Good communication with fellow employees is key to getting work done; in this situation, it's the key to remaining employed.
- By Steve Crandall
- 10/01/2002
A back-to-basics look at subnetting.
- By Bill Heldman
- 09/01/2002
Security checklists are valuable—but only if you use them. Follow along on Microsoft’s list and harden a server.
- By Roberta Bragg
- 09/01/2002
A review of CBT Nuggets' video-based MCSE training.
- By James Carrion
- 09/01/2002
Smart cards can dramatically enhance your organization’s security. Here’s what you need to know.
- By Bill Boswell
- 09/01/2002
Is it better to specialize or be a jack-of-all-trades?
- By Steve Crandall
- 09/01/2002
Hate it or hate it more, product activation is a necessary evil in the XP world. Here’s how to ease the pain.
- By Chris Brooke
- 09/01/2002
Influencers who want bigger decision-making responsibilities, smart cards that are only as smart as the implementers, and a lucky find.
- By MCP Magazine Readers
- 09/01/2002
A controlled security challenge still provides valuable lessons.
- By Dian Schaffhauser
- 09/01/2002
In which Auntie rails at the sorry state of software—and what we can do about it.
Maybe they already broke up the company and we didn’t notice.
Moving beyond static IP addresses makes our intrepid script router-friendly and takes you to the great outdoors.
- By Chris Brooke
- 08/01/2002
A reader who "followed the rules" is still having a tough time finding a job.
- By Greg Neilson
- 08/01/2002
If you want to do IT security because it’s “hot” right now, or because you think that’s where the money is, forget it. If you truly love the field, read on.
- By Roberta Bragg
- 08/01/2002
The Distributed file system (Dfs), when properly implemented, can help your users get where they want to go. But its usefulness doesn’t stop there.
- By Bill Boswell
- 08/01/2002
"Windowsville" residents chime in on the "which OS is more secure" argument; readers debate Microsoft's longevity.
- By MCP Magazine Readers
- 08/01/2002
Sometimes you really have to ponder the meaning behind the numbers.
- By Dian Schaffhauser
- 08/01/2002
You're no security expert, but you should keep an eye on your perimeter network. Implementing intrusion detection and antivirus measures can help.
- By Bill Heldman
- 08/01/2002
Active Directory’s trust model makes administration easier than NT, but also introduces the potential to do more damage. Make sure your administrators are trustworthy.
- By Roberta Bragg
- 07/01/2002
Itanium servers, which utilize 64-bit architecture, are ready for the datacenter. This guide can help you decide whether your company should consider adding these high-muscle machines.
- By Bill Boswell
- 07/01/2002