CAs play a vital role in managing identity between networks and aren’t difficult to install—as long as you plan wisely.
- By Michael Chacon
- 07/01/2001
When it comes to keeping your system safe from hackers trying to ride a Trojan horse through your defense perimeter, a Certificate Authority can make sure everybody’s exactly who they claim to be.
- By Michael Chacon
- 06/01/2001
Like any security decision, choosing the right
equipment and software isn’t something you should
take lightly. If you’re looking for a “plug-and-go”
firewall for your small business—along with the
ability to set up a solid VPN—SonicWALL can fulfill
that need.
- By Roberta Bragg
- 06/01/2001
IE 5, IIS 5.0, and Windows NT/2000 affected.
Moving to Exchange 2000 offers a valuable opportunity for jumpers and their more methodological counterparts to learn that permissions define possibilities and practicalities.
- By Roberta Bragg
- 05/01/2001
We all make mistakes—some are just more obvious than others. But it’s a graceful recovery that separates the gurus from the geeks.
Want your network traffic to flow fast, furious and unfettered? If so, check out these Quality of Service and bandwidth management tools.
- By Michael Feuda
- 04/01/2001
From your network and servers to workstations, Panda’s Global Virus Insurance protects you from nasty intruders.
- By Barry Shilmover
- 04/01/2001
Controlling access with IPSec can help keep your vulnerable habitat safe from visitors of all species.
- By Roberta Bragg
- 04/01/2001
The Microsoft Encyclopedia of Networking's comprehensive inclusion of networking terms is balanced by the somewhat lightweight and succinct etymologies.
- By T. Brian Granier
- 04/01/2001
If you want a better way to connect remote users, offices and servers securely,
consider the humble, easy-to-implement virtual private network. Here’s how to
make it work in Windows 2000.
Sometimes you can’t ignore the absolutes. In the case of communication
security, just remember: If it doesn’t match, it’s gonna crash.
- By Roberta Bragg
- 03/01/2001
When you’re on the road, consider yourself (and your laptop) under the
constant threat of attack. Be prepared.
- By Roberta Bragg
- 02/01/2001
Everything pointed to Network Address Translation as the culprit, but it was up to this internetworking pro to find out why.
- By John M. Gunson II
- 02/01/2001
Refer to this volume for the hardcore details on
Windows 2000 security and how to manage it effectively.
- By Travis Garriss
- 02/01/2001
IIS gives you the power to create and manage virtual directories—for
jobs big (and little).
- By Chris Brooke
- 02/01/2001
"Using SQL Variants" doesn't mean what you might think.
- By Mike Feldman
- 02/01/2001
Don't let Windows 2000 TCP/IP control you. Control
it, using this book as a reference.
- By Paul G. Brown
- 02/01/2001
eEye's network security scanner helps you find the
chinks in your system's "armor."
- By Chip Andrews
- 02/01/2001
TCPView ferrets out connection information.
- By Mike Gunderloy
- 01/01/2001