In-Depth Features


Five Layers of Defense

You can adapt the logical perimeter network design to suit your own access requirements, but most common requirements are met with this design.

Getting Started With PKI

Computer networks allow people to share resources, but computer security prevents access to resources. How to decide if you need PKI, and a step-by-step guide to installing PKI on your servers.

Finding a Home for Application Security

Traffic-management switches are quickly becoming easier to deploy and support, with greater intelligence to repel more sophisticated application attacks

Outsourced Worker: How Do You Stack Up?

Chances are, you work for a company that’s involved in outsourcing in some form. The question you need to answer for yourself is whether that’s such a bad thing.

Speed Up Your ASP.NET Pages

Users will notice how much faster your Web pages and sites run when you apply these seven ASP.NET tips to your coding.

Bursting the Pop-Up Bubble

Two tools that stop popups dead in their tracks

The Project from Hell

Three continents, incompetent management and an impossible deadline is a case study in how to NOT do a major upgrade.

File Replication Service: User-Friendly at Last

The File Replication Service (FRS) has a justifiably bad reputation for bugginess and indecipherable logs. But recent changes from Redmond make it worth another look.

Books: Elevate VB.NET With Power Coding

Visual Basic .NET Power Coding offers concise discussion and helpful examples of VB.NET's most complex topics, such as delegates, threading, remoting, Reflection, and security.

Build Menus Dynamically

Enhance your UIs' flexibility with dynamic coding that uses runtime conditions to determine menu behavior.

Group Policy Strategy and Tactics

Group policy is constantly evolving and has new functionality within Windows Server 2003. Here’s some basic training on what it can do.

Tame Your Storage with NAS

Buying new servers and more direct-attached disks solves short-term storage issues but creates a bigger problem—the storage management nightmare. Network attached storage, which separates disks from servers, is one answer. We evaluate three top NAS solutions running Windows Storage Server.

MCSE Specializations

Systems engineer premier specialist titles for those whose job roles focus on messaging, security.

MCSA Specializations

Sysadmin titles for those whose jobs focus on messaging, security.

Do You Need Multiple Forests?

One forest is easier to manage than multiple forests, but it might not be secure enough.

Longhorn: The Base Operating System

The complex model for Longhorn's base operating system illustrates how Microsoft has organized it, as well as where any piece you're interested in fits into the larger view.

Automate Your Security

Many security-related tasks can be tedious—and, therefore, overlooked. Using these 10 scripts can make your life easier, while simultaneously locking down your network.

The Mirror Crack’d

This author figured that mirroring his e-mail drive was solid insurance against data loss. That theory was tested to the max when a drive failed.

Indigo: The Longhorn Communications Layer

Indigo is the core for communication in the next generation of Windows, code-named Longhorn. This model of its architecture gives you a good sense of what to expect from it.

Get a Grip on Longhorn

The upcoming Windows version's refactored API and new graphics-presentation model, storage subsystem, and messaging services will bring development opportunities -- and challenges.

Subscribe on YouTube