The Industry Insiders

Insight from the heart of the IT industry

Browse by Tags

Related Posts
  • Blog Post: NDS Migrations

    So, you have finally decided to bite the bullet and embark on an NDS to AD migration. Whilst such as decision is not to be taken lightly the release of Windows 2003 and Exchange 2003 Microsoft has provided a number of very compelling reasons to go through this pain and a growing number of Enterprises...
  • Blog Post: Certificate Server Enterprise Edition and Smart Cards

    The following article was kindly written by Adrian Beasley General I have recently installed Certificate Services on a Windows Server 2003 R2 Enterprise Edition machine, in order to make available version 2 certificate templates, which are configurable, and I have been investigating these, and the...
  • Blog Post: An Overview of the Active Directory Design Process

    Goals and Gathering Information The first thing to do is ask yourself why you are about to install Active Directory. You will need to research the various features and evaluate exactly how some of these features will benefit your business in some way. You may be looking to simplify your current Windows...
  • Blog Post: Practical Exchange Service Delivery Reporting

    David Sengupta, Exchange MVP With e-mail at the core of corporate communications today, gaining deeper and broader reporting insight into the operations and usage of your corporate Exchange environment is becoming critical for effective Exchange management. Understanding Microsoft Exchange usage...
  • Blog Post: Microsoft BI and the importance of users

    Recently, I took part in a discussion, where a number of people were debating the need to have a business representative or business-focused Project Manager involved in the design stages of a data warehouse. My own view is that business users should have input at every stage of the development. User...
  • Blog Post: Information Security; The Business Enabler

    By Paul Vincent Don’t get me wrong, I’m a tecchie. There was a time (and it wasn’t that long ago!) when I could name and identify the function of pretty much every Group Policy Object setting in Windows XP. However, Information Security is more than setting every security related configuration...
  • Blog Post: The Pro’s and Con’s of System Lockdown

    The Pro’s and Con’s of System Lockdown By Rodney Buike Locking down desktops is becoming more and more prevalent in today’s corporate environment. Malware, viruses, malicious users and laws like SarbOx are putting the pressure on IT staff to remove users as local admin’s and lockdown systems. In...
  • Blog Post: When Writing Software, Security Counts

    When Writing Software, Security Counts By Matthew Fisher The life of your average IT Security engineer is becoming more difficult every day. The tools they employ are becoming more complicated and varied, as are the threats they face. On top of that, they must fight a growing tide of hacks against...
  • Blog Post: ActiveSynching Between Exchange Server 2007 and Windows Mobile 6

    Adrian Beasley General Inspired by recent TechNet sessions and User Group meetings, where I heard expounded the wonders of Windows Mobile 6, and its close integration with Exchange Server 2007, I bought a top-of-the range mobile phone, an HTC TyTN11, (specifically because it ran WM6,) and entered...
  • Blog Post: Connecting a Windows SmartPhone to Exchange Server Protected with a Private Certification Authority Digital Certificate

    Brian Reid – C7 Solutions Ltd – 25 July 2005 Having recently obtained my first Windows Mobile powered SmartPhone, I needed to connect to my Exchange Server over the internet using ActiveSync. For those of you unfamiliar with Windows Mobile SmartPhones, they let you connect, using the phones internet...
  • Blog Post: Windows Server 2008 Protection from Accidental Deletion

    By Richard Siddaway, Microsoft Practice Leader, Centiq Ltd With each new version of the Windows Server Operating System there are new possibilities for automation to help make the administrator’s job easier. Automation brings increased efficiencies but also brings the possibility of bigger mistakes...
  • Blog Post: More details on Office Communicator Server 2007

    Dennis Lundtoft Thomsen It's hardly groundbreaking news that Microsoft is entering the VoIP market, the real news is that Microsoft is disclosing more and more details publicly (I'm member of the private beta for Office Communicator Server 2007, but all the information we get is covered under NDA...
  • Blog Post: Windows 2008 protection from Accidental deletion

