This series of articles will take a look at what’s new in Microsoft Azure.
In this series the author looks at some well-known network attacks and examines free, readily-available tools and scripting techniques that can help you respond to them.
A review of Server Backup Enterprise 5.2 from Idera.
Welcome to part three of what was originally meant to be a two part series on ‘An Introduction to Wireless Networking’. We’ll take a closer look at the types of security that wireless networking offers, I’ll give you some general tips and tricks and update you on some of the latest news and statistics.
This article takes a look at the types of virtual networks and adapters that are available with Hyper-V. We'll also see what happens to your physical NIC configuration when you install the Hyper-V role.
In this, part 3 of the article series, we’ll provide you with hands-on instructions on how to create Azure Virtual Networks and Azure Virtual Machines.
Installing, configuring and beginning to use Microsoft Office Communications Server.
In this article we’ll continue the discussion by working our way through the list of network capabilities that are available in Azure at the time this article was written.
This article introduces Office 2010 security improvements and explains how Office File Validation can help mitigate against potential threats.
In this article we'll discuss how to use Performance Monitor to watch for certain conditions and set up a triggering mechanism for responding to them.
This article explains how you can use Server Manager to remotely manage servers running Windows Server 2012 and earlier versions of Windows Server.
This is the first article of a two-part series on migrating BIND name servers running Linux to Windows Server DNS servers.
This first article in a short series of articles on provisioning virtual machine clouds with Windows Azure Pack walks you through how to use the Best Practices Analyzer to validate your Windows Azure Pack deployment.
This article examines some of the various ways that Microsoft Virtual PC 2004 (and Virtual Server 2005) can be used as a platform for software testing and learning.
This article reviews Desktop Authority, a desktop management tool for Windows-based networks, which enables administrators to secure, manage, support and inventory desktops and applications. By integrating configuration, inventory, reporting, patch management, anti-spyware, power management and remote management into a single solution, administrators can efficiently and effectively manage the desktop environment from one console, thereby lowering the total cost of desktop ...
This article discusses the history of building out test labs and how virtualization has made it much easier to create valid test labs that allow us to test software and services in a controlled environment.
In this article we'll discusse the key IPv6 transition technologies that are used by the DirectAccess client and server to allow IPv6 messages to be moved over an IPv4 Internet or intranet.
How to perform a Windows 7 Readiness assessment using MAP 4.0.