October 2007Some people have been skeptical of the cryptographic functionality built into Windows Vista. Here’s a look at the design philosophies that went into BitLocker and why it should be taken seriously.
Category: Microsoft Technet
Microsoft Monthly Technet Utility Spotlight
SQL Server: Optimizing SQL Server CPU Performance
October 2007The key to healthy CPU utilization on your database server is to make sure that the CPU is spending its time processing what you want it to process rather than wasting cycles on poorly optimized code or sluggish hardware. Here are some tips…
Utility Spotlight: Virtual Machine Remote Control Plus
October 2007The Virtual Server 2005 interface is a Web application, offering the conveniences of Web-based management. But sometimes you want a rich UI that behaves like a Windows application.VMRCplus gives you an alternative UI that offers easy config…
From the Editor: The Best is Yet To Come
October 2007From the Editor: The Best is Yet To Come
The Cable Guy: The Authenticated Internet Protocol
October 2007The Internet Key Exchange protocol and Authenticated Internet Protocol are both used to determine keying material and negotiate security parameters for IPsec-protected communications. Get an in-depth look at how they work.
Toolbox: New Products for IT Pros
October 2007Toolbox: New Products for IT Pros
Hey, Scripting Guy!: Let There Be Silverlight
October 2007Silverlight makes it easy to create cool user interfaces and multimedia presentations. And it seems to work well in HTML Applications, or HTAs. The Scripting Guys show you how to give Silverlight a try.
SQL Q&A: Login Triggers, Data File Defrags, and More
October 2007
SQL Q&A: Login Triggers, Data File Defrags, and More
The Desktop Files: The Power User’s Guide to WIM and ImageX
October 2007Dive into ImageX, finding out about changes for Windows Server 2008 and the right way to use command switches when creating or updating WIM files.
Windows Confidential: Calling Dr. Watson
October 2007
Why does using Dr. Watson to take a memory dump of Winlogon bring down the entire system? This isn’t an accident. Explore the world of Task Manager and critical system files to find out why.
Windows PowerShell: Securing the Shell
September 2007
When designing Windows PowerShell, Microsoft gave security a leading role. And it shows. Take a look at some of the key security features and settings, such as credential handling and execution policies, that ensure Windows PowerShell won’t fall game to the same problems that VBScript enabled.
Windows Vista: Deploying Windows Vista with BDD 2007
September 2007
Your organization is ready to migrate from Windows 2000 or Windows XP to Windows Vista, and the project is your responsibility. Don’t fret. Here’s a step-by-step guide to how you can use the Business Desktop Deployment 2007 Solution Accelerator to simplify your Windows Vista deployment.
The Desktop Files: PC Recovery with Windows PE
September 2007
Windows Vista offers some valuable tools that make system recovery quite easy. But for large, diversified organizations, out-of-the box solutions don’t usually work. If you’re in a large company that needs to build customized self-recovery solutions, don’t miss this discussion about building your own recovery solution with Windows PE.
Windows Vista: A Guide to Windows Vista Backup Technologies
September 2007
Backup is something many people ignore until it’s too late. But there’s no excuse for this, especially now that the new Windows Vista Backup and Restore Center offers a variety of features that make it easy to protect your data against most forms of data loss. Find out how you can plan a complete recovery strategy with Windows Vista.
Windows Server: 11 Essential Tools for Managing Active Directory
September 2007In a large organization, even the most common Active Directory tasks, such as adding and modifying objects, can be tedious and time-consuming. These 11 tools can make Active Directory management a lot easier.
Exchange Queue & A: Setup, Message Journaling, Storage Options, and More
September 2007Learn how you can use message journaling to monitor e-mail in your company, find out if Office 2003 users can use Unified Messaging, examine storage options for your Exchange 2007 implementation, get answers about connecting to Exchange …
Utility Spotlight: PageDefrag
September 2007The typical Windows defrag tool can optimize most of the files on your hard drive. But certain items, such the Windows page file and Registry hives, are beyond the powers of most defragging tools. This utility, created by Mark Russinovich…
Windows Confidential: The Known DLLs Balancing Act
September 2007The Known DLLs feature was included in Windows as a way to improve performance. Find out how it works, and take a close look at how this feature has changed over time.
Windows Server: Reanimating Active Directory Tombstone Objects
September 2007
There are a few essential tricks and tools that should be included in every Active Directory disaster-recovery plan. Tombstone reanimation is one of these techniques, offering the only way to recover deleted objects without taking a domain controller off line. Here’s a guide to finding and recovering tombstones in Active Directory.
Communications: Connecting Users with Office Communications Server 2007
September 2007Unified communication is here. Take a tour of the Microsoft Office Communications Server 2007 and find out how integrated messaging, voice, video, and conferencing features can help to improve productivity and enhance long-distance collab…