    Many thanks to Richard Siddaway for his article on protecting AD objects from Accidental Deletion. Well worth a read if you've ever deleted the wrong thing from AD.
  • Blog Post: Implementing BlackBerry in an Exchange Environment

    In many large organizations, the infamous BlackBerry has almost become de rigueur among executives. Increasingly, Exchange organizations may find that senior management has requested them get BlackBerry up and running--quickly. In this article I will discuss issues of interest to those who want to...
  • Blog Post: Planning for Migration Success

    As you are aware the life of Exchange 5.5 is coming to an end. Consequently over the last 12 months more and more migrations from Exchange 5.5 to Exchange 2003 have been embarked on. In actual fact Microsoft reported a third quarter revenue growth of 12% over the prior year resulting from double-digit...
  • Blog Post: Enterprise Level Inbound and Outbound Faxing

    Mark Arnold The Problem Consider the numbers involved. A customer needed to send out approximately 20,000 fax messages per week from a mainframe and middleware environment in a data centre but that data centre did not have voice channels, and the administrative effort to cajole the data centre...
  • Blog Post: Sloppiness within Design and Implementation.

    Mark Arnold Background. It might seem an obvious point to make but it is all too often overlooked. Setting your servers up in a structured and repeatable manner is essential in order to maintain the stability of your operating environment. Too many server teams are setting the servers up from a paper...
  • Blog Post: Business Intelligence and the importance of users

    It's about time there were a few business intelligence posts on Industry Insiders so I am pleased to get an article about the Microsoft BI and the importance of users in form Jennifer Stirrup from Aspective - a Vodafone company. Jennifer has over ten years experience in working with SQL Server, and has...
  • Blog Post: A General Defence Against Injection Attacks on Websites

    By Adrian J. Beasley The usual range of IT Security techniques is of little use against injection attacks. They can mitigate some of the effects of such attacks by, for example, setting proper permissions on resources, and ensuring that access from websites is under a user with the appropriate least...
  • Blog Post: Installing New Cryptographic Service Providers

    The following article was kindly written by Adrian Beasley General That splendid company Smartcard focus (**ED - the broken link is now fixed**), purveyors of smart cards and ancillary equipment to the general public, has a number of types of card available, not all of them smart (many types are...
  • Blog Post: Creating Subject Alternative Name Certificates with Microsoft Certificate Server

    Brian Reid A new feature in digital certificates is the Subject Alternative Name property. This allows you to have a certificate for more than one URI (i.e. www.c7solutions.com and www.c7solutions.co.uk ) in the same certificate. It also means that in web servers such as IIS you can bind this certificate...
  • Blog Post: SQL Server 2005 Integration Services (SSIS): Custom Logging Using Event Handlers

    SSIS: Custom Logging Using Event Handlers SQL Server Integration Services (SSIS) contains some really useful logging procedures but as with most things in SSIS, it is extensible. There are 2 methods of extending the logging capability of SSIS: Build a custom log provider Use event handlers...
  • Blog Post: Insider's Guide to Comparative Anti-Virus Reviews

    By David Harley There has been a certain amount of excitement and irritation in anti-virus research circles about a not-very-good comparative test of antivirus scanners that was conducted at LinuxWorld on 8th August, 2007. I was so exercised personally that I sat down and wrote a long white paper...
  • Blog Post: Using the Sender Policy framework with Exchange SP2

    Sender Policy Framework (SPF) is a type of DNS record created to help stop Spam. A lot of anti-spam filters include a filter to look for SPF records and if they are forged, block the messages. The easiest way to describe SPF is to call it a reverse MX record. If a spammer sends an email from xyz@domain...
  • Blog Post: Resolving Issues with RIS and Windows XP

    By Mark Wilson Senior Consultant Conchango. Problems with certain NICs and a RIS-based Windows XP installation After my hard disk failure last month, I decided to resurrect a project that I had shelved some time ago - implementing an unattended setup for my PCs at home. I have a variety of computers...