Security


Securing Terminal Services

Running Windows 2000 Terminal Services is the next best thing to being there--but how do you do it securely?

8 Ways to Secure Exchange

Windows 2000 and Exchange 2000 offer new routes to email security, but have you done all you can with Exchange 5.5?

Systems Engineering: Home-Built Intrusion Detection

With a bit of SQL and the NT Resource Kit, you can create a log file management system to stay on top of potential intrusions.

Single Sign-On Promises

Making SSO a reality in mixed-OS enterprises involves niggling details, compromises, and add-ons or third-party solutions. Does Windows 2000 help?

Back to Work

Put aside your latest list of one-alarm fires for a few hours and spend some time planning your disaster recovery response.

My Security Favorites

When we asked Roberta to provide a list of the best Web sites for security information, she cleaned out her Favorites folder and rediscovered a few old friends.

Tickets, Please! Limit User Access with Windows 2000

Use Windows 2000's default security to make sure no one gets in without your permission. First step: Understand what ships in the product.

Top 10 Security Fixes

Plugging the most well-known holes in your Windows NT network is surprisingly easy. The author takes you step by step through her favorites.

Who's Lookin' At You?

Intrusion detection isn’t just software—it means monitoring your network to discover attacks. Sometimes that infiltration comes from places you’d never expect.

Armchair Security

Roberta culls her considerable library to bring you some of the best and worst that’s been published on her favorite topic.

Set Up a Flame-Proof Firewall

Worried about potential security gaps? Follow these seven steps to make sure your installation won’t melt under fire.

Systems Engineering: Make the Internet Virtually Private

By implementing a VPN, you can use the world’s largest public network as a WAN that securely connects your remote users and branch offices.

Readers Write

Our stalwart columnist tackles your toughest security questions.

Keeping Your Secrets Secret

Understanding how information stays secure can help you make informed choices about your encryption strategies.

Become the Consummate Certified Security Professional

Security certs won’t guarantee employment but they can help you establish your credentials.

Lower the Bridge! Make Remote Access Secure

Remote access requires a higher level of protection. Armed with this task list, you can retain security through NT Terminal Server and the ICA client.

Concealed Weapons

True network protection could mean thinking and acting like a hacker. As an NT administrator, here are your weapons of choice.

Mix It Up: Security in a NT/Unix Enterprise, Part 2

Now that you understand what it means to have security in a mixed environment, how do you go about achieving it?

Mix It Up: Security in an NT/Unix Enterprise

Gaining file accessibility in an integrated environment doesn’t mean you give up authentication, permissions, or accountability. These products and approaches make it happen.

Windows 2000 Inches Closer to Release

At WinHEC '99, Brian Valentine, Windows NT Development Group program manager, discusses Windows 2000's impending release later this year.

Subscribe on YouTube