Storage Server
This article will attempt to define a storage server, differentiate it from a regular server, and give examples of storage servers on the market.
Apache Session Management Within Dynamic Sites
This article will look at how Apache can help with session management and how that information can be used with Perl and PHP scripts.
Migrating to a Load Balanced IIS 6 Environment
Migrating to IIS 6 can be a daunting process. Depending on your existing hosting configuration, the process can take hours, days, or even weeks. Careful planning and research is integral to a successful migration.
Dig Deep, Display Shallow With Splunk
Tired of teasing through server logs with grep? Consider putting Splunk's AJAX-powered log analysis tools to work.
Password Gorilla
Many internet services require you to 'log in.' You choose a user name and a password, in combination called a 'login,' that authenticate you to the service.
Instant Messaging and Collaboration Converge
The attraction for businesses is that IM can increase productivity though improved communications and collaboration. Since all IM systems provide communication by definition, the key differentiator that will determine which enterprise IM systems will be successful is likely to be the collaboration element: the extent to which an IM system works with or is integrated with other corporate collaboration tools, such as shared work spaces, calendaring, directories and e-mail.
Securing Server 2003 Domain Controllers
Because the domain controller, as its name implies, in many ways has control over your Windows domain and all of the computers that belong to it, it is essential that you take extra precautions to ensure that your DCs are and remain secure. In this article, we will look at a few of the important security measures you should take in regard to your domain controllers.
Macintosh Internet Security Guide
This page provides links to background information, security vendors, comparative and individual reviews of personal firewall, anti-virus, anti-spam, privacy and suites of software as well as hardware firewalls and anti-theft services to help you protect your Macintosh desktop or laptop computer.
Security of the Internet
Three basic security concepts important to information on the Internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation.
The Top 20 Most Critical Internet Security Vulnerabilities
Online Free
A Little Bit of Apache in an IIS World - Free eBook A Little Bit of Apache in an IIS World - Download ebook A Little Bit of Apache in an IIS World free
|