Driven by a simple, application-based security rule-set, ZoneAlarm keeps computer invaders at bay.
- By Chip Andrews
- 01/01/2001
Now that you know what Active Directory is — and how vital it is — what are you doing to keep it safe?
- By Roberta Bragg
- 01/01/2001
Build comprehensive firewall protection with CyberwallPLUS 6.0.
- By Barry Shilmover
- 12/01/2000
Santa Gates has a special toy from the land of Windows 2000. Question is, how does it work?
- By Roberta Bragg
- 12/01/2000
Consider yourself under the threat of constant attack—viruses aren’t going away. Here, we examine five network anti-virus solutions that can aid you in your fight.
- By Chip Andrews
- 12/01/2000
An intrepid systems engineer divulges his most-loved
Windows utilities. (A guy could get sentimental about
this stuff.) Should these programs be in your toolbox?
- By Chip Andrews
- 11/01/2000
Make security administration a breeze with this trio of Small Wonders Software tools.
- By Barry Shilmover
- 11/01/2000
Mandatory password expirations should apply to everyone, even the network administrator.
- By Chris Brooke
- 11/01/2000
Microsoft’s Internet Security and Acceleration Server performs proxy and firewall services. This briefing educates you on its firewall capabilities.
- By Roberta Bragg
- 11/01/2000
Learn the basic behind-the-scenes steps for Smart Card logon under Kerberos.
- By Roberta Bragg
- 10/01/2000
With last month’s foundation in smart card technology under your belt, it’s time to implement the test system.
- By Roberta Bragg
- 10/01/2000
If you’re concerned about weak passwords serving as a hacker’s haven on your network, smart card logon may be the answer.
- By Roberta Bragg
- 09/01/2000
Implementing this emerging data communication security standard can tighten up your network. Here’s how its default policies work.
- By Roberta Bragg
- 08/01/2000
Running Windows 2000 Terminal Services is the next best thing to being there--but how do you do it securely?
- By Roberta Bragg
- 07/01/2000
Windows 2000 and Exchange 2000 offer new routes to email security, but have you done all you can with Exchange 5.5?
- By Roberta Bragg
- 06/01/2000
With a bit of SQL and the NT Resource Kit, you can create a log file management system to stay on top of potential intrusions.
- By Chip Andrews
- 06/01/2000
Making SSO a reality in mixed-OS enterprises involves niggling details, compromises, and add-ons or third-party solutions. Does Windows 2000 help?
- By Roberta Bragg
- 05/01/2000
Put aside your latest list of one-alarm fires for a few hours and spend some time planning your disaster recovery response.
- By Michael Chacon
- 05/01/2000
When we asked Roberta to provide a list of the best Web sites for security information, she cleaned out her Favorites folder and rediscovered a few old friends.
- By Roberta Bragg
- 04/01/2000
Use Windows 2000's default security to make sure no one gets in without your permission. First step: Understand what ships in the product.
- By Roberta Bragg
- 03/01/2000