This article series will examine various techniques for securing Wi-Fi networks. This first article in the series deals with understanding the vulnerabilities associated with wireless networks.
Taking a deep dive into the useful features of Windows Server 2008 R2.
In this article the author explains three common network storage configurations.
This article describes how to handle the AppData\\Roaming folder when you want to virtualize application settings and data.
This article concludes the series on Windows 7 compatibility testing by examining the Microsoft Application Compatibility Manager’s reporting capabilities.