Do you have a problem with your network design? If so, let Microsoft Certified Professional Magazine's experts come to your aid.
Beta testing for new MCSA/MCSE elective expected in November; plus, certification program unlikely to include lab element in the near future.
- By Michael Domingo
- 07/24/2002
Windows Security Challenge network 1, hackers 0.
Goal of Trustworthy Computing initiative is "To make computing so safe and reliable that people simply take it for granted, just like...the telephone system, water supply and electric power grid," say
When you invite the world to try to hack into your Microsoft network, what's the major security challenge you face? In the case of MCP TechMentor's Windows Security Challenge, it might be the security
- By Dian Schaffhauser
- 07/11/2002
Can academia provide the same quality of MCSE instruction as a CTEC? James attends a local community college and reports his findings.
- By James Carrion
- 07/01/2002
It’s not a matter of “if,” but “when,” your system turns that particular shade of blue that makes administrators see red. That’s when you’ll need to know what your options are to bring the dead box back to life.
- By Zubair Alexander
- 07/01/2002
Active Directory’s trust model makes administration easier than NT, but also introduces the potential to do more damage. Make sure your administrators are trustworthy.
- By Roberta Bragg
- 07/01/2002
Keep track of support requests with one of these packages.
- By Rodney Landrum
- 07/01/2002
We solicited readers to provide us with their technical problems, and we were inundated with letters. Here are some of the more provocative problems that we put to you—the readers—to solve.
- By MCP Magazine Readers
- 07/01/2002
An excellent study guide and good general reference to boot.
- By Suzanne Pacheco
- 07/01/2002
Keep track of support requests with one of these packages.
- By Rodney Landrum
- 07/01/2002
Itanium servers, which utilize 64-bit architecture, are ready for the datacenter. This guide can help you decide whether your company should consider adding these high-muscle machines.
- By Bill Boswell
- 07/01/2002
Security is a full-time job, but keeping an eye on your perimeter network can cut down the work.
- By Bill Heldman
- 07/01/2002
This month, Chris shows you how to use an Excel spreadsheet to read and apply IP addresses and get your network connected.
- By Chris Brooke
- 07/01/2002