Articles by Brien M. Posey 

Windows 2000 Task Scheduler to the rescue

Dont leave workstation optimization to chance. Use Windows 2000s Task Scheduler to periodically optimize your workstations.

Planning Active Directory domains, forests, and trusts

Rolling out a Windows 2000 Active Directory on your network is no easy task. This is the second part of a series that will guide you through the steps of creating an effective Windows 2000 Active Directory structure for your network.

Designing an Active Directory naming scheme

This is the first part of a multi-article series that will guide you through the steps of creating an effective Windows 2000 Active Directory structure for your network.

Make the Windows 2000 Network Monitor work for you!

Protocol analyzers can be tricky to use, but they're invaluable in tracking down encryption problems and other security issues. This article describes the built-in Windows 2000 Network Monitor tool and walks you through an example of putting it to use.

Understand the differences between public key and symmetric key encryption

Data security is always a trade-off between transmission speed, and processing time--the quicker and faster you need to send information, the less secure its likely to be. Find out what youre trading off when you enable different types of encryption across a Windows 2000 network.

Understanding the IPSec protocol

The IPSec protocol expands on IP--and it's perhaps the best way to secure your legacy applications.

Windows 2000 security-enabled protocols

The Windows 2000 security model is multifaceted--it's designed to provide security at every turn.

Active Directory: Modifying Default Permissions

Sometimes it's useful to change the default permissions in your Windows 2000 Active Directory setup. This article tells you why you might want to change these defaults.

Get the Latest Scoop with Enterprise Networking Planet Newsletter