Solution Providers


Intrusion Interrupted

We test three software-based intrusion detection systems that can help alert you when you've got barbarians at the gate.

Keys to the Domain

Available now, DomainKeys is one promising entry into the fight against spam.

Best of the Best

2005 Redmond Magazine Readers' Choice Survey: Find out how your favorite tool fared as nearly 2,200 readers pick their favorites in more than 40 product categories.

Going Hyper-Active

Build scripts that work more like applications so you can monitor progress and display results in a formatted manner.

Encryption All Around

With Windows 2003, you can use the Encryption File Systems to give multiple users access to the same encrypted files.

Keep a Close Eye on Your Servers

The newest version of MOM not only tracks all sorts of performance data, but also helps you put it in perspective.

Valid ID Required

Fighting spam requires authenticating e-mail addresses on the fly. Despite igniting a battle of its own, the Microsoft-backed Sender ID spec is shaping up as the best option.

Users Latch on to SQL Reporting Tool

SQL Server Reporting Services earns solid if not stellar marks from early adopters—and you can't beat the price.

You're Fired

Ditch your server dead weight: Consolidate to streamline management.

Help for Lost Files

Windows Server 2003's Volume Shadow Copy Service will help admins get off the restore treadmill.

New Password Mantra: Go Long

New hacking methods make short passwords unsafe, but Microsoft makes it tough to go long. Her's how to forge an effective policy.

Remote Scripting for SP2

Is Windows XP SP2 bringing your remote admin scripts down? Mr. Script has the answer you've been looking for.

Storage Gets Slim

Forget about low-carb diets. Storage consolidation is the new craze hitting the fat-conscious world.

Finding Gold in Yukon

Not your father's SQL Server, administrators will find comfort in Yukon, while developers are left out in the cold.

E-Mail Central

Exchange 2003 allows for a more consolidated e-mail architecture. Here's how to pull it off.