Shawn Porter


Shawn Porter is a freelance writer and coauthor of CIW Security Certification Bible (Hungry Minds).

Sharing Internet Connections with NAT
NAT is a popular way to share out a common Internet IP address to systems within your network. Learn how to configure and secure the NAT service on Win2K Server.
Security Considerations for Migrating from NT to Win2K, Part 5
Windows 2000 Service Pack 2 (SP2) solves many security problems, including several important Internet Information Servers (IIS) 5.0 vulnerabilities, but you need to perform some basic steps to secure IIS.
WatchGuard ServerLock 1.1
Quickly beef up your security.
PrivateArk 1.41
Lock down your organization's security.
NetPulse 2000
Get a handle on fundamental system security.
Security Considerations for Migrating from NT to Win2K, Part 4
Learn about the additional security that IPSec can provide for AD domains and individual Win2K workstations.
Security Considerations for Migrating from NT to Win2K, Part 3
Learn about PKI and EFS and the considerations involved in implementing these great new Win2K security features.
Two Handy Win2K Features
Administering your Active Directory environment is easier and more secure with two built-in Windows 2000 options: the Delegate option and the Runas command.
Security Considerations for Migrating from NT to Win2K, Part 2
Learn the fundamentals of using Active Directory’s Group Policy to implement basic security features in Windows 2000.
Terminal Services: Friend and Foe 15
One great feature in Windows 2000 Server is Terminal Services. Installing Terminal Services, however, requires thought and attention to security, or you could open a large security hole in your network.
Where to Find Service Pack 1 and Hotfixes
The Web offers resources for helping you keep up-to-date with service packs and hotfixes. Here are a few sites you’ll find useful.
Security Considerations for Migrating from NT to Win2K, Part 1
In the first installment of this multipart series, you’ll learn about the steps you take to initially configure Win2K: patch the system, disable services, and enable basic security policies.
Specter 5.01
Learn how you can use this honeypot-deception software to trick would-be intruders into thinking they are accessing your systems and to respond to them.
Retina 3.0
Find out about the Common Hacking Attack Methods (CHAM) and Fix-It features in the latest version of eEye Digital Security's Retina 3.0 security scanner for Win2K and NT networks.
LT Auditor +, 7.0
Check out this Windows-based intrusion detection and audit trail security software. LT Auditor +, 7.0, provides 24x7 monitoring of network activity across the enterprise, protecting organizational assets accessible through NT and Novel networks.
Microsoft Stack Master Class

Master-Level Microsoft Stack Class with John Savill
Online Class: Thursdays Oct. 12th-Dec. 21st
30 Hours of Training for $995!

Understand the complete Microsoft solution stack, how the products work together, and how to implement and maintain for a total datacenter and desktop solution. This course covers the latest technology updates including Windows Server 2016 and Windows 10 and will enable the new capabilities to be leveraged in your organization.


Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×