Security checklists are valuable—but only if you use them. Follow along on Microsoft’s list and harden a server.
- By Roberta Bragg
- 09/01/2002
If you want to do IT security because it’s “hot” right now, or because you think that’s where the money is, forget it. If you truly love the field, read on.
- By Roberta Bragg
- 08/01/2002
Active Directory’s trust model makes administration easier than NT, but also introduces the potential to do more damage. Make sure your administrators are trustworthy.
- By Roberta Bragg
- 07/01/2002
Public Key Infrastructure is at the core of most e-commerce and, therefore, must be done properly. You can do it yourself—or turn to some outside pros. Which option is for you?
- By Roberta Bragg
- 06/01/2002
Suspicious of XP’s security features? As you spend quality time together, you’ll get to see its good points—maybe even become friends.
- By Roberta Bragg
- 05/01/2002
It’s been a long time coming, but it’s nearly here. Key recovery in .NET server promises to improve your Public Key Infrastructure.
- By Roberta Bragg
- 04/01/2002
Time spent with network security auditors pointed out to Roberta the most common weaknesses in companies. How does yours stack up to her list?
- By Roberta Bragg
- 03/01/2002
Writing scripts for remote computer management can save man-hours and shoe leather. But like any part of Windows, it has to be properly secured, or you risk opening up your network to the bad guys.
- By Roberta Bragg
- 02/01/2002
The ISO17799 is a group of policies that would be well worth your time to get to know.
- By Roberta Bragg
- 01/01/2002
When it comes to security in .NET’s Web services world, it’s going to be vital to know how each application plays its part.
- By Roberta Bragg
- 12/01/2001
Nobody likes uninvited guests—and when they invade your online conferences, the consequences can be deadly. Exchange Conferencing Server can help you keep the riff-raff at bay.
- By Roberta Bragg
- 11/01/2001
Understanding the ins and outs of AD and object permissions is no simple task, but your efforts can help avoid catastrophe.
- By Roberta Bragg
- 10/01/2001
Internet Information Server hacks are legendary, including
many into Microsoft itself. Here's how to keep your Web
sites from becoming famous for the wrong reasons.
- By Roberta Bragg
- 08/01/2001
As a company grows, so does its need for fast, secure connectivity. Enter ISA Server, a caching firewall that also serves as a nifty VPN endpoint.
- By Roberta Bragg
- 07/01/2001
Like any security decision, choosing the right
equipment and software isn’t something you should
take lightly. If you’re looking for a “plug-and-go”
firewall for your small business—along with the
ability to set up a solid VPN—SonicWALL can fulfill
that need.
- By Roberta Bragg
- 06/01/2001