TechNet Magazine September 2013
Identity Management:Use two-factor authentication to mitigate fraud
You can – and should – use two-factor authentication with mobile and desktop devices. Dan Griffin, Tom Jones
Windows 8:File history explained
File History is a new automated system for continuously protecting your personal files stored in several key locations. Bohdan Raciborski
SharePoint:Secure SharePoint content
Keeping the content stored within your SharePoint storage resources secure may be more complicated than you thought. Dan Sullivan
Cloud Computing:Challenges in cloud configuration
The selection, configuration and performance of your cloud-based applications will have a massive impact on performance. Dan Marinescu
There’s an entirely new printer support architecture built into Windows 8 that improves support both now and in the future. Adrian Lannin
Security:Don’t forget the basics
While much of the focus – and much of the funding – goes to advanced security technologies, it pays to not overlook the fundamentals. John Vacca
Active Directory:Protect your Active Directory data
There are a number of tactics for ensuring only the right people have access to the right data within your Active Directory infrastructure. Darren Mar-Elia
Windows 7:Manage disks and file systems
You can configure and reconfigure disks, files, partitions and volumes to suit your specific needs. Jorge Orchilles
칼럼
Editor's Note:Secure new platforms
Besides contending with an evolving cast of new viruses, malware, and other threats, you have to secure new platforms and new technologies.Lafe Low
|
Windows Confidential:Brand loyalty
The Windows 95 10K program goes on tour to promote Windows 95 (and silences an annoying IT person).Raymond Chen
|