- Resolving User SIDs
- Sep 2, 2001
- All security hinges on one central idea, that there is a user to whom you want to either grant or deny access. New Riders' author and Perl programming expert Dave Roth explains what security identifiers are and how to map SIDs to user accounts.
|
- Samba and the Infamous Primary Domain Controller Support
- Oct 4, 2000
- If you find yourself having to maintain Windows NT clients on your network and you also run Samba servers, the question is bound to come up: "Can Samba act as a primary domain controller (PDC) for my Windows NT 4.0 clients?" Samba expert Jerry Carter ...
|
- Samba and the Lightweight Directory Access Protocol (LDAP)
- Oct 4, 2000
- "Can Samba use LDAP, and if so, how do I configure it?" Samba expert Jerry Carter sheds light on this question in his latest article on the latest version of Samba.
|
- Samba, Windows 2000, Kerberos, and Active Directory
- Oct 4, 2000
- Samba expert Jerry Carter looks at the issues surrounding the integration of Samba with Windows 2000 and what paths may lie ahead.
|
- Saving Your Stuff
- Nov 1, 2001
- sample_chapter
|
- Scripting DNS
- Oct 1, 2000
- In the second installment of our seven-part series on scripting in Windows 2000 Active Directory, we look at installing and configuring Domain Name Services by using two different kinds of scripts.
|
- Scripting in Windows 2000 Active Directory
- Oct 1, 2000
- Active Directory expert Jim Hudson explores different ways to use scripting in Active Directory.
|
- Scripting the Computer Name
- Dec 13, 2000
- In many deployments, companies use the BIOS service tag or asset tag as part of the naming algorithm. Unfortunately, the out-of-the-box naming mechanisms don't provide for this type of naming standard. To work around the limited options, Windows 2000 ...
|
- Scripting Using IADSTools
- Oct 4, 2000
- In the final installment of our seven-part series on AD scripting, we will look at the functionality provided by a dynamic link library installed by the Windows 2000 Support Tools.
|
- Security Issues and Solutions – Part 1: Anthrax and Other Terrorist Threats
- Feb 15, 2002
- This first of a six-part series of articles on security issues by Robert Williams focuses on computer system security issues and solutions, including the threat of anthrax-based terrorism.
|
- Security Issues and Solutions Part 2 - System Lockdown in Windows 2000
- Feb 22, 2002
- How do you secure your Windows 2000 system? This second of a six-part series on security issues by Robert Williams examines computer system lockout issues and recommendations.
|
- Security Issues and Solutions Part 3: Security Lockdown Options Continued
- Mar 1, 2002
- This third in a six-part series on security issues by Robert Williams continues to examine issues and recommendations associated with computer system security lockdown.
|
- Security Issues and Solutions Part 4: Physical Security and Auditing
- Mar 8, 2002
- This fourth article in a six-part series on security issues by Robert Williams examines physical computer security and the use of auditing tools to monitor and prevent breaches.
|
- Security Issues and Solutions Part 5: Network Services and Architecture
- Mar 15, 2002
- This fifth article in a six-part series on security issues by Robert Williams examines network services-related security issues.
|
- Sharing Windows Permissions in Depth, Part 1
- Apr 14, 2009
- Eric Geier shows you how you can use advanced sharing to help better secure your files on your Windows network.
|
- Sharing Windows Permissions in Depth, Part 2
- Apr 20, 2009
- Eric Geier continues showing you how to use advanced sharing to better secure your files on the network.
|
- Sharing Windows Permissions in Depth, Part 3
- Apr 27, 2009
- Eric Geier continues his discussion on sharing permissions and settings.
|
- Sizing Your NT RAID ARRAY
- Jan 15, 2001
- This article by Windows NT/2000 tuning and sizing expert Curt Aubley provides insight into how to size and detect bottlenecks in your NT Server RAID arrays.
|
- Sniffer Proof Your Network - Protecting the Active Directory
- Feb 22, 2002
- Wouldn't it be nice if there was some utility that would sit in the background and automatically negotiate secure, encrypted sessions whenever it was necessary? There is! Roberta Bragg introduces you to IPSec policies in this article.
|
- Some Do's and Don'ts for Accessing the Global Catalog
- Oct 5, 2001
- This article introduces you to a real-life solution provided to Henderson Global Investors by KPMG Consulting to achieve a fast and reliable mechanism for retrieving user information.
|