- Security Issues and Solutions – Part 1: Anthrax and Other Terrorist Threats
- Feb 15, 2002
- This first of a six-part series of articles on security issues by Robert Williams focuses on computer system security issues and solutions, including the threat of anthrax-based terrorism.
|
- Understanding the Internet Information Server Situation
- Feb 15, 2002
- Let author, columnist, and long-time Windows watcher Ed Tittel explain why IIS’s many security problems signal neither the end of civilization as we know it, nor must they necessarily force too many organizations to jump ship to an alternative Web server.
|
- Anyone But Microsoft
- Feb 8, 2002
- For a small but growing sector of the PC marketplace, seeking alternatives to Microsoft operating systems and software has become something of a Holy Grail. Columnist and author Ed Tittel will examine some of the options available, including some compromise approaches, as he explains necessary pieces and parts.
|
- SureSync Part 1: Replicating Data with SureSync
- Feb 8, 2002
- What are the business advantages of SureSync? In this first of a three-part series, Rob Hawthorne shows you how it can fit within your organization.
|
- SureSync Part 2: Installing and Configuring SureSync to Run As a Service
- Feb 8, 2002
- Do you want SureSync to run as a service? In this second of a three-part series, Rob Hawthorne discusses its installation and configuration.
|
- SureSync Part 3: Setting Up Your First SureSync Relation (Mirroring)
- Feb 8, 2002
- In this third and final article on SureSync, expert Rob Hawthorne wraps up the discussion by detailing the setup of a Relation.
|
- Windows 2000 Services
- Feb 1, 2002
- This sample chapter from Windows 2000 Services explains what Windows 2000 Services are, discusses how they work, and provides an overview of the function of each service.
|
- Protecting the SAM with Syskey
- Jan 25, 2002
- Security expert Roberta Bragg describes the syskey command and shows you how to protect your Windows NT 4.0 system by using it..
|
- Windows 2000 DNS Clients and Servers
- Jan 4, 2002
- This sample chapter will provide an overview of the different ways you can configure the DNS service in Windows 2000 and the impact that has on the installation.
|
- Exploring Windows XP's Interface
- Dec 28, 2001
- John Mueller explores Windows XP by looking at the most important tool in the Windows user interface, Windows Explorer, and discussing how to manage and customize the user interface.
|
- Fixing Windows
- Dec 21, 2001
- When restoring a Windows PC to reliable operation, the key is to do so in the least amount of wasted time. Pete Moulton helps you determine the source of the trouble and take appropriate action to fix Windows in the shortest possible time.
|
- Managing Files in Windows XP Home Edition
- Dec 21, 2001
- This sample chapter from TechTV: Microsoft Windows XP for Home Users explains Windows XP's new method of file management.
|
- Saving Your Stuff
- Nov 1, 2001
- sample_chapter
|
- A File as Seen from WMI
- Oct 26, 2001
- In this article, Matthew Lavy gives a simple taste of the world of WMI by showing how you can use it to investigate and manipulate a file in an NTFS filesystem.
|
- The New XP GUI Phooey, or How I Learned to Stop Worrying and Love the Bomb
- Oct 26, 2001
- Curious about how Windows XP looks and feels? Ed Tittel gives you the low-down.
|
- Designing Security for a Microsoft Windows 2000 Directory
- Oct 11, 2001
- Windows 2000 Security Expert Roberta Bragg discusses how to design security for a Windows 2000 Directory.
|
- MMS from 10,000 Feet!
- Oct 5, 2001
- In this article, you learn how Microsoft Metadirectory Services (MMS) can help you manage multiple directories within your organization.
|
- Some Do's and Don'ts for Accessing the Global Catalog
- Oct 5, 2001
- This article introduces you to a real-life solution provided to Henderson Global Investors by KPMG Consulting to achieve a fast and reliable mechanism for retrieving user information.
|
- Fourteen privileges that can be abused in Windows 2000, Part 2
- Sep 28, 2001
- In the second of a two-part series, Roberta Bragg continues to focus the attention of auditors, systems administrators, security administrators, security analysts, etc on critical system privileges.
|
- Planning and Deploying Clients
- Sep 28, 2001
- This sample chapter covers the Microsoft-specified objectives for the Deploying, Configuring, and Troubleshooting the Client Computer section of the Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2000 exam.
|