John Howie

John
Howie

John Howie is the Chief Operating Officer of the Cloud Security Alliance. He is also a visiting professor at the University of Arizona and at Edinburgh Napier University.

Articles
The Inevitability of IPv6, Part 1
Learn about some of the new features of IPv6, as well as some of the reasons you should care about it—even if you don't plan on implementing it in the near future.
Microsoft Forefront Security for Exchange Server
Forefront for Exchange is designed to overcome the limitations of any one email server antivirus product by running up to five antivirus engines simultaneously. See how to set up and manage Forefront on Exchange 2007 servers that host mailboxes.
Microsoft Office SharePoint Server 2007 and RMS 2
MOSS's Information Rights Management (IRM) feature gives administrators and users control over how others can use Office files within SharePoint and after they're downloaded.
Enterprise Event Logging for SMBs
These event log collection and management tools might have been designed as enterprise solutions, but SMBs with extensive logging needs will want to explore these products.
Toughening Up Virtual Server 1
Are you about to jump on the virtualization bandwagon? Before you do, you need to be aware of the technology's real security concerns. Here are some practical solutions that you can use.
MOM Management Packs
MOM provides a powerful way to monitor your servers and business-critical infrastructure. Management packs for MOM let you monitor a wide range of server-health indicators and alert you to critical events that require intervention.
MOM for SMBs
MOM 2005 Workgroup Edition is designed for use in networks with up to 10 servers. Here's how to prepare for, install, and use it.
Secure VPN Alternatives
VPNs will always have a place in some companies, but here are some alternatives that provide more security.
Security Log Collection 1
Select the right security log management tool for your company.
When You Must Use Passwords
Use these guidelines in situations in which you must use passwords for authentication.
Authentication Options 1
The problems associated with using usernames and passwords for authentication are causing many companies to search for alternative authentication methods. Here are three options.
Windows Server 2003 Certificate Services - 26 May 2006
Windows Server 2003 Certificate Services contains new features and improved security. Three key new features are Version 2 certificate templates, key archival and recovery, and delta Certificate Revocation Lists (CRLs).
Reaping the Benefits of WPA and PEAP 3
Learn about the benefits and configuration steps for securing your wireless networks by using WPA or WPA2 technology.
Securing Networks with WPA-PSK and WPA2-PSK 2
Learn the steps for securing your wireless networks via WPA or WPA2 and Pre-Shared Key technology.
Collecting and Analyzing Event and System Logs
Use EventCombMT to collect event and system logs from multiple remote locations.
Master-Level Microsoft Stack Training with John Savill

Get 30 hours of comprehensive training covering the complete Microsoft solution stack. Invest a few hours each week and become the #1 Microsoft expert in your organization.

Past Sessions Available for Instant Access!
Semester 2: January 22nd to February 19th
Access to Recordings through May 20, 2015

John Savill will cover topics including:

* Deploying, Managing, and Maintaining Windows
* Key Features of Active Directory from Windows 2000 to Windows Server 2012
* Key elements of System Center 2012 and System Center 2012 R2
* Deploying, Migrating to and Managing Hyper-V in Your Organization
* Implementing a Private Cloud
* Using PowerShell to Automate Common Tasks
* PLUS a preview of Windows 10

 

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×