Use Windows Server 2003 features to prevent denial of service occurrences in Active Directory. Also discover the best way to implement a time management service.
- By Danielle Ruest and Nelson Ruest
- 11/01/2003
This rev of Microsoft’s desktop management tool has been in the machine shop for three years. Now that it’s nearly here, let’s look under the hood.
- By Mark Wingard
- 11/01/2003
The trick to creating Exchange 2000 user mailboxes via scripting is in the CDOEXM libraries.
- By Bill Boswell
- 10/21/2003
Microsoft CEO Steve Ballmer addresses security, promises new tools to combat growing problems.
Newest Windows System Server software for small/medium business makes debut at Microsoft Worldwide Partner Conference.
- By Michael Domingo
- 10/08/2003
Microsoft puts Exam 70-298 through its paces with beta testers the week of Oct. 6.
- By Michael Domingo
- 10/02/2003
How not to communicate with a Web server.
- By Raymond Garvey
- 10/01/2003
From the early days to recent times, see how spam and ham differ, statistically speaking.
- By Mike Gunderloy
- 10/01/2003
How Black Lists work for blocking spam.
- By Mike Gunderloy
- 10/01/2003
The first meaning of spam.
- By Mike Gunderloy
- 10/01/2003
Why not just anyone should change a naming convention.
- By Michael Beardsley
- 10/01/2003
Of bowling and certifications.
Defend your large enterprise with these spam stoppers.
- By Mike Gunderloy
- 10/01/2003
Spam-stopping features are included in this new version.
- By Mike Gunderloy
- 10/01/2003
These eight spam-fighting tools for Exchange want to play a major role in fighting unsolicited e-mail for your organization.
- By Mike Gunderloy
- 10/01/2003
A list of terms you should know.
- By Mike Gunderloy
- 10/01/2003
Setting up forest trusts can be tricky. Here’s a step-by-step instruction guide.
- By Roberta Bragg
- 10/01/2003
Security study faulty at many levels; let me count the ways.
- By Roberta Bragg
- 09/29/2003
Analysis: CCIA's damning report on Microsoft monoculture seems off target.
The nation's IT infrastructure remains safe, thanks in part to the efforts of Carnegie Mellon's Computer Emergency Response Team.