Shawn Porter

Shawn
Porter

Shawn Porter is a freelance writer and coauthor of CIW Security Certification Bible (Hungry Minds).

Articles
Sharing Internet Connections with NAT
NAT is a popular way to share out a common Internet IP address to systems within your network. Learn how to configure and secure the NAT service on Win2K Server.
Security Considerations for Migrating from NT to Win2K, Part 5
Windows 2000 Service Pack 2 (SP2) solves many security problems, including several important Internet Information Servers (IIS) 5.0 vulnerabilities, but you need to perform some basic steps to secure IIS.
WatchGuard ServerLock 1.1
Quickly beef up your security.
PrivateArk 1.41
Lock down your organization's security.
NetPulse 2000
Get a handle on fundamental system security.
Security Considerations for Migrating from NT to Win2K, Part 4
Learn about the additional security that IPSec can provide for AD domains and individual Win2K workstations.
Security Considerations for Migrating from NT to Win2K, Part 3
Learn about PKI and EFS and the considerations involved in implementing these great new Win2K security features.
Two Handy Win2K Features
Administering your Active Directory environment is easier and more secure with two built-in Windows 2000 options: the Delegate option and the Runas command.
Security Considerations for Migrating from NT to Win2K, Part 2
Learn the fundamentals of using Active Directory’s Group Policy to implement basic security features in Windows 2000.
Terminal Services: Friend and Foe 15
One great feature in Windows 2000 Server is Terminal Services. Installing Terminal Services, however, requires thought and attention to security, or you could open a large security hole in your network.
Where to Find Service Pack 1 and Hotfixes
The Web offers resources for helping you keep up-to-date with service packs and hotfixes. Here are a few sites you’ll find useful.
Security Considerations for Migrating from NT to Win2K, Part 1
In the first installment of this multipart series, you’ll learn about the steps you take to initially configure Win2K: patch the system, disable services, and enable basic security policies.
Specter 5.01
Learn how you can use this honeypot-deception software to trick would-be intruders into thinking they are accessing your systems and to respond to them.
Retina 3.0
Find out about the Common Hacking Attack Methods (CHAM) and Fix-It features in the latest version of eEye Digital Security's Retina 3.0 security scanner for Win2K and NT networks.
LT Auditor +, 7.0
Check out this Windows-based intrusion detection and audit trail security software. LT Auditor +, 7.0, provides 24x7 monitoring of network activity across the enterprise, protecting organizational assets accessible through NT and Novel networks.
NEW: John Savill's Microsoft Azure Master Class

A new Master Class with John Savill! Get 12 hours of detailed instruction covering that will make you the Master of Microsoft's Public Cloud!

During this training attendees will learn:

* How and when to use Azure
* How to integrate Azure with existing infrastructure including networking and Active Directory
* How to Implement single pane of glass management for a complete hybrid environment

Thursdays, July 24th through August 14th
 

Upcoming Conferences

Register now to get the best rates available!

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×