Home > Articles > Home & Office Computing > Microsoft Windows Server

Microsoft Windows Server

182 Items

Sort by Date | Title

Resolving User SIDs
Sep 2, 2001
All security hinges on one central idea, that there is a user to whom you want to either grant or deny access. New Riders' author and Perl programming expert Dave Roth explains what security identifiers are and how to map SIDs to user accounts.
Samba and the Infamous Primary Domain Controller Support
Oct 4, 2000
If you find yourself having to maintain Windows NT clients on your network and you also run Samba servers, the question is bound to come up: "Can Samba act as a primary domain controller (PDC) for my Windows NT 4.0 clients?" Samba expert Jerry Carter ...
Samba and the Lightweight Directory Access Protocol (LDAP)
Oct 4, 2000
"Can Samba use LDAP, and if so, how do I configure it?" Samba expert Jerry Carter sheds light on this question in his latest article on the latest version of Samba.
Samba, Windows 2000, Kerberos, and Active Directory
Oct 4, 2000
Samba expert Jerry Carter looks at the issues surrounding the integration of Samba with Windows 2000 and what paths may lie ahead.
Saving Your Stuff
Nov 1, 2001
sample_chapter
Scripting DNS
Oct 1, 2000
In the second installment of our seven-part series on scripting in Windows 2000 Active Directory, we look at installing and configuring Domain Name Services by using two different kinds of scripts.
Scripting in Windows 2000 Active Directory
Oct 1, 2000
Active Directory expert Jim Hudson explores different ways to use scripting in Active Directory.
Scripting the Computer Name
Dec 13, 2000
In many deployments, companies use the BIOS service tag or asset tag as part of the naming algorithm. Unfortunately, the out-of-the-box naming mechanisms don't provide for this type of naming standard. To work around the limited options, Windows 2000 ...
Scripting Using IADSTools
Oct 4, 2000
In the final installment of our seven-part series on AD scripting, we will look at the functionality provided by a dynamic link library installed by the Windows 2000 Support Tools.
Security Issues and Solutions – Part 1: Anthrax and Other Terrorist Threats
Feb 15, 2002
This first of a six-part series of articles on security issues by Robert Williams focuses on computer system security issues and solutions, including the threat of anthrax-based terrorism.
Security Issues and Solutions Part 2 - System Lockdown in Windows 2000
Feb 22, 2002
How do you secure your Windows 2000 system? This second of a six-part series on security issues by Robert Williams examines computer system lockout issues and recommendations.
Security Issues and Solutions Part 3: Security Lockdown Options Continued
Mar 1, 2002
This third in a six-part series on security issues by Robert Williams continues to examine issues and recommendations associated with computer system security lockdown.
Security Issues and Solutions Part 4: Physical Security and Auditing
Mar 8, 2002
This fourth article in a six-part series on security issues by Robert Williams examines physical computer security and the use of auditing tools to monitor and prevent breaches.
Security Issues and Solutions Part 5: Network Services and Architecture
Mar 15, 2002
This fifth article in a six-part series on security issues by Robert Williams examines network services-related security issues.
Sharing Windows Permissions in Depth, Part 1
Apr 14, 2009
Eric Geier shows you how you can use advanced sharing to help better secure your files on your Windows network.
Sharing Windows Permissions in Depth, Part 2
Apr 20, 2009
Eric Geier continues showing you how to use advanced sharing to better secure your files on the network.
Sharing Windows Permissions in Depth, Part 3
Apr 27, 2009
Eric Geier continues his discussion on sharing permissions and settings.
Sizing Your NT RAID ARRAY
Jan 15, 2001
This article by Windows NT/2000 tuning and sizing expert Curt Aubley provides insight into how to size and detect bottlenecks in your NT Server RAID arrays.
Sniffer Proof Your Network - Protecting the Active Directory
Feb 22, 2002
Wouldn't it be nice if there was some utility that would sit in the background and automatically negotiate secure, encrypted sessions whenever it was necessary? There is! Roberta Bragg introduces you to IPSec policies in this article.
Some Do's and Don'ts for Accessing the Global Catalog
Oct 5, 2001
This article introduces you to a real-life solution provided to Henderson Global Investors by KPMG Consulting to achieve a fast and reliable mechanism for retrieving user information.

<< < Prev Page 4 5 6 7 8 Next >