In-Depth Features


Readers Review Exchange Server 2003

In an entirely new approach to product reviews, 13 loyal MCP Magazine readers detail their experiences running Exchange 2003 in production environments. 

Implementing a Low-Budget Disaster Recovery Plan

How to prepare a small or medium business for disaster without overextending its already tight budget or overwhelming management with the details of an in-depth proposal.

10 DNS Errors That Will Kill Your Network

DNS is the foundation the house of Active Directory is built upon. If DNS doesn’t work, neither will your Windows network. Here are the 10 most common DNS errors—and how you can avoid them.

Activate Windows Impersonation Selectively

Activate Windows impersonation selectively, determine the update order of DataTables at run time, guarantee the delivery order of asynchronous delegates, and more.

Recalculate VS.NET Project Dependencies Automatically

You can build a macro that recalculates and sets assembly dependencies upon request with the VS.NET automation model, even if your solution uses file references.

Windows Server 2003 Gains Traction

The Windows Server 2003 rollout is rapid, according to a new survey. Key drivers are security, Active Directory and Exchange 2003.

Thin Clients, Fat Heads

This business owner’s thin-client Windows network was impregnable. Or so he thought, until he met Bob…

Souping Up Windows 2003 Migrations

Five tools that promise to speed and ease Windows 2003 file and print migrations. Which one is the very best?

Use InfoPath With VS.NET 2003

InfoPath SP1 and the new .NET 2003 Toolkit let you implement business logic behind InfoPath forms with managed VB.NET or C# code instead of JScript or VBScript event handlers.

Books: Develop Web Solutions With VB.NET

VB.NET offers an improved palette for creating Web-based software. Programming the Web with Visual Basic .NET is a complete reference book that gives you all the info you need.

Create a .NET-J2EE Shared Database

Create a shared database to provide interoperability between .NET and J2EE platforms, then extend it with a notification level between platforms.

The Mystery of the Event Logs

Knowing what’s in your Event Logs is a key to knowing what your servers are doing. Here’s how to make sense of them.

Five Layers of Defense

You can adapt the logical perimeter network design to suit your own access requirements, but most common requirements are met with this design.

Getting Started With PKI

Computer networks allow people to share resources, but computer security prevents access to resources. How to decide if you need PKI, and a step-by-step guide to installing PKI on your servers.

Finding a Home for Application Security

Traffic-management switches are quickly becoming easier to deploy and support, with greater intelligence to repel more sophisticated application attacks

Outsourced Worker: How Do You Stack Up?

Chances are, you work for a company that’s involved in outsourcing in some form. The question you need to answer for yourself is whether that’s such a bad thing.

Speed Up Your ASP.NET Pages

Users will notice how much faster your Web pages and sites run when you apply these seven ASP.NET tips to your coding.

Securing IIS

How to move the default directories created by IIS from the system drive. Plus, methods to make FTP more secure.

Books: Master WinForms Programming

With the ease of deployment for .NET applications, WinForms are once again a viable solution for large deployment environments. If you're considering WinForm programming, Windows Forms Programming in Visual Basic .NET is a must-have.

Transfer Files Over the Internet

Use FTP or HTTP POST to transfer files over the Internet with .NET. Also learn how to secure a database Connection string.

Subscribe on YouTube