- By MCP Magazine Readers
- February 01, 2004
It’s a truism in IT that various parts of your network—servers, hard drives, video cards, that mission-critical software program—will grind to a halt eventually. Here we present four disaster-recovery scenarios and how to recover from each.
- By Derek Melber
- February 01, 2004
If you have the latest and greatest from Microsoft—Windows Server 2003, Outlook 2003 and Exchange 2003—your users can get seamless remote access to e-mail.
- By Bill Boswell
- February 01, 2004
This author figured that mirroring his e-mail drive was solid insurance against data loss. That theory was tested to the max when a drive failed.
- By Mike Gunderloy
- February 01, 2004
This tool creates scripts for tweaking remote systems.
- By Chris Brooke
- February 01, 2004
Admin tasks don’t end the moment IT pros step out of the office. These devices and software solutions can keep servers shining, no matter where you are.
- By Danielle Ruest and Nelson Ruest
- February 01, 2004
Getting user buy-in for security is critical. Using certificate autoenrollment is a way to make it pain-free.
- By Roberta Bragg
- February 01, 2004
Cull unused or deleted accounts using the LDIFDE tool and some scripting trickery.
- By Bill Boswell
- February 01, 2004
In one domain where the servers seem to be missing, setting up WINS correctly may be the quick fix.
- By Bill Boswell
- February 01, 2004
Is it time to set your own code of ethics?
- By Dian Schaffhauser
- February 01, 2004
Many security-related tasks can be tedious—and, therefore, overlooked. Using these 10 scripts can make your life easier, while simultaneously locking down your network.
- By Don Jones
- February 01, 2004
Safely find your way to Exchange 5.5 to Exchange 2003.
- By Bill Boswell
- February 01, 2004
If you think today’s PC hardware is astounding, stick around for a decade.
- By Em C. Pea
- February 01, 2004
Get more work out of Visual Studio .NET—and less of a workout—with these IDEs.
- By Mike Gunderloy
- February 01, 2004
A reader's encrypted files are safe and recoverable if he turned on the Data Recovery Agent.
- By Bill Boswell
- February 01, 2004
How the GC plays a role in Active Directory.
- By Don Jones
- February 01, 2004
Following in the footsteps of the SCO Group Inc., Microsoft on Thursday put up a $250,000 bounty for the perpetrators of MyDoom.B.
- By Scott Bekker
- January 29, 2004
BusinessWeek Magazine, in its Feb. 2 editions, is declaring that SCO Group with its Linux lawsuits has replaced Microsoft as the most hated company in IT.
- By Scott Bekker
- January 29, 2004
The already fast-spreading MyDoom or Novarg mass-mailing virus got a boost from an effective variant that hit about two days after the original virus was discovered.
- By Scott Bekker
- January 29, 2004
Quest Software Inc. will buy privately-held Aelita Software for $115 million in a deal announced by the companies late Wednesday. The deal, a combination of two of the companies with the deepest sets of Active Directory and Windows-specific migration and management technologies, is expected to close this quarter.
- By Scott Bekker
- January 29, 2004