August 2002 - Money Matters: Seventh Annual Salary Survey
Plus, Exchange 2000 migration, Distributed file system implementation, becoming a security guru, more.
Moving from Exchange 5.5 to Exchange 2000 is a complex task. This migration took many unexpected twists, turns and hours.
Sometimes you really have to ponder the meaning behind the numbers.
A thorough guide for an essential foundation
Easy to use-and effective
Despite its lackluster support, Double-Take may be the safety net you need.
SecureIIS provides a solid brick in your defensive wall
Transcender's SQL-DesignCert 8.0 proves worthy
DNS Expert Active Directory scores big with the complex, falls short with the simple.
Call Me Certifiable
Maybe they already broke up the company and we didn’t notice.
"Windowsville" residents chime in on the "which OS is more secure" argument; readers debate Microsoft's longevity.
Moving beyond static IP addresses makes our intrepid script router-friendly and takes you to the great outdoors.
A reader who "followed the rules" is still having a tough time finding a job.
If you want to do IT security because it’s “hot” right now, or because you think that’s where the money is, forget it. If you truly love the field, read on.
You're no security expert, but you should keep an eye on your perimeter network. Implementing intrusion detection and antivirus measures can help.
The Distributed file system (Dfs), when properly implemented, can help your users get where they want to go. But its usefulness doesn’t stop there.
Later this month, Microsoft will begin implementing .NET Passport login for its MCP Secured and MCT Secured sites.
Showing appreciation to systems administrators worldwide on July 26 for their relentless, hard work year-round.
Beta testing for new MCSA/MCSE elective expected in November; plus, certification program unlikely to include lab element in the near future.
A survey from the Information Technology Association of America says that the number of employees in the U.S. IT workforce fell by almost 5 percent in 2001.
Windows Security Challenge network 1, hackers 0.
Goal of Trustworthy Computing initiative is "To make computing so safe and reliable that people simply take it for granted, just like...the telephone system, water supply and electric power grid," say