JAAS is based on the Pluggable Authentication Modules model and provides authentication and authorization services. Check out its many security benefits for Java applications.
Learn how to turn ADO.NET classes into tools for constructing software using C# in Mahesh Chand's book, A Programmer's Guide to ADO.NET in C#.
- By Joel Semeniuk
- 06/01/2004
You can automate exception logging with one line of client code, control it through an App.config file without recompiling, and use custom publishers to craft cool logging tools.
You can buy a lot for $1,000 these days. We test four bargain-basement boxes and tell you what to expect.
- By Mike Gunderloy
- 06/01/2004
You can improve your UI in several ways, using the .NET Framework's built-in multithreading and asynchronous execution mechanisms.
Learn whether a given date is greater than or equal to a predefined date and how to add to the Expression Editor dialog box's list of Standard Expressions.
As part of the June cover feature, "4 Dirt-Cheap Workgroup Servers," Microsoft Small Business Server 2003 might interest those small and medium businesses.
- By Mike Gunderloy
- 06/01/2004
Virtual LANs are a good way to speed up your network by grouping users and
computers into logical, rather than physical, units. Here’s how they work.
- By Laura E. Hunter
- 06/01/2004
As part of the June cover feature, "4 Dirt-Cheap Workgroup Servers," Microsoft Small Business Server 2003 also comes with a Backup Configuration Wizard. Here are two add-on products that offer help.
- By Mike Gunderloy
- 06/01/2004
Writing Add-Ins for Visual Studio .NET helps you write an add-in customized to your needs. Les Smith walks you through the wizard and shows you how to develop your UI, trap IDE events, manipulate controls, and migrate your VB6 add-ins to the new platform.
- By Mark Collins-Cope
- 06/01/2004
As the capabilities of handheld devices have grown, so have the threats.
- By Jonathan Gossels and Dick Mackey
- 06/01/2004
Group policy can make your life as an administrator blissful or stressful.
Learn from one expert’s experiences what works with group policies, and what doesn’t.
- By Jeremy Moskowitz
- 06/01/2004
Remember the 8th layer of the OSI networking stack: humans. System administrators must educate themselves and their users about social engineering practices to prevent attacks.
- By Danielle Ruest and Nelson Ruest
- 05/27/2004
Network security is more important than ever. But network protection must move beyond the firewall. What new tools are on the horizon to help you with your combat strategy?
- By Danielle Ruest and Nelson Ruest
- 05/25/2004
The C# Programming Language is a reference book that will benefit both beginners and veterans alike. Topics include exceptions, unsafe code, generics, anonymous methods, iterators, and partial types.
- By Mark Collins-Cope
- 05/01/2004
You can boost performance in server-side apps by using COM+ pooled objects to cache resources. Be sure to enlist the connection manually each time the object pool picks up the object.
- By Enrico Sabbadin
- 05/01/2004
In an entirely new approach to product reviews, 13 loyal MCP Magazine readers detail their experiences running Exchange 2003 in production environments.
How to prepare a small or medium business for disaster without overextending its already tight budget or overwhelming management with the details of an in-depth proposal.
- By Daniel Curry
- 05/01/2004
DNS is the foundation the house of Active Directory is built upon. If DNS doesn’t work, neither will your Windows network. Here are the 10 most common DNS errors—and how you can avoid them.
- By Bill Boswell
- 05/01/2004
Activate Windows impersonation selectively, determine the update order of DataTables at run time, guarantee the delivery order of asynchronous delegates, and more.
- By Enrico Sabbadin
- 05/01/2004