April 2012An ethical hacker gives his view on the dangers of mobile malware and the steps you can take to protect your mobile workforce.
Category: Microsoft Technet
Microsoft Monthly Technet Utility Spotlight
Windows Server 2008 R2: Get the Most from Server Core
April 2012Server Core is a basic, no-frills way of maintaining your Windows environment. If you’re not familiar with it yet, you soon will be.
Utility Spotlight: Tweak Your Keyboard
April 2012The Microsoft Keyboard Layout Creator lets you customize the keyboard layout for yourself or any of your users.
Editor’s Note: Do It Yourself
March 2012With all the do-it-yourself programs out there, it was only a matter of time before “do it yourself” came to tech support with Fix it Center Pro.
Windows 7: Load and Configure Windows XP Mode
March 2012By setting up the virtual Windows XP mode within Windows 7, you can greatly extend the functionality of your new environment.
SQL Q&A: Fine Tuning for Optimal Performance
March 2012Duplicate indexes, cancelled rollback operations and I/O spikes can cause performance issues, but you can work around them.
Microsoft Service and Support: Fix It Expedites Troubleshooting
March 2012Your troubleshooting efforts will be more efficient and more accurate with the new Microsoft Fix it Center Pro.
Windows PowerShell: Access Databases from PowerShell
March 2012You can configure Windows PowerShell to use data stored in a SQL Server database. Here’s how.
Cloud Computing: Cloud Provisioning and Storage
March 2012Beyond the flexibility and costs savings of cloud computing are certain tactical advantages like automated provisioning and encrypted storage.
Virtualization: Virtualization in and Beyond the Cloud
March 2012Virtualization technology might be driving the cloud computing environment, but that’s just one of its many benefits.
Security Management: The Scary New Hacking Trend
March 2012You can mitigate the risks of falling prey to a disturbing new trend in hacking, but you have to be prepared.
Windows Confidential: Why Can’t We All Just Work Together?
March 2012One danger of designing an interoperability document is that you might find nobody wants to implement any of your specs.
IT Management Issues: Network Intelligence—the IT Advantage
March 2012Unlocking the intelligence inherent to your network of contacts can breed significant intellectual advantage.
Geek of all Trades: The Rule of 3
March 2012When it comes to demystifying Windows 7 licensing practices, it helps to remember the “Rule of 3.”
Microsoft Exchange Server 2010: Exchange Archiving and Compliance
March 2012Establishing and maintaining an archive within your Exchange Server 2010 infrastructure is essential, but there are right ways and wrong ways.
Toolbox: New Products for IT Professionals
March 2012This month’s tools let you mine files and folders for e-mail addresses, perform bulk file-renaming tasks, and test your attack surface and port exposure online.
Utility Spotlight: Scan for Problems in Microsoft Outlook
March 2012The Microsoft Outlook Configuration Analyzer Tool scans your Outlook profiles to identify any potential issues.
Windows PowerShell: Revisiting Reports
February 2012Text-based reports can be dull and less informative, so why not use Windows PowerShell to generate HTML reports?
SQL Server: SQL Server Delays Demystified
February 2012You can use the tracking data for SQL Server transaction wait times to find overused resources and eliminate bottlenecks.
Exchange Queue &A: Migration Management
February 2012Managing the migration process is always an issue. There are several ways to better streamline and control the process.