Windows 7


Baking in Security

The aptly titled Writing Secure Code prescribes a best practices approach to hardening your code.

Fake Out

A controlled security challenge still provides valuable lessons.

Sam I Am—Anywhere!

Take Control with Remotely Anywhere 4.

You Got Hacked! Now What?

Hacks are a fact in a connected world. After discovering and expelling the intruders, you have to clean up their messes.

Win2K SP3, XP SP1 Share Settlement Changes

Windows 2000 Service Pack 3 and Windows XP SP 1 share a key element—changes to comply with Microsoft’s antitrust settlement with the Department of Justice.

The Certification Boat

How would you rather get your MCP: reading books and fiddling with a homemade network in your windowless basement or tooling around Jamaica and the Grand Caymans on a cruise ship?

This is Just A test!

Transcender's SQL-DesignCert 8.0 proves worthy

Getting Beyond the Subnet

Moving beyond static IP addresses makes our intrepid script router-friendly and takes you to the great outdoors.

Exchanging Pain for Pleasure

Moving from Exchange 5.5 to Exchange 2000 is a complex task. This migration took many unexpected twists, turns and hours.

MCSE Core Four

A thorough guide for an essential foundation

How To Be a Security Babe

If you want to do IT security because it’s “hot” right now, or because you think that’s where the money is, forget it. If you truly love the field, read on.

Simplify Resource Navigation With Dfs

The Distributed file system (Dfs), when properly implemented, can help your users get where they want to go. But its usefulness doesn’t stop there.

Certified Mail: August 2002

"Windowsville" residents chime in on the "which OS is more secure" argument; readers debate Microsoft's longevity.

DNS Expertise at Your Fingertips

DNS Expert Active Directory scores big with the complex, falls short with the simple.

Thwarting Hackers

SecureIIS provides a solid brick in your defensive wall

Subscribe on YouTube