Search result for "firewall"

  1. Microsoft Azure: The Network Operating System of the Future, Today (Part 1) - Why You Should Care

    This series of articles will take a look at what’s new in Microsoft Azure.

  2. Scripted Network Defense (Part 1) - Programmatic Defense of Windows Hosts Against Network Attacks

    In this series the author looks at some well-known network attacks and examines free, readily-available tools and scripting techniques that can help you respond to them.

  3. Product Review: Idera Server Backup Enterprise

    A review of Server Backup Enterprise 5.2 from Idera.

  4. Introduction to Wireless Networking Part 3 - Security, General Tips and Tricks

    Welcome to part three of what was originally meant to be a two part series on ‘An Introduction to Wireless Networking’. We’ll take a closer look at the types of security that wireless networking offers, I’ll give you some general tips and tricks and update you on some of the latest news and statistics.

  5. Hyper-V Private Cloud Networking for Beginners (Part 1) - Virtual Networks

    This article takes a look at the types of virtual networks and adapters that are available with Hyper-V. We'll also see what happens to your physical NIC configuration when you install the Hyper-V role.

  6. Planning a Hybrid IT Infrastructure using Windows Azure Infrastructure Services (Part 3)

    In this, part 3 of the article series, we’ll provide you with hands-on instructions on how to create Azure Virtual Networks and Azure Virtual Machines.

  7. Office Communications Server 2007: Microsoft goes VoIP (Part 2)

    Installing, configuring and beginning to use Microsoft Office Communications Server.

  8. Hybrid Network Infrastructure in Microsoft Azure (Part 3)

    In this article we’ll continue the discussion by working our way through the list of network capabilities that are available in Azure at the time this article was written.

  9. Office 2010 Security (Part 1) - Threat Mitigation

    This article introduces Office 2010 security improvements and explains how Office File Validation can help mitigate against potential threats.

  10. Scripted Network Defense (Part 2) - Perfmon Events and Task Triggers

    In this article we'll discuss how to use Performance Monitor to watch for certain conditions and set up a triggering mechanism for responding to them.

  11. Planning deployment for Windows Server 2012 (Part 4) - Remote Management

    This article explains how you can use Server Manager to remotely manage servers running Windows Server 2012 and earlier versions of Windows Server.

  12. Migrating DNS servers from Linux to Windows (Part 1)

    This is the first article of a two-part series on migrating BIND name servers running Linux to Windows Server DNS servers.

  13. Provisioning Virtual Machine Clouds with Windows Azure Pack (Part 1)

    This first article in a short series of articles on provisioning virtual machine clouds with Windows Azure Pack walks you through how to use the Best Practices Analyzer to validate your Windows Azure Pack deployment.

  14. Using Virtual PC as a Test and Learning Platform

    This article examines some of the various ways that Microsoft Virtual PC 2004 (and Virtual Server 2005) can be used as a platform for software testing and learning.

  15. Product Review: Desktop Authority

    This article reviews Desktop Authority, a desktop management tool for Windows-based networks, which enables administrators to secure, manage, support and inventory desktops and applications. By integrating configuration, inventory, reporting, patch management, anti-spyware, power management and remote management into a single solution, administrators can efficiently and effectively manage the desktop environment from one console, thereby lowering the total cost of desktop ...

  16. Building Test Labs with Hyper-V (Part 1): Base Configuration and Virtual Networks

    This article discusses the history of building out test labs and how virtualization has made it much easier to create valid test labs that allow us to test software and services in a controlled environment.

  17. A Complete Guide to UAG DirectAccess (Part 2) - IPv6 Transition Technologies and the Name Resolution Policy Table (NRPT)

    In this article we'll discusse the key IPv6 transition technologies that are used by the DirectAccess client and server to allow IPv6 messages to be moved over an IPv4 Internet or intranet.

  18. Deploying Windows 7 - Part 4: Using MAP 4.0

    How to perform a Windows 7 Readiness assessment using MAP 4.0.

  19. ADSL via Network Card : Alternative Access software : RASPPPOE (Win9x)

  20. How to use remote assistance in Windows XP