Security


Respecting Authority

CAs play a vital role in managing identity between networks and aren’t difficult to install—as long as you plan wisely.

Who ARE you?

When it comes to keeping your system safe from hackers trying to ride a Trojan horse through your defense perimeter, a Certificate Authority can make sure everybody’s exactly who they claim to be.

A Tale of Two Tunnels

Like any security decision, choosing the right equipment and software isn’t something you should take lightly. If you’re looking for a “plug-and-go” firewall for your small business—along with the ability to set up a solid VPN—SonicWALL can fulfill that need.

Microsoft Security Updates

IE 5, IIS 5.0, and Windows NT/2000 affected.

Voodoo Exchange

Moving to Exchange 2000 offers a valuable opportunity for jumpers and their more methodological counterparts to learn that permissions define possibilities and practicalities.

Double D'Oh!

We all make mistakes—some are just more obvious than others. But it’s a graceful recovery that separates the gurus from the geeks.

Unclog Your Network

Want your network traffic to flow fast, furious and unfettered? If so, check out these Quality of Service and bandwidth management tools.

Guarding the Corporate Network

From your network and servers to workstations, Panda’s Global Virus Insurance protects you from nasty intruders.

Tightening Telnet Step by Step

Controlling access with IPSec can help keep your vulnerable habitat safe from visitors of all species.

Worth Its Weight

The Microsoft Encyclopedia of Networking's comprehensive inclusion of networking terms is balanced by the somewhat lightweight and succinct etymologies.

Private and Secure: The VPN Solution

If you want a better way to connect remote users, offices and servers securely, consider the humble, easy-to-implement virtual private network. Here’s how to make it work in Windows 2000.

IPSec Rules!

Sometimes you can’t ignore the absolutes. In the case of communication security, just remember: If it doesn’t match, it’s gonna crash.

Protect Yourself

When you’re on the road, consider yourself (and your laptop) under the constant threat of attack. Be prepared.

From the Trenches: A Maddening Web Server Move

Everything pointed to Network Address Translation as the culprit, but it was up to this internetworking pro to find out why.

Keeping Windows 2000 Safe

Refer to this volume for the hardcore details on Windows 2000 security and how to manage it effectively.

Virtual Control

IIS gives you the power to create and manage virtual directories—for jobs big (and little).

The Practical SQL Handbook

"Using SQL Variants" doesn't mean what you might think.

Taking the Trouble Out of TCP/IP

Don't let Windows 2000 TCP/IP control you. Control it, using this book as a reference.

Bringing Security Issues Into Focus

eEye's network security scanner helps you find the chinks in your system's "armor."

Track Those TCP Ports

TCPView ferrets out connection information.

Subscribe on YouTube

Upcoming Training Events

0 AM
Live! 360 Orlando
November 17-22, 2024
TechMentor @ Microsoft HQ
August 11-15, 2025