XP/Vista/Windows 7


Boot-Time Security

Boot-up is a dangerous time for your systems, a time before security policies to protect them may be active. Avoid danger with persistent policies.

Enforcing Stronger Passwords

Microsoft's password complexity filter: what's wrong with it and why you might need something better.

Ooops! Recovering Deleted Files: Volume Snapshots vs. Undelete 4.0

Microsoft Volume Shadow Copy Services and Undelete 4.0 are a potent one-two punch.

Thin Clients, Fat Heads

This business owner’s thin-client Windows network was impregnable. Or so he thought, until he met Bob…

Delegating Rights

You can give ordinary users NT and WMI administrative rights for routine tasks—to a degree.

Analyze Your Baseline Security

MBSA offers much more than updates to your network.

Snappier Throughput Through Thorough Defrag

Executive Software's Diskeeper 8.0 can restore speed lost to scattered files.

Assessing Your Desktop Support Skills

Microsoft, MeasureUp team up to provide desktop support assessments.

Server Coexistence

Who gave this reader the silly idea that Windows 2000 and Windows 2003 can't live within the same domain?

14 Reasons To Reconsider Software Restrictions

Software Restriction Policies is a terrific new security tool—if you know what it can’t do, as well as what it can.

The Mystery of the Event Logs

Knowing what’s in your Event Logs is a key to knowing what your servers are doing. Here’s how to make sense of them.

TechNet In-Depth

Sure, you can do Knowledge Base searches online. But there’s plenty more that TechNet offers.

Making the Connection

Using the Active Directory Connector is an effective way to move your legacy Exchange environment to a new Exchange 2003 setup.

Remote Shutdown

This script allows logoff and shut down of remote users.

Disaster Recovery, or Just Disaster?

Simple IIS backup techniques

Subscribe on YouTube