• Sections
    • Big Data & Machine Learning
    • Blockchain
    • Cloud Computing
      • Amazon Web Services
      • Google Cloud
      • Hybrid Cloud
      • Microsoft Azure
      • Office 365
    • Data Center
    • Internet of Things
    • Managed Service Providers
    • Mobile Technology
    • Microsoft Exchange Server
      • Compliance, Policies & Archiving
      • Deployment & Migration
      • High Availability & Recovery
      • Management & Administration
      • Mobility & Client Access
      • Monitoring & Operations
      • Planning & Architecture
      • Security & Message Hygiene
      • Tools
    • Networking
      • Network Troubleshooting
      • Windows Networking
      • Wireless Networking
    • Security
      • Access Control
      • Application Security
      • Hacking & Cyberattacks
      • Malware
      • Mobile & Wireless Security
      • Privacy
      • Ransomware
      • Social Engineering
      • Vulnerabilities
      • Windows Client Security
      • Windows Server Security
    • Servers
      • ISA Server
      • Windows Server
    • Virtualization
      • Citrix
      • Containerization
      • Microsoft Hyper-V
      • Terminal Services
      • VirtualBox
      • VMware
    • Windows 10
  • Tech News
  • Tutorials
  • Reviews
  • Newsletters
  • Podcast
    • The T-Suite
    • TechGenix Xtreme
  • About
    • Advertising
    • About Us
    • Contact Us
    • Our Team
    • Legal
      • Privacy Policy
      • Terms & Conditions
  • Videos
    • Sections
      • Big Data & Machine Learning
      • Blockchain
      • Cloud Computing
        • Amazon Web Services
        • Google Cloud
        • Hybrid Cloud
        • Microsoft Azure
        • Office 365
      • Data Center
      • Internet of Things
      • Managed Service Providers
      • Mobile Technology
      • Microsoft Exchange Server
        • Compliance, Policies & Archiving
        • Deployment & Migration
        • High Availability & Recovery
        • Management & Administration
        • Mobility & Client Access
        • Monitoring & Operations
        • Planning & Architecture
        • Security & Message Hygiene
        • Tools
      • Networking
        • Network Troubleshooting
        • Windows Networking
        • Wireless Networking
      • Security
        • Access Control
        • Application Security
        • Hacking & Cyberattacks
        • Malware
        • Mobile & Wireless Security
        • Privacy
        • Ransomware
        • Social Engineering
        • Vulnerabilities
        • Windows Client Security
        • Windows Server Security
      • Servers
        • ISA Server
        • Windows Server
      • Virtualization
        • Citrix
        • Containerization
        • Microsoft Hyper-V
        • Terminal Services
        • VirtualBox
        • VMware
      • Windows 10
    • Tech News
    • Tutorials
    • Reviews
    • Newsletters
    • Podcast
      • The T-Suite
      • TechGenix Xtreme
    • About
      • Advertising
      • About Us
      • Contact Us
      • Our Team
      • Legal
        • Privacy Policy
        • Terms & Conditions
    • Videos
    Author

    Tom Shinder

    Tom Shinder is a Program Manager at Microsoft and has two decades of networking and security experience. He has written dozens of books, thousands of articles, and spoken at large industry conferences on the topics of IT infrastructure, Cloud computing, and cybersecurity. In his free time, Tom enjoys participating in equine prediction markets.





    Articles / Microsoft Azure / Security
    5 spiffy reasons to use Azure Security Center for securing your IaaS and PaaS deployments

    Azure Security Center can do pretty awesome things--here are five that are worth having a good look at.

    Tom Shinder Posted On February 23, 2017 0

    ISA Server / Reviews
    Product Review: Celestix HOTPin

    Dr. Tom Shinder reviews Celestix’s HOTPin password solution for WSA IAG 2007 appliances.

    Tom Shinder Posted On November 24, 2009 0

    Windows 7 / Windows Networking
    Deploying a Hosted Mode BranchCache Server - Part 2: The Lab Network and Order of Operations

    How to deploy a Hosted Mode BranchCache server. Taking a look at the lab network and order of operations.

    Tom Shinder Posted On November 24, 2009 0

    Articles / ISA Server / Security
    Kicking the Tires on the TMG 2010 RC ISP Redundancy - Part 2: Enabling ISP Redundancy

    How to enable ISP redundancy on TMG 2010 RC ISP.

    Tom Shinder Posted On November 10, 2009 1

    Articles / Windows Server 2008
    Running Windows Server 2008 R2 - Installing and Creating the Lab Domain Controller (Part 2)

    How to install and create the Lab Domain Controller on Windows Server 2008 R2.

    Tom Shinder Posted On November 10, 2009 0

    Windows 7 / Windows Networking
    Introduction to BranchCache - Part 1: Overview of BranchCache Features and Capabilities

    An overview of BranchCache’s features and capabilities.

    Tom Shinder Posted On October 29, 2009 0

    Articles / ISA Server
    Kicking the Tires on the TMG 2010 RC ISP Redundancy - Part 1: Configuring the Virtual Infrastructure and the TMG Firewall Interfaces

    TMG 2010 RC ISP redundancy; how to configure the virtual infrastructure and the TMG firewall interfaces.

    Tom Shinder Posted On October 27, 2009 0

    Articles / ISA Server
    Configuring TMG Beta 3 for SSTP VPN Connections - Part 3: Configure TMG VPN Settings and Making the Connection

    The configuration steps for the VPN server component, then establishing a VPN connection using SSTP.

    Tom Shinder Posted On October 6, 2009 0

    Articles / Windows Server 2008
    Running Windows Server 2008 R2 – Installing and Creating the Lab Domain Controller (Part 1)

    How to install and create the Lab Domain Controller in Windows Server 2008 R2.

    Tom Shinder Posted On September 24, 2009 1

    Networking
    What is Dynamic Virtual Client Computing? Or, What’s the Problem with VDI and Why XP Mode is a Good Thing

    Taking a look at what Dynamic Virtual Client computing is, taking a look at the problems with VDI and why XP mode is a good thing.

    Tom Shinder Posted On September 8, 2009 0

    1
    Older Posts
    • Join Our Newsletter

      Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.

      Over 1,000,000 fellow IT Pros are already on-board, don't be left out!

    • Latest Podcast


    • TECHGENIX

      techgenix logo

      TechGenix reaches millions of IT Professionals every month, and has set the standard for providing free technical content through its growing family of websites, empowering them with the answers and tools that are needed to set up, configure, maintain and enhance their networks.

    • Recent Posts

      • What ‘GIFEE’ is, and is it still a reality for Google Cloud?
      • Get better performance and efficiency with storage spaces direct
      • Bridging online with offline: 5 startups putting the easy in e-commerce

    Copyright © 2019 TechGenix Ltd. | Privacy Policy | Terms & Conditions | Advertise
    Press enter/return to begin your search