Columns


Straight Dope on WMI Security

Getting past the dual security when you connect to WMI on remote computer.

Unlocking IIS 6.0, Part 1

Improve the performance of Web apps with some application pool and worker process tune-ups.

The Enforcer

Hide folders from users who have no business accessing them using a nifty feature of Windows 2003 Service Pack 1.

1 Million Compromised Computers?

A recent study on botnets shows that it might be time to call in Will Smith.

Notify with WMI

Find out how to use Windows Management Instrumentation (WMI) for system notifications without having to write scripts.

Out, Foul Spyware!

Beta Man looks at the recently released beta Microsoft Windows AntiSpyware software.

Scriptomatic Redux

Scriptomatic Version 2 improves upon some of the limitations of the previous iteration of this handy scripting tool.

The Genesis of Multi-Role Windows NT Servers

The evolution of Windows NT threatens its survival.

Who Do You Trust?

Don't open your door to just any stranger claiming to be a trusted CA.

Keeping Users At Bay

A feature that's been available for decades on NetWare, here's a new Windows utility can be used to limit number of concurrent user logins.

Script Fitness

Squeeze more out of your scripts using the Microsoft Scriptomatic tool to write WMI scripts.

Old Attack Exposes Microsoft Shortcomings

One if by Land, two if by code, I on the opposite shore will be ... taking a nap.

Sign, Sealed, Delivered

Secure your network from packet spoofing with SMB signing.

Too Much Information

Reporting on AD permissions using free tools is an exercise in futility for this admin. Can he find a better way?

The No-Spin Zone

The spin needs to stop here when companies lose millions of people's confidential information.

Pushing the Envelope

Simple script to push out administrative executables to remote computers.

Can I Get a DRM with That?

Maintain exact control over user access to information through digital rights management, but be prepared to explain its complex licensing structure.

Who's Digging Through Your Files?

Corporations need to be more transparent with consumers about how and when their private files are accessed.

Rooted in DNS

Many AD problems stem from DNS. Here's a quick DNS configuration best practices checklist.

The 'Wormability' Factor

Worm prediction formulas remain little more than educated guesswork.

Most   Popular