Security certs won’t guarantee employment but they can help you establish your credentials.
- By Roberta Bragg
- September 01, 1999
You’ll get more out of a mixed Windows/Unix environment.
- By David Millett
- September 01, 1999
Taking a stab in the dark, here's how I imagine the Windows 2000 track will look.
- By Linda Briggs
- September 01, 1999
Microsoft Official Curriculum can help you get skills now for putting Windows 2000 to work.
- By Sergio A. Pineda
- August 01, 1999
Remote access requires a higher level of protection. Armed with this task list, you can retain security through NT Terminal Server and the ICA client.
- By Roberta Bragg
- August 01, 1999
Get more work done. Use SMS Installer for mundane admin tasks like software installation. Your challenge: getting comfortable with scripting.
- By Bill Heldman
- July 01, 1999
True network protection could mean thinking and acting like a hacker. As an NT administrator, here are your weapons of choice.
- By Roberta Bragg
- July 01, 1999
Microsoft’s Network Monitor packs enough punch to satisfy most network administrators and designers. Use it to capture, filter, and analyze your network traffic.
- By Michael Chacon
- June 01, 1999
Now that you understand what it means to have security in a mixed environment, how do you go about achieving it?
- By Roberta Bragg
- June 01, 1999
Gaining file accessibility in an integrated environment doesn’t mean you give up authentication, permissions, or accountability. These products and approaches make it happen.
- By Roberta Bragg
- May 01, 1999
Knowing how secure the most secure operations are—and what products those organizations use to achieve it—can help you establish your own criteria.
- By Roberta Bragg
- April 01, 1999
You know in the back of your mind that not every message you send or receive is absolutely safe. Isn’t it time you figured out how to protect your enterprise e-mail system?
- By Roberta Bragg
- March 01, 1999
Outwit hackers with this 10-step guide for Web security—guaranteed to provide layers of security protocols to keep intruders frustrated and bored, yet allow legitimate users access.
- By Chris Brooke
- March 01, 1999
Before the Windows 2000 stampede leaves you in the dust, spend some time figuring out what you can do today to prepare for the trail.
- By Ed Brovick et al.
- March 01, 1999
Perhaps the delay of Windows 2000 is not such a bad thing,
after all.
- By Linda Briggs
- March 01, 1999