- Understanding Active Directory, Part V
- May 31, 2002
- This fifth article in a six-part series on Active Directory issues examines the open standards and naming conventions embraced by Active Directory.
|
- Understanding Active Directory, Part VI
- Jun 7, 2002
- The sixth article in this series on Active Directory issues examines API operations, administrative security, and trust relationships.
|
- Understanding Aging and Scavenging features in Windows 2000 DNS
- Apr 13, 2001
- Learn about aging and scavenging features of Windows 2000 DNS servers and introduce you to a new terminology.
|
- Understanding the Internet Information Server Situation
- Feb 15, 2002
- Let author, columnist, and long-time Windows watcher Ed Tittel explain why IIS’s many security problems signal neither the end of civilization as we know it, nor must they necessarily force too many organizations to jump ship to an alternative Web server.
|
- User Data Migration
- Dec 13, 2000
- Migrating to Windows 2000 can be a tricky business when it comes to user data. A wipe-and-load process has obvious risks for data loss, as does the manual process of copying local data files to the network. Fortunately, a product on the market can minimize ...
|
- Using ADSI scripting
- Oct 4, 2000
- In the fifth installment of our seven-part series on scripting in Windows 2000 Active Directory, we will use ADSI to create users and populate properties of their object.
|
- Using EFS to Encrypt Files Across the Network
- Oct 4, 2000
- Windows 2000 expert Bill Boswell discusses how to use the Encrypting File System to encrypt files across the network on file servers.
|
- Using Encrypted File System in Production
- Oct 1, 2000
- Windows 2000 expert Bill Boswell continues his discussion of Encrypted File System, specifically how to use EFS in Production.
|
- Using HWMonitor to Track Windows System Temps and Health
- Feb 3, 2009
- Ed Tittel explains how the free Windows utility HWMonitor can help to prevent overheating.
|
- Using WSH Scripts with the Windows Management Interface
- Jun 3, 2005
- Network monitors — who needs them? Learn how to use the Windows Management Interface (WMI) to monitor hardware and services.
|
- VBS Logon Scripts
- Oct 1, 2000
- In the third installment of our seven-part series on scripting in Windows 2000 Active Directory, we look at writing a logon script using Visual Basic scripting.
|
- VBS Logon Scripts, Part Two
- Oct 1, 2000
- In the previous article, we wrote a VBS logon script. In the fourth installment of our seven-part series on scripting in Windows 2000 Active Directory, we will attach that logon script to an organizational unit. This will cause every user in the OU to ...
|
- VPNs: Dial "T" for Troubleshooting
- Nov 13, 2003
- Rebecca Rohan continues her discussion of how to create a virtual private network without having a virtual nervous breakdown. Just because the thing is built, that doesn't mean that you're done: Next comes a little phase called "troubleshooting."
|
- Web Computing with MetaFrame
- Jun 22, 2000
- Windows NT, Terminal Server Edition (TSE) is an extension to NT Server that allows applications to run one centralized location while being presented on multiple client devices. Designed to decrease total cost of ownership, when used in conjunction ...
|
- What is a Microsoft Cluster?
- Mar 1, 2002
- Let author and columnist Joseph M. Lamb guide you through the various cluster types, and how you can implement clusters that best serve the needs of your application using Microsoft's Windows 2000 Advanced Server.
|
- What to Look for When Selecting a Scalable RAID Array
- Jan 15, 2001
- This article by Windows NT/2000 tuning and sizing expert Curt Aubley explores key items that you should consider when selecting RAID array subsystems for your servers.
|
- Winbind: Windows NT 4 Domain Authentication for Unix/Linux Services
- Oct 1, 2000
- The Winbind system allows sites that use Windows NT domains to deploy Unix/Linux systems on desktops or in the server room and still be capable of utilizing their existing set of user accounts. In this article, Samba expert Jerry Carter walks you through ...
|
- Windows 2000 and the Encrypting File System
- Oct 1, 2000
- Windows 2000 expert Bill Boswell walks you through an introduction to Windows 2000's Encrypting File System and data recovery agents.
|
- Windows 2000 Architecture
- Apr 13, 2001
- In this article, Windows 2000 architecture is explained from a high-level, block diagram approach. You get an overview of Windows 2000 architecture without oversimplification.
|
- Windows 2000 Deployment Guide Part 24: Testing, Testing, 1, 2, 3…
- Feb 26, 2001
- Deploying Microsoft Windows 2000 in an enterprise is a large task with many associated risks and expenses. In this installment, author Dale Holmes discusses the use of a test lab to mitigate the risks and reduce the TCO associated with your Microsoft ...
|