In the second part of this series, you'll learn how to connect wireless clients and how to ensure wireless security.
Articles by Brien M. Posey
In this article series, learn about the benefits of adding wireless capabilities to your network, beginning with configuration and performance issues.
Take advantage of Windows 2000's firewall capabilities, which let you block ports and protocols.
Even with all of Windows 2000s security features, if you dont take care of permissions at the lower levels, higher-level security features wont be effective.
To be sure you're performing a comprehensive backup in Windows 2000, you must back up the System State.
You can get a lot of mileage out of the many built-in groups that come with Windows 2000.
Putting it all together: preparing and testing the network connection between your handheld PC and Windows 2000 terminal server.
Configuring your terminal server client to remotely access the Windows 2000 server.
Brien Posey explains system requirements and the installation process for configuring terminal services on your Windows 2000 server.
Sometimes theres no substitute for being able to see the servers screen in real time. Part 1 of this series explains the basics of Windows 2000s terminal services.
On the road? In spite of significant limitations, a standard cellular phone may be your best choice for a wireless Internet connection.
How to establish an infrared link between devices with Windows 2000, and use it to exchange files, print, or transfer images from a digital camera.
You can configure your Windows 2000 remote access policies to achieve whatever level of security your organization requires.
Get on the wireless bandwagon by getting infrared capabilities up-to-speed in Windows 2000.
Part 3 in our series on auditing Windows 2000 security helps you refine your auditing techniques.
In a Windows network, mixing up the different the different techniques for sharing resources may be the way to make sure that users get access to information they need while being kept out of restricted areas.
Part 2 of Brien Poseys series on setting up audit policies, an essential element in your Windows 2000 security arsenal.
In a Windows 2000 network, you can use the MOVETREE Command to move universal groups within a domain or between domains that exist in the same forest. But beware the limitations of this tricky but powerful command.
Its time to whip out your infrared-enabled devices and communicate without wires. In Part 1, learn the basics of infrared networking in Windows 2000.
Without a clear, organized plan, its easy for the groups to blend together and overlap each other, resulting in chaos.
Find out how to safeguard Windows 2000 networks from replay attacksa particularly sophisticated type of attack where a hacker uses a protocol analyzer to monitor and copy packets as they flow across the network.
Brien Posey explains some of Active Directory's intricacies, including the global catalog and replication between Active Directory servers.
By auditing your system on a regular basis, you'll know what your users are up to--and you'll be able to spot attempted network intrusions.
Groups are more than a convenience for assigning permissions: They're the backbone of a good Windows 2000 security infrastructure.
When your Windows 2000 security log fills up, you really only have two choices: archive the log or overwrite it. Increasing the size of the log is a temporary solution because it inevitably fills up again.
Brien Poseys new series on moving Active Directory objects walks you through procedures from the simple to the arcane. In Part 1, moving objects within and between domains.