The aptly titled Writing Secure Code prescribes a best practices approach to hardening your code.
- By Mike Gunderloy
- 09/01/2002
A controlled security challenge still provides valuable lessons.
- By Dian Schaffhauser
- 09/01/2002
Take Control with Remotely Anywhere 4.
- By J. Peter Bruzzese
- 09/01/2002
Hacks are a fact in a connected world. After discovering and expelling the intruders, you have to clean up their messes.
Windows 2000 Service Pack 3 and Windows XP SP 1 share a key element—changes to comply with Microsoft’s antitrust settlement with the Department of Justice.
- By Scott Bekker
- 08/16/2002
How would you rather get your MCP: reading books and fiddling with a homemade network in your windowless basement or tooling around Jamaica and the Grand Caymans on a cruise ship?
Transcender's SQL-DesignCert 8.0 proves worthy
- By Stewart Cawthray
- 08/01/2002
Moving beyond static IP addresses makes our intrepid script router-friendly and takes you to the great outdoors.
- By Chris Brooke
- 08/01/2002
Moving from Exchange 5.5 to Exchange 2000 is a complex task. This migration took many unexpected twists, turns and hours.
A thorough guide for an essential foundation
- By T. Brian Granier
- 08/01/2002
If you want to do IT security because it’s “hot” right now, or because you think that’s where the money is, forget it. If you truly love the field, read on.
- By Roberta Bragg
- 08/01/2002
The Distributed file system (Dfs), when properly implemented, can help your users get where they want to go. But its usefulness doesn’t stop there.
- By Bill Boswell
- 08/01/2002
"Windowsville" residents chime in on the "which OS is more secure" argument; readers debate Microsoft's longevity.
- By MCP Magazine Readers
- 08/01/2002
DNS Expert Active Directory scores big with the complex, falls short with the simple.
- By Ronald Stewart
- 08/01/2002
SecureIIS provides a solid brick in your defensive wall
- By Seyoum Zegiorgis
- 08/01/2002