A step-by-step guide to help you deploy IIS and default Web sites using PowerShell in less than five minutes!
- By Jason Helmick
Mary Jo Foley on whether Microsoft can/will turn up the speed in which it delivers new updates.
- By Mary Jo Foley
Greg Shields lays out the new and improved features to look for in Windows Server 2012's Active Directory.
- By Greg Shields
Many organizations are slowly phasing out the traditional and clunky IPSec VPN for newer SSL VPNs. Here's the pros and cons.
Readers respond to a recent IT Decision Maker Blog post, "Windows Server 2012: IT Pros Will Need WS-MAN Remoting Skills (and Not Just for PowerShell)."
- By Readers of Redmond magazine
Self destruct sequence initiated.
A somewhat good idea receives a terrible execution.
A cloud-based server means a hacker can get to it from any location.
Brien discusses some of the changes Microsoft is going through with its products' latest lifecycle and provides some suggestions for what he would like to see.
If you lie on the Internet, expect to be called out quickly.
Will Microsoft's Surface help to bring in good security practices into the tablet world?
Windows 8 on mobile devices will be managed with Microsoft's cloud-based management tool. Here's why that's a bad thing.
Intune 3.0 is now available for download.
Four of the seven bulletins address RCE flaws.
Hackers could access your database in seconds.
Microsoft may finally solve a major Windows admin headache with this addition to the Microsoft Desktop Optimization package.
- By Greg Shields
Beyond the flexibility and costs savings of cloud computing are certain tactical advantages like automated provisioning and encrypted storage. This quick primer by cloud security expert Vic Winkler will give you the pros and cons of each.
Stuxnet was reportedly created by the U.S. and Israel.
And your eHarmony password accounts, while you're at it.
Unauthentic certificates are to blame.