DNS is the foundation the house of Active Directory is built upon. If DNS doesn’t work, neither will your Windows network. Here are the 10 most common DNS errors—and how you can avoid them.
- By Bill Boswell
- 05/01/2004
This business owner’s thin-client Windows network was impregnable. Or so he thought, until he met Bob…
These networks aren’t well known by many, yet they’re responsible for controlling much in our lives. And they’re not very secure.
- By Roberta Bragg
- 05/01/2004
MBSA offers much more than updates to your network.
Control of external connections made easier through Windows Firewall.
- By Roberta Bragg
- 04/28/2004
Healthy FRS means healthy Group Policy.
- By Roberta Bragg
- 04/26/2004
Run legacy apps without hitting the security barrier.
It takes two to make the security world go round.
- By Roberta Bragg
- 04/19/2004
- By Joe McKendrick
- 04/12/2004
Qualified MCSD candidates can take new security-based developer exams for free; exams set for April 21 beta testing.
- By Michael Domingo
- 04/12/2004
Specifics help build security.
- By Roberta Bragg
- 04/12/2004
Ports are a good way in, and often remain unchecked.
</i>MCP Magazine<i> asked Stephen Toulouse, security program manager, Microsoft Security Response Center, about the flaw and resulting controversy about the time delay.
Software Restriction Policies is a terrific new security tool—if you know what it can’t do, as well as what it can.
- By Roberta Bragg
- 04/01/2004
Knowing what’s in your Event Logs is a key to knowing what your servers are doing. Here’s how to make sense of them.
- By Derek Melber
- 04/01/2004
You can adapt the logical perimeter network design to suit your own access requirements, but most common requirements are met with this design.
- By Danielle Ruest and Nelson Ruest
- 04/01/2004
Computer networks allow people to share resources, but computer security prevents access to resources. How to decide if you need PKI, and a step-by-step guide to installing PKI on your servers.
Traffic-management switches are quickly becoming easier to deploy and support, with greater intelligence to repel more sophisticated application attacks
- By Hariharan Krishnan
- 04/01/2004
You can use a script to compile log info into a file for closer examination.
- By Chris Brooke
- 04/01/2004
How to move the default directories created by IIS from the system drive. Plus, methods to make FTP more secure.
- By Danielle Ruest and Nelson Ruest
- 04/01/2004