MCPMag.com

Sign up for our newsletter.

I agree to this site's Privacy Policy.

In-Depth Features


Securing Your Handhelds

Deploying handhelds requires understanding the sensitivity of your data, the strengths & weaknesses of your infrastructure, & the needs of your IT team. There are no easy answers.

Hosted Exchange: Can it Work for You?

If you don't have the time, money or manpower to run your own messaging environment, it may be time to consider hosted Exchange.

You Ask, Ballmer Answers

MCP Magazine readers get a crack at the Microsoft CEO.

Put Your Finger on Proper Security

A roundup of five biometric products that go the extra security mile—for when passwords alone aren't enough.

Will Application Integration Save the Enterprise?

Are you looking for something new to gain advantage over competitors? Application integration could be your vehicle for driving new and innovative information and business processes.

Protection Through Isolation

This admin got a shock when he discovered that usernames and passwords for his new employer's sensitive documents were being sent in cleartext. Fortunately, he was able to see the forest for the trees.



Build Real-Time Web Images

Use Microsoft's TerraService and MapPoint Web Services to start your own VS.NET-based mapping projects.

A Virtual Machine Primer

Virtual PC software can ease migration and give any robust machine multiple personalities. Here’s what you need to know to take full advantage.

The Battle to Provision

The convergence of directory management and provisioning, and how organizations can leverage their directory management investments to meet their provisioning needs.

XML and Web Services: Are We Secure Yet?

From confidentiality, integrity, and availability to authentication, authorization, and audit, find out how you can employ best practices to make Web services secure.

Taming Kerberos

If you’re using Windows 2000 Server or above, chances are you’re also using Kerberos authentication. It’s time to get to know this three-pronged protocol and learn how to troubleshoot it.

Gaining Control Through Enterprise Process

How new policies and procedures can help you gain control over processes, ranging from patch management to topology changes.

Display and Manage Images in ASP.NET

Develop image-management apps that exploit the .NET Framework and ASP.NET with recursion, the TreeView control, the System.Drawing.Images namespace, the System.IO namespace, and more.

Pack ‘Em Up, Move ‘Em Out

Migrating applications is far from easy—that’s why choosing the right tool is imperative.

Store Large Lookup Tables in DataSets

When mobile users need to look up and edit data without direct network connections, persist DataSets of lookup information as local XML files to preserve offline updates.

Managing User Profiles in ASP.NET 2.0

Learn how to implement user profile management, a hot new feature in ASP.NET 2.0.

Create a DSN-Less Database Connection

Increase your application's flexibility and make the installation simpler by connecting to the database without generating a DSN in the ODBC Data Source Administrator. Instead, use VB code to configure the connection.

Books: SQL Server for Gurus

The Guru's Guide to SQL Server Architecture and Internals helps SQL Server power users manage their complex enterprise systems. This valuable reference manual goes far beyond the product's base documentation.

Patching Windows Security

Get the scoop on Microsoft's series of releases and updates that will tighten security on both the latest Windows operating systems as well as most other Microsoft products.

Integration at the Edge

We can learn lessons from trading hubs and apply the data to IT integration. See how the ESB removes the distinction among internal and external networks for supply-chain apps.

Upcoming Events