Shawn Porter

Shawn
Porter

Shawn Porter is a freelance writer and coauthor of CIW Security Certification Bible (Hungry Minds).

Articles
Sharing Internet Connections with NAT
NAT is a popular way to share out a common Internet IP address to systems within your network. Learn how to configure and secure the NAT service on Win2K Server.
Security Considerations for Migrating from NT to Win2K, Part 5
Windows 2000 Service Pack 2 (SP2) solves many security problems, including several important Internet Information Servers (IIS) 5.0 vulnerabilities, but you need to perform some basic steps to secure IIS.
WatchGuard ServerLock 1.1
Quickly beef up your security.
PrivateArk 1.41
Lock down your organization's security.
NetPulse 2000
Get a handle on fundamental system security.
Security Considerations for Migrating from NT to Win2K, Part 4
Learn about the additional security that IPSec can provide for AD domains and individual Win2K workstations.
Security Considerations for Migrating from NT to Win2K, Part 3
Learn about PKI and EFS and the considerations involved in implementing these great new Win2K security features.
Two Handy Win2K Features
Administering your Active Directory environment is easier and more secure with two built-in Windows 2000 options: the Delegate option and the Runas command.
Security Considerations for Migrating from NT to Win2K, Part 2
Learn the fundamentals of using Active Directory’s Group Policy to implement basic security features in Windows 2000.
Terminal Services: Friend and Foe 15
One great feature in Windows 2000 Server is Terminal Services. Installing Terminal Services, however, requires thought and attention to security, or you could open a large security hole in your network.
Where to Find Service Pack 1 and Hotfixes
The Web offers resources for helping you keep up-to-date with service packs and hotfixes. Here are a few sites you’ll find useful.
Security Considerations for Migrating from NT to Win2K, Part 1
In the first installment of this multipart series, you’ll learn about the steps you take to initially configure Win2K: patch the system, disable services, and enable basic security policies.
Specter 5.01
Learn how you can use this honeypot-deception software to trick would-be intruders into thinking they are accessing your systems and to respond to them.
Retina 3.0
Find out about the Common Hacking Attack Methods (CHAM) and Fix-It features in the latest version of eEye Digital Security's Retina 3.0 security scanner for Win2K and NT networks.
LT Auditor +, 7.0
Check out this Windows-based intrusion detection and audit trail security software. LT Auditor +, 7.0, provides 24x7 monitoring of network activity across the enterprise, protecting organizational assets accessible through NT and Novel networks.
Master-Level Microsoft Stack Training with John Savill

Get 30 hours of comprehensive training covering the complete Microsoft solution stack. Invest a few hours each week and become the #1 Microsoft expert in your organization.

Past Sessions Available for Instant Access!
Semester 2: January 22nd to February 19th
Access to Recordings through May 20, 2015

John Savill will cover topics including:

* Deploying, Managing, and Maintaining Windows
* Key Features of Active Directory from Windows 2000 to Windows Server 2012
* Key elements of System Center 2012 and System Center 2012 R2
* Deploying, Migrating to and Managing Hyper-V in Your Organization
* Implementing a Private Cloud
* Using PowerShell to Automate Common Tasks
* PLUS a preview of Windows 10

 

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×