Implementing this emerging data communication security standard can tighten up your network. Here’s how its default policies work.
- By Roberta Bragg
- 08/01/2000
Running Windows 2000 Terminal Services is the next best thing to being there--but how do you do it securely?
- By Roberta Bragg
- 07/01/2000
Windows 2000 and Exchange 2000 offer new routes to email security, but have you done all you can with Exchange 5.5?
- By Roberta Bragg
- 06/01/2000
With a bit of SQL and the NT Resource Kit, you can create a log file management system to stay on top of potential intrusions.
- By Chip Andrews
- 06/01/2000
Making SSO a reality in mixed-OS enterprises involves niggling details, compromises, and add-ons or third-party solutions. Does Windows 2000 help?
- By Roberta Bragg
- 05/01/2000
Put aside your latest list of one-alarm fires for a few hours and spend some time planning your disaster recovery response.
- By Michael Chacon
- 05/01/2000
When we asked Roberta to provide a list of the best Web sites for security information, she cleaned out her Favorites folder and rediscovered a few old friends.
- By Roberta Bragg
- 04/01/2000
Use Windows 2000's default security to make sure no one gets in without your permission. First step: Understand what ships in the product.
- By Roberta Bragg
- 03/01/2000
Plugging the most well-known holes in your Windows NT network is surprisingly easy. The author takes you step by step through her favorites.
- By Roberta Bragg
- 03/01/2000
Intrusion detection isn’t just software—it means monitoring your network to discover attacks. Sometimes that infiltration comes from places you’d never expect.
- By Roberta Bragg
- 02/01/2000
Roberta culls her considerable library to bring you some of the best and worst that’s been published on her favorite topic.
- By Roberta Bragg
- 01/01/2000
Worried about potential security gaps? Follow these seven steps to make sure your installation won’t melt under fire.
- By Roberta Bragg
- 12/01/1999
By implementing a VPN, you can use the world’s largest public network as a WAN that securely connects your remote users and branch offices.
Our stalwart columnist tackles your toughest security questions.
- By Roberta Bragg
- 11/01/1999
Understanding how information stays secure can help you make informed choices about your encryption strategies.
- By Roberta Bragg
- 10/01/1999
Security certs won’t guarantee employment but they can help you establish your credentials.
- By Roberta Bragg
- 09/01/1999
Remote access requires a higher level of protection. Armed with this task list, you can retain security through NT Terminal Server and the ICA client.
- By Roberta Bragg
- 08/01/1999
True network protection could mean thinking and acting like a hacker. As an NT administrator, here are your weapons of choice.
- By Roberta Bragg
- 07/01/1999
Now that you understand what it means to have security in a mixed environment, how do you go about achieving it?
- By Roberta Bragg
- 06/01/1999
Gaining file accessibility in an integrated environment doesn’t mean you give up authentication, permissions, or accountability. These products and approaches make it happen.
- By Roberta Bragg
- 05/01/1999