SPONSORED BY: VeriSign
![]()
Free white paper: VeriSign's new, flexible and enhanced anti-identity-theft service will immediately enable you to better authenticate the buyers coming into your network; Effectively screen order content for fraud patterns; thwart suspicious transactions in real-time; prevent hackers from taking control of your payment structure; employ best practices being used by leading financial institutions to combat fraud, AND MORE.
![]()
Click here!
|
|
SPONSORED BY: SearchWin2000.com
![]()
Visit the new Desktop Deployment Info Center on SearchWin2000.com.
You'll find tips, webcasts, expert advice and other key resources
focused on all aspects of managing Windows desktops -- direct from
SearchWin2000.com and Microsoft. Topics covered include desktop
deployment and migration strategies, performance, disk management,
hardware administration, application management, security -- and much
more!
![]()
Click here to explore the info center today!
|
|
|
Survival Tips for the Windows Manager |
|
![]()
Windows in the Enterprise: Deploying user and computer settings
Automated desktop installations comprise only one part of any desktop deployment project. Deploying default settings is another key part, and it involves much more than just writing unattended-setup answer files or building a disk image. In this article, resident SearchWin2000.com expert Jerry Honeycutt outlines some pressing desktop installation issues, and describes how to document settings, the requirements you'll need to get settings in order, precise automation and more.
Chapter of the Week: 'Protecting your data with encyypting file system'
In this chapter from Windows XP Professional: The Complete Reference by Guy Hart-Davis, you'll learn how to use Encrypting File System (EFS) to encrypt the files and folders you want to protect. EFS is a powerful technology that needs to be approached with caution; otherwise you might find that you can't decrypt your own files.
IT Toolkit: Best backup plans for the desktop
A good desktop backup plan is absolutely essential to a well-secured network. Often, it's the only way to restore business operations after a security breach or other disaster. Whether you're dealing with a physical issue like a power outage or a malicious network attack, archiving and restoring your company's data can mean the difference between business continuity and failure. SearchWin2000.com resident expert Laura Hunter outlines different hardware and software options you'll need to create a successful backup strategy.
|
![]() |
![]() |
|
|
Vent! |
|
Take our site poll
How do you feel about the firing of Dan Geer, the security expert who co-authored a report critical of Microsoft?
Click here to vote. |
![]() |
![]()
NEWS EDITOR
John Hogan
[EMAIL PROTECTED]
Send me your news, press releases and product announcements.
![]()
SENIOR SITE EDITOR
Marilyn Cohodas
[EMAIL PROTECTED]
Send me your original articles and best practices.
![]()
SITE EDITOR
Catherine Ketcher
[EMAIL PROTECTED]
Send me your bloopers and Featured Topic ideas.
![]()
SENIOR NEWS WRITER
Margie Semilof
[EMAIL PROTECTED]
Send me your news and story ideas.
![]()
ASSOCIATE EDITOR
Christine Polewarczyk
[EMAIL PROTECTED]
Send me your ideas for webcasts and discussion day topics.
![]()
ASSISTANT EDITOR
Will Hurwitz
[EMAIL PROTECTED]
Send me your favorite Web sites and white papers.
![]()
ASSISTANT EDITOR
Vandana Sharma
[EMAIL PROTECTED]
Send me your tips and your true IT bloopers.
|
|
|