TechNet Magazine Blog

The official blog of TechNet Magazine

August, 2008

  • Inside SharePoint: SharePoint Directory Integration

    Pav Cherny discusses the limitations of the built-in Directory Management Service in SharePoint and explains how you can replace this component with a custom solution that lets you synchronize SharePoint recipient information with other directory solutions...
  • Security: Understanding Shared Account Password Management

    " One of the common things that administrators must deal with on an ever-increasing basis is the regular changing of the password for shared and privileged accounts, such as the built-in administrator or root account, a firecall account, or perhaps...
  • Utility Spotlight: Windows Memory Diagnostic

    Suppose one of the PCs you support is acting up—freezing, crashing, blue screening. Is some piece of hardware failing? Is some newly installed application causing trouble? Or could it be faulty memory? One way to find out for sure is with the free Microsoft...
  • Exchange Queue & A: September

    Henrik Walther answers your questions about Microsoft Exchange. Here’s just a sample of the ones he tackles in the September issue of TechNet Magazine: Q I'm currently planning a migration from Exchange Server 2003 to a new Exchange Server 2007 organization...
  • Take Your Line of Business Applications Mobile

    Beyond traditional voice, messagin g, and productivity functions, many businesses today want mobile professionals to have access to the same line of business systems they use in the office through mobile LOB applications, adding new considerations for...
  • Anatomy of a Malware Scam

    Back in the Winter 2005 issue of TechNet Magazine , when TechNet Magazine was still in its infancy, Jesper Johansson wrote a fantastic article called " Anatomy Of A Hack: How A Criminal Might Infiltrate Your Network ". Well, Jesper has written...
  • Security Watch: Passwords and Credit Cards, Part 3

    Over the past few months, Jesper Johansson has looked at how the IT security industry has been failing users at large.  In Part 1 of this series (the July 2008 installment of Security watch, Jesper described at how common security-related advice...
  • Windows PowerShell: String Theory

    Don Jones has been known to proclaim that "If you're parsing a string in Windows PowerShell, you're doing something wrong." Unfortunately, you sometimes have no choice but to work with strings. The good news is that w hile Windows PowerShell...
  • IIS 7.0: Top 10 Performance Improvements in IIS 7.0

    The latest release of IIS introduces a modular and extensible platform with improved support for common deployment and management scenarios, enabling significant performance improvements. In the latest issue of TechNet Magazine , Mike Volodarsky looks...
  • A Guide to Securing ISA Server 2006

    "While many IT pros rely on ISA Server 2006 (Internet Security and Acceleration Server 2006) to secure their technology assets, few take the extra step of securing ISA Server itself." In the September 2008 issue of TechNet Magazine , Alan Maddison...
  • Enhance TS Gateway Security with ISA Server 2006

    In today's world, you need to be able to connect from anywhere, without sacrificing either security or the user experience. And that’s what the new TS Gateway feature in Windows Server 2008 is all about—TS Gateway lets users access their desktops securely...
  • Join me at IT Connections

    Hi all, I wanted to make sure I gave you all plenty of time to plan ahead so that you and your team are able to join me at the new IT Connections conference this year, being held October 6 through October 8, 2008 in San Francisco, CA. This is a brand...
  • September 2008 issue of TechNet Magazine

    Even if you’re not headed back to school, it’s academic— our September issue will take you to the head of the class. Features Many organizations rely on ISA Server 2006 to secure their environment, but few take the important step of securing ISA Server...
  • New ENERGY STAR Compliant Power Management Tool

    Just a quick update for all you energy conscious IT professionals.  Microsoft has launched a new Desired Configuration Management (DCM) pack for Microsoft System Center Configuration Manager 2007 . The new pack fully complies with ENERGY STAR configuration...
  • The Desktop Files: Windows Deployment Services 101

    Wes Miller continues digging into Windows Deployment Services. In this column , he explores the different versions of WDS, shows you how you can capture a custom operating system image, and tells you what you need in order to perform more automated installations...
  • Hey, Scripting Guy!: Taking the Express Route

    With Windows Vista, t he UserAccounts.CommonDialog ActiveX control for opening a file open dialog box no longer exists. Here's a look at how you can solve   that problem using Visual Basic. No, wait. Don't run off saying "I don't have that!"...
  • Security Watch: Passwords and Credit Cards, Part 2

    In the July 2008 issue of TechNet Magazine , Jesper Johansson discussed common security-related advice and common practices that are outdated , and he outlined how these common yet poor practices actually hinder security efforts and put users at great...