than Ever!
- Sep 3, 2004
- The continued—and still growing!—reliance on faxes for secure, easy document transmission has more and more businesses moving from traditional fax machines or PC-based faxing programs to dedicated fax servers. Should you join them?
|
- First Steps with Windows PowerShell
- Jun 23, 2008
- This chapter introduces Windows PowerShell and helps you set up your environment.
|
- Five Things Wrong With SharePoint
- Jul 8, 2005
- Collaboration is what Microsoft's Sharepoint is best at. But there are several real problems with it... and somehow, nobody's been talking about them. That is, until Mike Drips arrived. And boy, does he have strong opinions.
|
- Five Tweaks for Windows Servers: Speeding the Internet Experience for Users
- Feb 13, 2004
- Don't have room in the budget for all the bandwidth you'd like? Users griping about Internet wait times? What's an IT mom to do? What parents of modest means have always done: Plug the leaks, patch the holes, and stretch the meals with bread.
|
- Fixing Windows
- Dec 21, 2001
- When restoring a Windows PC to reliable operation, the key is to do so in the least amount of wasted time. Pete Moulton helps you determine the source of the trouble and take appropriate action to fix Windows in the shortest possible time.
|
- Foreseeing the Annoyances of Windows 7
- Jul 31, 2009
- Eric Geier discusses possible Windows 7 interface and feature changes that you might find irksome.
|
- Fourteen privileges that can be abused in Windows 2000, Part 1
- Sep 14, 2001
- To properly administer and secure Windows 2000, you should be knowledgeable on the privileges that can be granted to user and group accounts. In the first of a two-part series, Roberta Bragg focuses the attention to critical system privileges.
|
- Fourteen privileges that can be abused in Windows 2000, Part 2
- Sep 28, 2001
- In the second of a two-part series, Roberta Bragg continues to focus the attention of auditors, systems administrators, security administrators, security analysts, etc on critical system privileges.
|
- Getting the Most from Microsoft Window's Encrypted File System
- Aug 12, 2005
- Built into Windows 2000, 2003, and XP is a clever system for easy encryption of files and folders. The Encrypted File System (EFS) is fast, free, and easy to use. Rick Cook's rapid-fire overview of EFS covers how it works, what it does, what it doesnโt do, and what you need to know to make the best use of EFS to protect your precious data.
|
- Getting the Most Out of User Accounts
- Dec 25, 2006
|
- Getting the Most Out of Windows Vista User Accounts
- Mar 9, 2007
- Tired of your daughter changing the wallpaper and leaving files scattered on the desktop? You need the user accounts feature contained in Microsoft Windows Vista. This sample chapter will introduce you to user accounts and shows how you can use accounts to your advantage.
|