Home > Articles > Operating Systems, Server > Microsoft Servers

Microsoft Servers

276 Items

Sort by Date | Title

Designing High-Availability Windows Systems
Jun 23, 2006
Computer systems that don't provide enough working time are worthless at best and disastrous at worst. But the fine distinction between "available enough" and "99.999% available" can end up hitting the bottom line pretty severely. Rick Cook explains the major options for designing a system with an appropriate amount of uptime.
Managing Windows User Accounts on Your Home Computer
Jun 23, 2006
Even in households and home offices that have multiple computers (the reason you are setting up your wireless network), it’s not uncommon to share a computer with another user or users. This chapter takes a look at sharing a computer with another person and focuses on creating and managing Windows user accounts. It also covers the process of logging on and off your Windows system and switching users.
Application Architecture in Windows Forms 2.0
Jun 9, 2006
Pane Relief: Herding Cats -- User Provisioning in Windows
Feb 24, 2006
Your Windows administrator may spend (waste?) a lot of time setting up users with passwords and access permissions (and redoing it when a user forgets his password). Provisioning systems can help by automating the process, but you're still stuck herding cats: figuring out who should grant permissions for what and making it all work. Rick Cook discusses the current options and issues for identity management and user provisioning systems.
Pane Relief: Registry Management Tools
Feb 10, 2006
The Windows registry works like an attic; stuff just keeps getting tossed in there, eventually creating a big, jumbled mess. Rick Cook explains why you need to pay attention to the registry and reviews types of registry tools for doing some spot cleaning.
Pane Relief: Rooting Around for Rootkits
Jan 27, 2006
As if your computer didn't give you enough cause for concern, now there's rootkits, nasty programs designed to hide away on your system and conceal software that takes control invisibly. Rick Cook explains what you need to know about these electronic cockroaches, how to find them, and what to do when you discover that you've been infested.
Planning a New Installation of Microsoft Small Business Server (SBS)
Dec 30, 2005
Regardless of the actual installation approach you may choose, many aspects of the customer's network environment must be considered when bringing SBS into the mix. This chapter focuses on gathering the information necessary to successfully bring the SBS product into any environment.
Managing Users, Contacts, and Groups in Exchange Server 2003
Nov 11, 2005
In an Exchange organization, administrators spend a great deal of time dealing with users, contacts, and groups. The administration tools are very similar to those of Exchange 2000 and require very little additional training to get started. This chapter will help you get started managing Exchange.
Windows Workflow Foundation: March Through the Activities
Nov 4, 2005
Activities are the building blocks of a workflow. A number of activities are provided in the Visual Studio 2005 toolbox to create basic workflows. You can also easily create your own activities, which can be added to the toolbox for use in your workflows. This chapter introduces you to all the activities that come with Windows Workflow Foundation.
Installing Exchange Server 2003: The Basics and Beyond
Oct 28, 2005
Microsoft has simplified the process for installing the Exchange Server product, and Exchange Server 2003 is the easiest-to-install Exchange version to date. However, it's important to understand the steps leading to a successful installation so that any appropriate planning or preparation is done prior to the live installation. Plus, because Exchange Server 2003 includes many new functions that extend beyond basic e-mail messaging and calendaring, getting the first Exchange 2003 server installed properly sets the foundation for a successful enterprise rollout of the Exchange messaging system. This sample book chapter will help you get your head screwed-on straight.
Windows Pane Relief: Picking Up The Pieces with Disk Defragmenters
Oct 28, 2005
Disk defragmenters are little understood and about as glamorous as taking out the trash. However, just like taking out the trash, disk defragementation is something you've got to do — or you'll drown in your own waste.
Open Source Versus Commercial Software: Why Proprietary Software is Here to Stay
Oct 14, 2005
Although open source software comes with lofty ambitions, some developers worry that the model just doesn't present a practical plan for the future of the software industry. Shawn Shell argues that proprietary software is here to stay — for a lot of good reasons.
Two-Factor Authentication in Windows
Oct 6, 2005
Simple passwords aren't good enough any more, as the flood of stories about phishing, fraud, and compromised accounts by the millions demonstrate. The Next Big Thing in computer security is two-factor authentication and, like it or not, you're probably going to be dealing with it in the next year or so. But two-factor authentication is a concept, not a product, and how it's implemented is critical to its success.
Universal Group Membership Caching: Lessons Learned the Hard Way
Sep 30, 2005
Kurt Hudson did a bit of experimenting with the Universal Group Membership Caching feature of Windows Server 2003 Active Directory. He found some surprises (including results that seem to contradict statements he found in Microsoft TechNet documentation), and shares them in this article.
Active Directory Solutions for Linux
Sep 16, 2005
Need your Windows and UNIX computer systems to talk together? Sure you do. Fortunately, as Jason Perlow explains, a number of solutions let you link Linux systems with Active Directory. His opinionated overview will save you time and trouble.
Alternate Data Streams: Threat or Menace?
Sep 16, 2005
By now, you're probably aware of how easy it is to accidentally leave metadata in your Microsoft Word documents, offending or amusing recipients who can easily uncover your mistakes. Did you also know that bad guys might be helping you to even more embarrassment (or danger), by using the alternate data streams (ADS) capability of Windows NTFS to hook warez, pornography, or even hacker's tools to your innocent files?
Setting Up a Name Server and Hosting Web Sites with Windows Server 2003
Sep 2, 2005
Learn the trade secrets of becoming your own full-fledged Web hosting service. Jesse Smith shows the steps in setting up a name server and hosting Web sites with Windows Server 2003.
Setting Up a Wireless Connection, or How to Check Your Email in a Coffee Shop
Sep 2, 2005
Let's face it: wires create clutter and nobody wants to stay tethered to the wall. Cordless phones were just the beginning. Find out how to set up a wireless internet connection for your Windows XP laptop in this chapter.
Exploring ISA Server 2004 Tools and Concepts
Aug 26, 2005
This chapter covers the high-level details of each portion of the ISA Management Console, with emphasis placed on introducing ISA administrators to the tools available to make their lives easier.
The Basics of Rootkits: Leave No Trace
Aug 26, 2005
A rootkit is a set of programs and code that allows a permanent or consistent, undetectable presence on a computer that allows access at the most basic level to a computer's function. This chapter introduces rootkits and their use, as well as how to detect and eliminate them.

<< < Prev Page 2 3 4 5 6 Next >