In-Depth Features


All That JAAS

JAAS is based on the Pluggable Authentication Modules model and provides authentication and authorization services. Check out its many security benefits for Java applications.

Books: Use ADO.NET in Your C# Apps

Learn how to turn ADO.NET classes into tools for constructing software using C# in Mahesh Chand's book, A Programmer's Guide to ADO.NET in C#.

Automate Exception Logging

You can automate exception logging with one line of client code, control it through an App.config file without recompiling, and use custom publishers to craft cool logging tools.

4 Dirt-Cheap Workgroup Servers Put to the Test

You can buy a lot for $1,000 these days. We test four bargain-basement boxes and tell you what to expect.

Enhance UI Performance in WinForms

You can improve your UI in several ways, using the .NET Framework's built-in multithreading and asynchronous execution mechanisms.

Manipulate Text With Regular Expressions

Learn whether a given date is greater than or equal to a predefined date and how to add to the Expression Editor dialog box's list of Standard Expressions.

SBS 2003: Your Small Business Operating System

As part of the June cover feature, "4 Dirt-Cheap Workgroup Servers," Microsoft Small Business Server 2003 might interest those small and medium businesses.

Add VROOM with VLANs

Virtual LANs are a good way to speed up your network by grouping users and computers into logical, rather than physical, units. Here’s how they work.

Backing Up Small Business Server

As part of the June cover feature, "4 Dirt-Cheap Workgroup Servers," Microsoft Small Business Server 2003 also comes with a Backup Configuration Wizard. Here are two add-on products that offer help.

Books: Write Customized .NET Add-Ins

Writing Add-Ins for Visual Studio .NET helps you write an add-in customized to your needs. Les Smith walks you through the wizard and shows you how to develop your UI, trap IDE events, manipulate controls, and migrate your VB6 add-ins to the new platform.

Lock Down Your Handheld Devices

As the capabilities of handheld devices have grown, so have the threats.

Group Policy DOs and DON’Ts

Group policy can make your life as an administrator blissful or stressful. Learn from one expert’s experiences what works with group policies, and what doesn’t.

Defending Against Layer 8

Remember the 8th layer of the OSI networking stack: humans. System administrators must educate themselves and their users about social engineering practices to prevent attacks.

Beyond the Firewall

Network security is more important than ever. But network protection must move beyond the firewall. What new tools are on the horizon to help you with your combat strategy?

Book Review: Delve Inside C#

The C# Programming Language is a reference book that will benefit both beginners and veterans alike. Topics include exceptions, unsafe code, generics, anonymous methods, iterators, and partial types.

Enlist ADO.NET Connections in Pooled Objects Manually

You can boost performance in server-side apps by using COM+ pooled objects to cache resources. Be sure to enlist the connection manually each time the object pool picks up the object.

Readers Review Exchange Server 2003

In an entirely new approach to product reviews, 13 loyal MCP Magazine readers detail their experiences running Exchange 2003 in production environments. 

Implementing a Low-Budget Disaster Recovery Plan

How to prepare a small or medium business for disaster without overextending its already tight budget or overwhelming management with the details of an in-depth proposal.

10 DNS Errors That Will Kill Your Network

DNS is the foundation the house of Active Directory is built upon. If DNS doesn’t work, neither will your Windows network. Here are the 10 most common DNS errors—and how you can avoid them.

Activate Windows Impersonation Selectively

Activate Windows impersonation selectively, determine the update order of DataTables at run time, guarantee the delivery order of asynchronous delegates, and more.

Subscribe on YouTube