True network protection could mean thinking and acting like a hacker. As an NT administrator, here are your weapons of choice.
                    
			            - By Roberta  Bragg
- July 01, 1999
 
            
                
	                
                    
                                        
		            
                    Microsoft’s Network Monitor packs enough punch to satisfy most network administrators and designers. Use it to capture, filter, and analyze your network traffic.
                    
			            - By Michael  Chacon
- June 01, 1999
 
            
                
	                
                    
                                        
		            
                    Now that you understand what it means to have security in a mixed environment, how do you go about achieving it?
                    
			            - By Roberta  Bragg
- June 01, 1999
 
            
                
	                
                    
                                        
		            
                    Gaining file accessibility in an integrated environment doesn’t mean you give up authentication, permissions, or accountability. These products and approaches make it happen.
                    
			            - By Roberta  Bragg
- May 01, 1999
 
            
                
	                
                    
                                        
		            
                    Knowing how secure the most secure operations are—and what products those organizations use to achieve it—can help you establish your own criteria.
                    
			            - By Roberta  Bragg
- April 01, 1999
 
            
                
	                
                    
                                        
		            
                    You know in the back of your mind that not every message you send or receive is absolutely safe. Isn’t it time you figured out how to protect your enterprise e-mail system?
                    
			            - By Roberta  Bragg
- March 01, 1999
 
            
                
	                
                    
                                        
		            
                    Outwit hackers with this 10-step guide for Web security—guaranteed to provide layers of security protocols to keep intruders frustrated and bored, yet allow legitimate users access.
                    
			            - By Chris  Brooke
- March 01, 1999
 
            
                
	                
                    
                                        
		            
                    Before the Windows 2000 stampede leaves you in the dust, spend some time figuring out what you can do today to prepare for the trail.
                    
			            - By Ed Brovick  et al.
- March 01, 1999
 
            
                
	                
                    
                                        
		            
                    Perhaps the delay of Windows 2000 is not such a bad thing, 
        after all.
                    
			            - By Linda  Briggs
- March 01, 1999
 
            
                
	                
                    
                                        
		            
                    While the din of giggles following the NT 5.0 name change 
        distracts everyone, Em remembers to ask, "Where's 
        the product?"
                    
			            - By Em C.  Pea
- March 01, 1999
 
            
                
	                
                    
                                        
		            
                    A well-designed internal security audit can help you uncover soft spots in your system before an outsider points them out. Put on a trench coat, grab a clipboard, and start roaming the halls.
                    
			            - By Roberta  Bragg
- February 01, 1999
 
            
                
	                
                    
                                        
		            
                    The decisions you make up front about hardware, site 
        design, and operational policies can make the critical 
        difference in your Exchange installation.
                    
			            - By Kevin  Kohut
- February 01, 1999
 
            
                
	                
                    
                                        
		            
                    Remote Explorer targets Windows NT computers. Could it 
        strike your network next?
                    
			            - By Roger A. Grimes
- January 01, 1999
 
            
                
	                
                    
                                        
		            
                    A mix of Access 97, Exchange, and Outlook turned a stand-alone 
        program into an enterprise application. 
                    
			            - By Keith  Lubell
- January 01, 1999
 
            
                
	                
                    
                                        
		            
                    If your job includes security, the Security Configuration 
        Editor in SP4 can truly make things much easier. In this 
        new column, an NT security expert tells what the new release 
        can do for you.
                    
			            - By Roberta  Bragg
- January 01, 1999