Articles by Brien M. Posey 

Working with the NETSTAT Command

Windows' NETSTAT command is a great utility for helping you to diagnose and repair TCP/IP problems. Although it will certainly never replace traditional diagnostic utilities like PING or TRACERT, NETSTAT is a welcome addition to the reportoire. Learn when and how to use NETSTAT in this article.

What Do You Want to Block Today?

Windows XP's built-in firewall may be a step in the right direction, but it can also be a double-edged sword. Read about the security advantages and limitations in Microsoft's latest offering.

Windows XP Networking: A First Look

We have all heard many positive and a few negative issues regarding the much anticipated release of Windows XP. To Network Managers, the main question will be whether to upgrade or not. To begin with, MSCE Brien M. Posey takes a look at the network configuration capabilities of the new OS.

Troubleshooting Group Policies, part 5

Take out insurance on your group policy! Group policies are a primary method for network managers to handle security in Windows 2000. In part five of this series, we describe what to do when existing group policies require repair.

Troubleshooting Group Policies, part 4

Take out insurance on your group policy! Group policies are a primary method for network managers to handle security in Windows 2000. However, things can go wrong. Our stalwart MCSE steps through the possible pitfalls, shows you solutions, and presents tips on how to avoid such problems before they occur. In part four, we look at some common group policy-related problems.

Troubleshooting Group Policies, part 3

Take out insurance on your group policy! Group policies are a primary method for network managers to handle security in Windows 2000. However, things can go wrong. Our stalwart MCSE steps through the possible pitfalls, shows you solutions, and presents tips on how to avoid such problems before they occur. In part three, we look at some specific troubleshooting techniques you can employ.

Troubleshooting Group Policies, part 2

Take out insurance on your group policy! In this installment, we look at how to document your group policies in Windows, and narrow down where problems may lie.

Sniffing Out Packet Sniffers

In a large enough enterprise, malevolent hackers may use on-site packet sniffing to learn the ins and outs of your network. How can you detect this problem, and what can you do about it? Brien M. Posey offers the techniques necessary to track down unwarranted sniffing.

Troubleshooting Group Policies, part 1

Take out insurance on your group policy! Group policies are a primary method for network managers to handle security in Windows 2000. However, things can go wrong. Our stalwart MCSE steps through the possible pitfalls, shows you solutions, and presents tips on how to avoid such problems before they occur.

Using DNS on Multihomed Computers, Part 2

Occasionally, you may wish to configure a client logging into a Windows server for two Network Interface Cards. Such Multihomed computers are likely to have issues when being set up for Windows' dynamic DNS servers. In this series, our stalwart MCSE explains the issues and how to confront them.

Using DNS on Multihomed Computers, Part 1

Occasionally, you may wish to configure a client logging into a Windows server for two Network Interface Cards. Such Multihomed computers are likely to have issues when being set up for Windows' dynamic DNS servers. In this series, our stalwart MCSE explains the issues and how to confront them.

VPN Configurations To Avoid Under Windows

Setting up a Virtual Private Network can be the path to security ruin, if you're not careful about how you establish some of your Windows settings. We show you what to avoid, and why.

Adjusting Windows 2000 Server Priorities, Part 3

This week we take a look at Win2K support tool, Process Viewer. We show you how to establish how much processor time each process takes up, and how to change their priority or even kill the process. Third in a series.

Troubleshooting Win2K and NetWare Interoperability

Getting networks to play well together isn't always as easy as it should be -- especially when you may have inherited one as the result of a merger.  Written from the perspective of a Windows networking manager, we take a look at how to get Novell and Microsoft networks to co-exist and provide transparent services for users.

Adjusting Windows 2000 Server Priorities, Part 2

In Part 2 of our series on how to prioritize Windows 2000's services, we look at some of the problems such tweaking can cause, and how to avoid them.

Adjusting Windows 2000 Server Priorities, Part 1

Windows 2000 can be told how to adjust the priorities for multitasking purposes, such as user requests vs. background services. This can be a powerful tool for speeding up your server, but can also turn heavily against you if not handled correctly. In this series, MCSE Brien M. Posey tells you how to tweak these priorities, identifies the issues, and shows how to handle them.

Making Proxy Server Work in a Windows 2000 Environment

Sometimes you just have to make a legacy work. Under some circumstances, networkers may prefer to use Microsoft's Proxy Server rather than Win2K's Internet Connection Sharing Service. MCSE Brien M. Posey walks you through the process.

Connecting a Client to a RIS Server with a RIS Boot Disk

It's easy to connect clients to a Remote Installation Services server--if you can find the directions anywhere. Here's a quick and easy way to make the client connection.

Opening Separate Program Windows with the Start Command

Windows 2000's Start command opens new windows for programs to run in. Among other things, this handy command will let you get around Windows 2000's insistence on running all 16-bit applications in a single memory space, at a set priority.

The Microsoft Web Outage: What Went Wrong?

Microsoft's Web site was pounded recently--and in the blinding glare of hindsight, the factors that made the attacks possible were easy to spot.

Running 16-Bit Applications as a Separate Process

Your legacy 16-bit applications will run much more slowly than 32-bit apps on Windows 2000, because of the translation process. Here's how to speed them up.

Using Ghost to Quickly Recover a Server

After you spend days restructuring a network or preparing to bring new systems online, you don't want to have to repeat your work due to a devastating crash. You need the best possible safeguard to back up your system and restore it, if need be.

Auditing Active Directory and Reviewing Audit Logs

Auditing is a vital component of network security. You should edit a number of Active Directory events--and be sure to read the audit logs on a daily basis.

Repairing the Master Boot Record

Viruses and programs gone haywire can damage one of the most important components of your hard drive: The Master Boot Record. Brien Posey explains how the damage can occur, and how you can fix it.

Working with the UDF File System

Windows 2000 supports the Universal Disk Format, which goes beyond the capabilities of FAT, NTFS, and other file systems you may be more familiar with.

Get the Latest Scoop with Enterprise Networking Planet Newsletter