Outwit hackers with this 10-step guide for Web security—guaranteed to provide layers of security protocols to keep intruders frustrated and bored, yet allow legitimate users access.
- By Chris Brooke
- March 01, 1999
Before the Windows 2000 stampede leaves you in the dust, spend some time figuring out what you can do today to prepare for the trail.
- By Ed Brovick et al.
- March 01, 1999
Perhaps the delay of Windows 2000 is not such a bad thing,
after all.
- By Linda Briggs
- March 01, 1999
While the din of giggles following the NT 5.0 name change
distracts everyone, Em remembers to ask, "Where's
the product?"
- By Em C. Pea
- March 01, 1999
A well-designed internal security audit can help you uncover soft spots in your system before an outsider points them out. Put on a trench coat, grab a clipboard, and start roaming the halls.
- By Roberta Bragg
- February 01, 1999
The decisions you make up front about hardware, site
design, and operational policies can make the critical
difference in your Exchange installation.
- By Kevin Kohut
- February 01, 1999
Remote Explorer targets Windows NT computers. Could it
strike your network next?
- By Roger A. Grimes
- January 01, 1999
A mix of Access 97, Exchange, and Outlook turned a stand-alone
program into an enterprise application.
- By Keith Lubell
- January 01, 1999
If your job includes security, the Security Configuration
Editor in SP4 can truly make things much easier. In this
new column, an NT security expert tells what the new release
can do for you.
- By Roberta Bragg
- January 01, 1999
System policies allow you to focus on productivity and streamline downtime on your network. This guide shares the basics.
- By Joseph Phillips
- December 01, 1998
With Active Directory, you’ll need to be able to manage DNS. This primer will get you started.
- By Michael Chacon
- December 01, 1998