Columns


Mix It Up: Security in an NT/Unix Enterprise

Gaining file accessibility in an integrated environment doesn’t mean you give up authentication, permissions, or accountability. These products and approaches make it happen.

Getting Along with Difficult People

You’re bound to encounter them at some point in your career. Here are some survival tips for dealing with the tough ones in a professional manner.

Merry OS, Charlie Brown?

Hold your horses. Linux isn't an NT killer just yet.

Managing with Profiles and Policies

Are your users out of control? Try using profiles and system policies to manipulate the Windows NT Registry and regain control of your network.

Geeks with Guns

Knowing how secure the most secure operations are—and what products those organizations use to achieve it—can help you establish your own criteria.

Does Your Company Rate?

Many more companies are beginning to understand what it takes to develop and retain skilled IT workers.

Certifiable Winners

Investing in certification is a winning business proposition for employees, prospective clients, and companies as a whole.

Separated at Birth? MCSE and MBA

Beyond the obvious differences, these two designations have uncanny similarities. Harry ponders the MCSE vs. MBA question and asks, “Why not get both?”

Trial by Ordeal

What will the Microsoft trial mean to those whose livelihoods depend on Microsoft products?

Safe Messaging with Exchange

You know in the back of your mind that not every message you send or receive is absolutely safe. Isn’t it time you figured out how to protect your enterprise e-mail system?

Get Ready for SQL Server 7.0

Prove your credentials with the new MCDBA premium title.

Delay Away

Perhaps the delay of Windows 2000 is not such a bad thing, after all.

Secrets of Successful Help Desks

As eyes are the windows of the soul, so help desks are the windows of IS. Here’s how to keep your help desk in top condition.

Y2K: Setting the Standard for Care

As a developer, do you understand the legal meaning behind this concept? If you don't, it simply means you haven't been sued yet.

System Policies and the Windows NT Registry

Before building system policies within Windows NT—especially if you’re going to migrate to Windows 2000—you must first understand the Registry’s structure and how it can be modified.

Good Gravy!

While the din of giggles following the NT 5.0 name change distracts everyone, Em remembers to ask, "Where's the product?"

Alphabet Soup

This secret document uncovers the new titles we can expect from Microsoft in coming months.

Survive Your Own Audit

A well-designed internal security audit can help you uncover soft spots in your system before an outsider points them out. Put on a trench coat, grab a clipboard, and start roaming the halls.

Making MCTs

To supply IT’s demand for qualified professionals, Microsoft is committed to improving its training program for trainers.

Windows NT Best Practices

From disk subsystems to file formats and permissions, here are some best practices to follow when implementing Windows NT.

Subscribe on YouTube