Solution Providers


The Microsoft Security Debate, Part One

Two users critique Microsoft's understanding of security.

The Perils of Patching

The process of keeping systems updated shouldn't be treated as the mindless that we mistake it for; no strategy is an invitation to disaster.

A Call to Arms, Continued

Letters from the security front.

A Call to Arms

Enlist everyone, even your relatives, in the fight against the spread of malware.

Score cards; Password Workout; MX Records; and the Cool Factor.

The Magic of RPC over HTTP

If you have the latest and greatest from Microsoft—Windows Server 2003, Outlook 2003 and Exchange 2003—your users can get seamless remote access to e-mail.

The Mirror Crack’d

This author figured that mirroring his e-mail drive was solid insurance against data loss. That theory was tested to the max when a drive failed.

Storm Stories

It’s a truism in IT that various parts of your network—servers, hard drives, video cards, that mission-critical software program—will grind to a halt eventually. Here we present four disaster-recovery scenarios and how to recover from each.

Psychologically Acceptable Security

Getting user buy-in for security is critical. Using certificate autoenrollment is a way to make it pain-free.

WINS-WINS Situation

In one domain where the servers seem to be missing, setting up WINS correctly may be the quick fix.

Active Directory Cleanser

Cull unused or deleted accounts using the LDIFDE tool and some scripting trickery.

Automate Your Security

Many security-related tasks can be tedious—and, therefore, overlooked. Using these 10 scripts can make your life easier, while simultaneously locking down your network.

Exchange 2003 Migration Roadmap

Safely find your way to Exchange 5.5 to Exchange 2003.

Secret Agent Plan

A reader's encrypted files are safe and recoverable if he turned on the Data Recovery Agent.

Global Catalog Placement

How the GC plays a role in Active Directory.