Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Flying without a net: How to find Windows 7 support
IT can buy extended support for Windows 7 desktops from Microsoft, but security and other features may make Windows 8 and 10 increasingly appealing. Continue Reading
Tighten Windows 8.1 security in five simple steps
Microsoft has improved Windows 8.1 security, but no OS is free of vulnerabilities. Some basic settings can further protect Windows 8.x systems. Continue Reading
Options abound for running Windows on Mac machines
The best way to run Windows on Mac OS devices depends on whether you need performance, open source support or centralized management. Continue Reading
-
Mobility management evolves into BYOD and beyond
Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to apps, data and the cloud. Once desktop admins get past the ever-bubbling alphabet soup of BYOD, MAM, ... Continue Reading
Microsoft Windows history: A 30-year timeline
Microsoft celebrates 30 years of the Windows operating system when it ships Windows 10 this fall. Here's a look at Windows history -- bumps and all. Continue Reading
Comparing Windows 10 features with those in earlier OSes
IT got a glimpse of new Windows 10 features in the technical preview and updated build. See how they compare to Windows 7 and Windows 8 features.Continue Reading
What does Windows 8 startup offer fans of Windows 7?
Easier file access across devices and faster Windows 8 startup are among the Windows 8.1 features that could win over Windows 7 users.Continue Reading
What security needs is Windows Defender best for?
Windows Defender is included with Windows 8, but it isn't enabled by default, and enterprises will want more third-party antimalware protection.Continue Reading
What's the best way to remote wipe a user-owned laptop?
Tools are now available to IT for a remote wipe of user-owned laptops. But set clear BYOD security policies and inform users.Continue Reading
Four utilities can verify Group Policy object settings
Client-side extensions could cause a Group Policy object to fail. Fortunately, there are a few different ways to track down Windows GPO settings.Continue Reading
-
What new Windows 7 security tools are available?
Even if you're looking at prior or later operating systems, tools for multiple Windows 7 security tasks abound and should be useful across OS versions.Continue Reading
Three visual disk analyzer utilities to help you optimize disk space
Learn about visual exploration tools for Windows drives of all sizes. These disk analyzers can help identify big unnecessary items for space savings.Continue Reading
Office 2013 vs. Office 365 bout benefits business
Microsoft has made many changes in its suite, and some desktop admins have made surprising choices after comparing Office 365 vs. Office 2013.Continue Reading
Office Telemetry reports on Office 2013 docs and apps
If IT administrators need information on document and application usage, they can use Office Telemetry, an Office 2013 feature that gathers such data.Continue Reading
Windows 9 features may address unified apps and the cloud
Based on the Windows 8.1 update, it's reasonable to expect Windows 9 features for universal apps and cloud integration. Will they entice enterprises?Continue Reading
New Microsoft Office 2013 features you need to know about
Skeptical IT admins may reconsider an upgrade after looking at these Microsoft Office 2013 features, including links to OneDrive and the cloud.Continue Reading
How to perform a Windows XP upgrade to Windows 8.1
As organizations must now implement a Windows XP upgrade to Windows 8.1, they should understand that Windows 8 and 8.1 aren't identical and use the Windows 8.1 Upgrade Assistant.Continue Reading
The Rufus USB tool may ease building bootable Windows flash drives
Find out about a quick, free alternative to the Windows 7 USB/DVD Download Tool -- the open source Reliable USB Formatting Utility.Continue Reading
Free Sysinternals tools can be IT's friends
The Sysinternals Disk Usage tool is a simple way to assess free space
Windows 8.1 user interface improves on previous Windows 8 features
Several small but significant changes in the Windows 8.1 user interface may placate those who were annoyed by Windows 8's limitations.Continue Reading
The open source GIMP editor has lots of support and useful features
The free GIMP editor is not only a potential Adobe Photoshop alternative, but it also has a host of useful features and an online support community.Continue Reading
Windows 8 laptop reviews for business PC buyers
These in-depth Windows 8 laptop reviews examine features, performance and price to inform the purchasing decisions of business PC buyers.Continue Reading
Consider GIMP as an Adobe Photoshop alternative for graphics editing
Adobe Photoshop and other expensive graphics editors may suit power users, but there are good reasons to test the GNU Image Manipulation Program.Continue Reading
Microsoft's cloud initiative, streamlined transition gives hope
Microsoft's cloud transformation to a mobile and services company may be exciting, but can it retain its bread-and-butter enterprise IT customers?Continue Reading
Microsoft mobile, cloud strategy hold key to transforming its future
Microsoft is undergoing a transformation to focus on mobile and the cloud, but will the industry continue to stick with the software giant?Continue Reading
Process Monitor eases Windows troubleshooting of performance problems
Microsoft's built-in tools may not be enough for Windows troubleshooting, so try Sysinternals Process Monitor to find desktop performance problems.Continue Reading
More remote Group Policy Object settings and checking refresh status
Admins can refresh Group Policy Object settings across multiple computers, but they must verify that Group Policy settings have successfully changed.Continue Reading
Excel pivot tables can help IT admins track support, costs
Excel isn't just for end users. If you know how to properly filter data with Excel pivot tables, you can track expenses and create detailed reports.Continue Reading
Before you clone HDD to SSD, know the benefits and danger to data
Which type of drive is better: hard disk drive or solid-state drive? HDD to SSD cloning can ease data access, but SSDs aren't without risks to data.Continue Reading
If you're not using Windows Sysinternals tools, you should be
Windows Sysinternals tools can make work a lot easier for IT administrators, but many people don't even know the suite exists. Get with the program!Continue Reading
IT turns to third-party Active Directory audit tools for Windows data
