• Sections
    • Cloud Computing
      • Amazon Web Services
      • Google Cloud
      • Microsoft Azure
    • Containerization
    • Data Center
    • Mobile Technology
    • MS Exchange Server
    • Networking
    • Office 365
    • Security
      • Hacking & Cyberattacks
      • Malware
      • Compliance & Privacy
      • Ransomware
      • Social Engineering
      • Vulnerabilities
    • Virtualization
    • Windows 10
    • Windows Server
  • Tech News
  • Tutorials
  • Reviews
  • Newsletters
    • WServerNews
    • FitITproNews
  • Podcast
  • Product Directory
  • Webinars
  • About
    • Advertising
    • About Us
    • Contact Us
    • Meet The Team
    • Legal
      • Privacy Policy
      • Terms & Conditions
    • Sections
      • Cloud Computing
        • Amazon Web Services
        • Google Cloud
        • Microsoft Azure
      • Containerization
      • Data Center
      • Mobile Technology
      • MS Exchange Server
      • Networking
      • Office 365
      • Security
        • Hacking & Cyberattacks
        • Malware
        • Compliance & Privacy
        • Ransomware
        • Social Engineering
        • Vulnerabilities
      • Virtualization
      • Windows 10
      • Windows Server
    • Tech News
    • Tutorials
    • Reviews
    • Newsletters
      • WServerNews
      • FitITproNews
    • Podcast
    • Product Directory
    • Webinars
    • About
      • Advertising
      • About Us
      • Contact Us
      • Meet The Team
      • Legal
        • Privacy Policy
        • Terms & Conditions
    Author

    Martin Kiaer





    Access Control
    Multifactor authentication in Windows - Part 2: Preparing Devices on XP and Windows 2003

    How to prepare Windows to support multi-authentication devices and give you some best practice advice along the way, when preparing smart cards or USB tokens in your Windows XP and […]

    Martin Kiaer Posted On February 12, 2008

    Access Control
    Multifactor authentication in Windows - Part 1: Smart Cards and USB Tokens

    Taking a look at various multifactor authentication technologies that can be used with Windows. In the first article we'll look at the basics of chip based authentication.

    Martin Kiaer Posted On November 20, 2007

    Access Control
    A Microsoft PKI quick guide - Part 4: Troubleshooting

    How to maintain and troubleshoot your PKI using some basic, but very valuable tools.

    Martin Kiaer Posted On September 19, 2007

    Access Control
    A Microsoft PKI Quick Guide - Part 3: Installation

    How to install a PKI based on Microsoft Certificate Services in Windows Server 2003.

    Martin Kiaer Posted On August 15, 2007

    Access Control
    A Microsoft PKI Quick Guide - Part 2: Design

    How to avoid common mistakes during the design phase.

    Martin Kiaer Posted On July 18, 2007

    Access Control
    A Microsoft PKI Quick Guide - Part 1: Planning

    How to design, install and troubleshoot a PKI (Public Key Infrastructure) based on Microsoft Certificate Services in Windows Server 2003.

    Martin Kiaer Posted On May 9, 2007

    Windows Client Security
    Best practice security guide to built-in device control in Windows (Part 2)

    A quick overview of the device control options in Windows Vista.

    Martin Kiaer Posted On March 28, 2007

    Windows Client Security
    Best practice security guide to built-in device control in Windows (Part 1)

    How to protect your Windows XP, Windows Server 2003 or Vista based computer from unwanted or built-in devices.

    Martin Kiaer Posted On February 28, 2007

    Access Control
    A best practice guide on how to configure BitLocker (Part 2)

    A look at BitLocker from an Active Directory point of view and a look at BitLocker and TPM configuration using Group Policies and how to perform key recovery.

    Martin Kiaer Posted On January 23, 2007

    Access Control
    A best practice guide on how to configure BitLocker (Part 1)

    How to configure BitLocker and how to get BitLocker to rock in Windows Vista using best-practice methods.

    Martin Kiaer Posted On January 3, 2007

    1
    • Join Our Newsletter

      Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.

      Over 1,000,000 fellow IT Pros are already on-board, don't be left out!

    • Latest Podcast


    • TECHGENIX

      techgenix logo

      TechGenix reaches millions of IT Professionals every month, and has set the standard for providing free technical content through its growing family of websites, empowering them with the answers and tools that are needed to set up, configure, maintain and enhance their networks.

    • Recent Posts

      • EseUtil or Stellar Repair: Which Exchange disaster-recovery tool is better?
      • ADT tech pleads guilty to spying on customers while they had sex
      • Does it make sense to run apps inside of Microsoft Teams?

    Copyright © 2021 TechGenix Ltd. | Privacy Policy | Terms & Conditions | Advertise
    Press enter/return to begin your search