Solution Providers


Capturing the Essence of Network Communications

Microsoft’s Network Monitor packs enough punch to satisfy most network administrators and designers. Use it to capture, filter, and analyze your network traffic.

Mix It Up: Security in a NT/Unix Enterprise, Part 2

Now that you understand what it means to have security in a mixed environment, how do you go about achieving it?

Mix It Up: Security in an NT/Unix Enterprise

Gaining file accessibility in an integrated environment doesn’t mean you give up authentication, permissions, or accountability. These products and approaches make it happen.

Geeks with Guns

Knowing how secure the most secure operations are—and what products those organizations use to achieve it—can help you establish your own criteria.

Safe Messaging with Exchange

You know in the back of your mind that not every message you send or receive is absolutely safe. Isn’t it time you figured out how to protect your enterprise e-mail system?

Crowd Control! 10 Steps to Securing Web Sites

Outwit hackers with this 10-step guide for Web security—guaranteed to provide layers of security protocols to keep intruders frustrated and bored, yet allow legitimate users access.

10 Steps to Prepare for Windows 2000

Before the Windows 2000 stampede leaves you in the dust, spend some time figuring out what you can do today to prepare for the trail.

Delay Away

Perhaps the delay of Windows 2000 is not such a bad thing, after all.

Good Gravy!

While the din of giggles following the NT 5.0 name change distracts everyone, Em remembers to ask, "Where's the product?"

Survive Your Own Audit

A well-designed internal security audit can help you uncover soft spots in your system before an outsider points them out. Put on a trench coat, grab a clipboard, and start roaming the halls.

Best Practices of Exchange Planning

The decisions you make up front about hardware, site design, and operational policies can make the critical difference in your Exchange installation.

New Virus Changes the Rules

Remote Explorer targets Windows NT computers. Could it strike your network next?

Keeping Track of Candidates

A mix of Access 97, Exchange, and Outlook turned a stand-alone program into an enterprise application.

Inside Service Pack 4

If your job includes security, the Security Configuration Editor in SP4 can truly make things much easier. In this new column, an NT security expert tells what the new release can do for you.

Practical Policies

System policies allow you to focus on productivity and streamline downtime on your network. This guide shares the basics.