Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of drthomasshindermcse

drthomasshindermcse

Send drthomasshindermcse an email

Latest from drthomasshindermcse

  • 10 things you’ll miss when you upgrade to Exchange 2007
    Software

    10 things you’ll miss when you upgrade to Exchange 2007

    The new version of Exchange has some interesting enhancements, but unless you're a command-line guru, you may feel like you've lost more than you've gained. Tom Shinder shares his list of the Exchange 2003 features he misses most.

    drthomasshindermcse
    Published:  May 17, 2007, 12:00 AM PDT Modified:  June 8, 2007, 10:11 AM PDT Read More See more Software
  • 10 things you should do to protect your network against wireless devices
    Networking

    10 things you should do to protect your network against wireless devices

    There's no shortage of information explaining how to create a secure wireless network. But what about securing your network FROM wireless devices? This list of pointers from Dr. Thomas Shinder will help you reduce the risk.

    drthomasshindermcse
    Published:  June 20, 2006, 12:00 AM PDT Modified:  June 8, 2007, 10:04 AM PDT Read More See more Networking
  • 10 things you can do to become an Outlook Web Access (OWA) power user
    Software

    10 things you can do to become an Outlook Web Access (OWA) power user

    OWA enables users with Exchange accounts to manage their e-mail from almost any computer that has a Web browser, but they don't always take advantage of OWA's full functionality. Here are some tips for getting more mileage out of OWA features.

    drthomasshindermcse
    Published:  April 10, 2006, 12:24 PM PDT Modified:  June 8, 2007, 10:03 AM PDT Read More See more Software
  • SolutionBase: What’s coming in ISA Server 2006
    Security

    SolutionBase: What’s coming in ISA Server 2006

    ISA Server 2004 provides an easy way to quickly set up a firewall in a Windows environment, but it's far from perfect. In this article, Tom Shinder points out some of the improvements that are coming in ISA Server 2006.

    drthomasshindermcse
    Published:  March 28, 2006, 12:00 AM PST Modified:  July 26, 2007, 8:02 AM PDT Read More See more Security
  • 93261.jpg
    Security

    SolutionBase: Terminating the Remote Access VPN client connection at the front-end device in an ISA environment

    Configuring VPN and ISA Server together in a network can be a tricky proposition. In this article, Tom Shinder details how to set up a configuration and discusses the issues you'll face.

    drthomasshindermcse
    Published:  March 20, 2006, 12:00 AM PST Modified:  July 26, 2007, 8:02 AM PDT Read More See more Security
  • 88832.jpg
    CXO

    SolutionBase: Get the most out of ISA 2004 with the Best Practices Analyzer Tool

    Is ISA Server 2004 configured properly on your server and is everything working ok? Do you have any idea? Tom Shinder shows you how you can find out the answers to these questions and more by using the Best Practices Analyzer Tool.

    drthomasshindermcse
    Published:  February 23, 2006, 12:00 AM PST Modified:  July 26, 2007, 8:02 AM PDT Read More See more CXO
  • 88745.jpg
    Security

    SolutionBase: Using ISA Server 2004’s HTTP Security Filter to block instant messengers and peer-to-peer applications

    Peer-to-peer applications and instant messengers can present special threats to your network's security. Here's how you can use HTTP filtering with ISA Server 2004 to block these applications from communicating.

    drthomasshindermcse
    Published:  February 20, 2006, 12:00 AM PST Modified:  July 26, 2007, 8:02 AM PDT Read More See more Security
  • SolutionBase: Overview of the HTTP security filter in ISA Server 2004
    Security

    SolutionBase: Overview of the HTTP security filter in ISA Server 2004

    ISA Server 2004's HTTP security filter adds a layer of protection to Web requests, ensuring that the data requested hasn't been hijacked or reassigned. In this article, Tom Shinder shows you what the HTTP security filter is and how it works on ISA Server 2004.

    drthomasshindermcse
    Published:  February 15, 2006, 12:00 AM PST Modified:  July 26, 2007, 8:02 AM PDT Read More See more Security
  • SolutionBase: Configuring remote access VPN connections in a back-end ISA firewall configuration
    Security

    SolutionBase: Configuring remote access VPN connections in a back-end ISA firewall configuration

    Using ISA Server on your network can become problematic if you're using remote access VPNs as well. In this article, Tom Shinder outlines some of the problems you can face in such a configuration and what to do about them.

    drthomasshindermcse
    Published:  February 3, 2006, 12:00 AM PST Modified:  July 26, 2007, 8:02 AM PDT Read More See more Security
  • SolutionBase: Configuring the ISA firewall’s HTTP stateful inspection filter to protect OWA, OMA, and Exchange ActiveSync Web sites
    Security

    SolutionBase: Configuring the ISA firewall’s HTTP stateful inspection filter to protect OWA, OMA, and Exchange ActiveSync Web sites

    When you start using Web applications like Outlook Web Access for Exchange, you open your network up to new avenues of attack. Here's how you can defend your network using ISA Server 2004.

    drthomasshindermcse
    Published:  January 16, 2006, 12:00 AM PST Modified:  July 26, 2007, 8:02 AM PDT Read More See more Security
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Next
68 results

TechRepublic Premium

  • TechRepublic Premium

    Hiring kit: Automation specialist

    PURPOSE Recruiting an automation specialist with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS ...

    Published:  March 27, 2023, 12:00 PM EDT Modified:  March 28, 2023, 12:48 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Cybersecurity engineer

    PURPOSE Recruiting a cybersecurity engineer with the right combination of technical and industry experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS ...

    Published:  March 27, 2023, 12:00 PM EDT Modified:  March 28, 2023, 12:18 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Business information analyst

    PURPOSE A large segment of internal and external modern business now takes place on computers, tablets and other mobile devices. The information technology infrastructure that has sprung up around that business can be daunting in its scope. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ...

    Published:  March 26, 2023, 12:00 PM EDT Modified:  March 28, 2023, 12:51 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Grant writing guide

    PURPOSE This grant writing guide from TechRepublic Premium will help you identify a grant that fits your idea, build a team to help you compile a proposal, and set a timeline to meet the application deadline. From the guide: BEFORE YOU START This list of steps will help the grant writing process go more smoothly. ...

    Published:  March 26, 2023, 12:00 PM EDT Modified:  March 27, 2023, 6:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice