Migrating to a Load Balanced IIS 6 Environment
Migrating to IIS 6 can be a daunting process. Depending on your existing hosting configuration, the process can take hours, days, or even weeks. Careful planning and research is integral to a successful migration.
Dig Deep, Display Shallow With Splunk
Tired of teasing through server logs with grep? Consider putting Splunk's AJAX-powered log analysis tools to work.
Password Gorilla
Many internet services require you to 'log in.' You choose a user name and a password, in combination called a 'login,' that authenticate you to the service.
Instant Messaging and Collaboration Converge
The attraction for businesses is that IM can increase productivity though improved communications and collaboration. Since all IM systems provide communication by definition, the key differentiator that will determine which enterprise IM systems will be successful is likely to be the collaboration element: the extent to which an IM system works with or is integrated with other corporate collaboration tools, such as shared work spaces, calendaring, directories and e-mail.
Securing Server 2003 Domain Controllers
Because the domain controller, as its name implies, in many ways has control over your Windows domain and all of the computers that belong to it, it is essential that you take extra precautions to ensure that your DCs are and remain secure. In this article, we will look at a few of the important security measures you should take in regard to your domain controllers.
Macintosh Internet Security Guide
This page provides links to background information, security vendors, comparative and individual reviews of personal firewall, anti-virus, anti-spam, privacy and suites of software as well as hardware firewalls and anti-theft services to help you protect your Macintosh desktop or laptop computer.
Security of the Internet
Three basic security concepts important to information on the Internet are confidentiality, integrity, and availability. Concepts relating to the people who use that information are authentication, authorization, and nonrepudiation.
The Top 20 Most Critical Internet Security Vulnerabilities
Online Free
WWW Security
The chapter contains an introduction to cryptography, it then presents a protocol for safe communication in a client-server application and concludes with an example of how this protocol is used for buying a book through the World Wide Web.
A Beginner's Guide to Effective Email
Email is cheaper and faster than a letter, less intrusive than a phone call, less hassle than a FAX. Using email, differences in location and time zone are less of an obstacle to communication. There is also evidence that email leads to a more egalitarian information structure.
Apache Session Management Within Dynamic Sites - Free eBook Apache Session Management Within Dynamic Sites - Download ebook Apache Session Management Within Dynamic Sites free
|