Windows Confidential: A Joystick Need Not Be a Microwave

Can your joystick play music or cook a burrito? In the December issue of TechNet Magazine, Raymond Chen takes a look back at when the DirectInput force feedback joystick interface was being hammered out and discusses the importance of whether periodic forces should be expressed as a period or as a frequency. But more importantly,…

1

Standby Continuous Replication in Exchange Server 2007 Service Pack 1

What’s so great about Standby Continuous Replication? SCR, new in Service Pack 1, means that high availability and site resilience are no longer mutually exclusive—you can achieve both. Scott Schnoll shows how SCR can help you improve uptime, limit data loss, and simplify e-mail maintenance and retention. Want to learn more? You’ll definitely want to…

2

Security Watch: Windows Domain Password Policies

Administrators know that there are many constraints when it comes to password policies for domain user accounts.  Windows Server 2008, however, makes at least one of those issues a thing of the past.  In the December installment of Security Watch, Derek Melber explains how Windows Server 2008 enables you to implement multiple password policies. "Now…

1

THE CABLE GUY: Network Policy Server

Nothing’s more critical to the health of your enterprise than a secure network, and Network Policy Server (NPS), new in Windows Server 2008, is an important tool for managing access. It lets you implement organization-wide policies, providing centralized authentication, authorization, and accounting for a variety of network access devices. Joseph Davies discusses the new features…

1

Deploying Unified Messaging with Exchange Server 2007

Unified messaging involves the integration of two disparate systems–your Microsoft Exchange messaging system and your physical telephony system. As a result, you can combine voicemail, fax capabilities, and e-mail messaging into a single mailbox. Implementing this may seem like a daunting task, but it’s easier than you think. To help out, the December 2007 issue…

1

Utility Spotlight: The Microsoft Security Assessment Tool

Tracking down network security problems can be tricky and time-consuming, but we have a tool that can help. In the December issue, Lance Whitney presents the Microsoft Security Assessment Tool, a free utility that asks you describe your security environment, then provides an analysis along with recommendations for improvement. For more coverage of handy tools…

1

Windows PowerShell: Digging Deeper

You’ve undoubtedly heard of Windows PowerShell and have probably even started to play around with it.  From the moment you start using Windows PowerShell, you can see that it’s a powerful tool with a lot of capabilities.  But there’s even more to discover once you start digging a bit dipper.  In the December installment of…

1

The Microsoft Security Intelligence Report

What does Microsoft do with the massive amounts of data it collects from millions of Internet-connected systems and some of the world’s busiest online services? For one, twice a year it publishes the Microsoft Security Intelligence Report, which covers trends in software vulnerability disclosures, exploits, and malware; the threat impact for different versions of Windows,…

1

A Guide to Basic Computer Forensics

You’re worried that a system has been hacked into, or perhaps you suspect that an employee has been leaking corporate information. So where do you start an investigation and how can you analyze the data you have?   The field of computer forensics may seem highly specialized, but there are tools and techniques available for mainstream system administrators to perform basic investigations. …

1

SQL Q & A: Memory Configuration, Performance Profiling, Setting Your Fill Factor, and More

You’ve got questions, we’ve got answers–and tips. Here’s what our experts cover in the December issue: Q: I’m trying to figure out the best memory configuration for my SQL Server boxes. Q: Can I use my server’s IP address now in SQL Server 2005 Replication to indicate which instance to replicate? Q: What can you…

0