By Lafe LowBesides contending with an evolving cast of new viruses, malware, and other threats, you have to secure new platforms and new technologies. And old security techniques and tactics won’t work as well on newer technologies such as mobile devices, cloud computing and virtual infrastructure.
Windows 7: Manage disks and file systemsBy Jorge OrchillesYou can configure and reconfigure disks, files, partitions and volumes to suit your specific needs.
Active Directory: Protect your Active Directory dataBy Darren Mar-EliaThere are a number of tactics for ensuring only the right people have access to the right data within your Active Directory infrastructure.
Security: Don’t forget the basicsBy John VaccaWhile much of the focus—and much of the funding—goes to advanced security technologies, it pays to not overlook the fundamentals.
Cloud Computing: Challenges in cloud configurationBy Dan MarinescuThe selection, configuration and performance of your cloud-based applications will have a massive impact on performance.
Windows 8: File History explainedBy Bohdan RaciborskiFile History is a new automated system for continuously protecting your personal files stored in several key locations.
Identity Management: Use two-factor authentication to mitigate fraudBy Tom Jones, and Dan GriffinYou can—and should—use two-factor authentication with mobile and desktop devices.
Windows 8: Painless printingBy Adrian LanninThere’s an entirely new printer support architecture built in to Windows 8 that will improve support both now and in the future.
SharePoint: Secure SharePoint contentBy Dan SullivanKeeping the content stored within your SharePoint storage resources secure might be more complicated than you thought.
Windows Confidential:Respect the brandBy Raymond Chen
The Windows 95 10K Program goes on tour to promote Windows 95 (and silences an annoying IT guy).