Microsoft's built-in audit tools may not be enough for regulatory compliance, but there are lots of Active Directory alternatives that can help.Continue Reading
Reviewing the latest Windows laptops for enterprise buyers
Buying Windows laptops is still an important decision in the IT department. Evaluate your options after reading the newest Windows laptop reviews.Continue Reading
What's old, what's new for the enterprise with the Windows 8.1 update
Microsoft's Windows 8.1 update has stirred controversy among users who still hate its interface. Features such as BYOD support may change some minds.Continue Reading
Comparing Windows Defender in Windows 8 vs. third-party malware tools
Microsoft has strengthened Windows Defender for Windows 8, but IT may find third-party anti-malware products more useful than Windows 8 Defender.Continue Reading
Windows tools and terminology for desktop admins
There are a number of Windows tools that desktop admins can use, but before you can use them you have to know what the terms actually mean.Continue Reading
Using Active Directory activation and other new Office 2013 tools
Among the new Office 2013 tools for IT admins are a method for volume activation, administrative template files and files for custom installations.Continue Reading
UEFI vs. BIOs in Windows 8 for desktop startup
The Unified Extensible Firmware Interface can speed and secure startup for today's computers, but systems that dual-boot into Linux spur controversy.Continue Reading
How to find and use the Windows 8 start menu and admin tools
Users who miss Windows 7's interface shouldn't despair; the Windows 8 start menu can still be found. Get help tracking down Windows admin tools.Continue Reading
Microsoft USMT (User State Migration Tool)
The Microsoft User State Migration Tool (USMT) is a command-line utility used to transfer user files and settings between computers.Continue Reading
Third-party Windows desktop management tools to consider
IT admins who are eyeing Windows desktop management software beyond Microsoft’s products have many options. Our expert looks at three of the best tools.Continue Reading
Sysinternals tools can help clean your Windows systems
PC cleanup is no one's favorite task. Process Monitor and Process Explorer are two Sysinternals tools that can help make your systems tidy again.Continue Reading
Using Sysinternals tools in security management scenarios
Discover three valuable Sysinternals tools and common Windows security management scenarios in which these tools would be used.Continue Reading
Sysinternals tools: A must-have for every Windows security toolbox
Learn about the free Sysinternals tools that make managing and troubleshooting Windows-based PCs almost effortless for administrators.Continue Reading
Unauthenticated vs. authenticated security testing
Security testing as a user signed into the network can yield different results. Use unauthenticated and authenticated testing and learn the pros and cons of each method.Continue Reading
Tools for virus removal and detection
Learn about antivirus tools and best practices for removing viruses from your system in this section of our malware learning guide.Continue Reading
Using port scanning tools to test network security
A proper tool belt is necessary for the security of your Windows network. In this excerpt from Hacking for Dummies, read about some port scanning tools that will allow you to get the information you need to run a secure network.Continue Reading
Secret Windows command line tools can boost security
Believe it or not, you've already paid for -- but may not know about -- a bunch of command line tools that will broaden the security of your hard drives, remote hosts, connections, directories and more. Check out this list of easy-to-use commands ...Continue Reading
Metasploit 3.0 security testing tool -- free, easy and improved
An easy and free security testing tool for Windows users, Metasploit 3.0 is Kevin Beaver's recommendation for you. Read why in this security expert's tip.Continue Reading
Harden your file servers with Windows wizard tool
Jonathan Hassell explains how to secure your file servers that are running Windows Server 2003 using the Security Configuration Wizard; both in an automated fashion and through manual tweaks to the configuration.Continue Reading
Patch management tools: Different types, different approaches
Patch management tools seem pretty simple, but there are a couple different types with unique functionalities. Contributor Serdar Yegulalp takes a look at different types of tools and offers advice to companies trying to settle on a single product.Continue Reading
Fast Guide: Hardening Remote Desktop
Remote Desktop allows users to access their work computers from virtually any computer they can get their hands on. With such functionality, however, comes great security risk. Check out this collection of tips, guides and expert advice to see how ...Continue Reading
WinDump: The tcpdump tool for Windows
WinDump, the Windows version of tcpdump, can help you analyze network traffic to look for signs of active malware. Contributor Serdar Yegulalp explains how to use WinDump and some of its applications.Continue Reading
Metasploit: A penetration testing tool you shouldn't be without
Penetration testing is an invaluable way to make sure your systems are secure as well as prove to management that they aren't and you need to increase your security budget. In this article Kevin Beaver examines a useful penetration testing tool ...Continue Reading
Patching Windows compared to Linux
When it comes to Windows versus Linux, patching vulnerabilities is an often overlooked arena of comparison. In many ways, though, ease of patching can determine overall security, says security guru Jonathan Hassell. In this article, Hassell compares...Continue Reading
Rootkit battle: Rootkit Revealer vs. Hacker Defender
Although rootkits have been threatening various platforms for years, only recently did a major battle develop between the rootkit creators and eradicators: Holy Father's Hacker Defender vs. Sysinternals' Rootkit Revealer. Microsoft's Kurt Dillard ...Continue Reading
Manual vs. automated patch tracking
With new patches coming at you seemingly a mile a minute, you may wonder what the best way is to manage them. Get help comparing manual vs. automatic patch tracking.Continue Reading
What are user-mode vs. kernel-mode rootkits?
All modes of rootkits are difficult to detect, but one type is preferred by hackers over another. Read about different rootkits in this tip.Continue Reading
What are the advantages and disadvantages to having users logon to the domain vs. the local machine?