Brien Posey

Brien Posey is a freelance technology author and speaker with over two decades of IT experience. Prior to going freelance, Brien was a CIO for a national chain of hospitals and healthcare facilities. He has also served as a network engineer for the United States Department of Defense at Fort Knox. In addition, Brien has worked as a network administrator for some of the largest insurance companies in America. To date, Brien has received Microsoft’s MVP award numerous times in categories including Windows Server, IIS, Exchange Server, and File Systems / Storage. You can visit Brien’s Website at: www.brienposey.com.

Making The Transition From SUS to WUS

Although the Windows Update Service (WUS) is still in beta testing, WUS is an important software release and it’s worth looking at now. In this article, I will explain how to implement WUS and have it co-exist with your existing SUS deployment. I will then explain how you can begin testing WUS and make the transition once WUS is finally released.

Have Wireless Networks Surpassed the Security of Wired Networks?

Wireless networks have long been known for being insecure. However, there has been so much emphasis on wireless network security, that in some ways, wireless network security is now better than the security used for wired networks. In this article, I will explain why this is the case and how to apply some of the wireless security techniques to your wired network.

A First Look At Microsoft’s Istanbul

Istanbul has long been the code name for Microsoft’s next client for Live Communications Server. Just a couple of days ago, Microsoft announced that the official name for Istanbul will be Microsoft Office Communicator 2005. In this article, I will take a look at this new product.

A First Look at Microsoft’s Anti Spyware Beta

Over the last couple of years, spyware has grown from being a nuisance into being an epidemic. Although many tools exist for fighting spyware, they largely focus on the recovery of infected systems and have been mostly ineffective in the war against spyware. A few weeks ago however, Microsoft unveiled the first beta of their own anti spyware solution. Although this software is capable of disinfecting an infected system, its primary goal is to prevent the initial infection. In this article, I will explain how this software works and share my initial impressions of it with you.

Keeping Your Organization’s Security Current

Although cyber security is critically important, there are those people whose jobs are so demanding that security gets neglected. Although it is highly recommended to maintain security on a daily basis, this article provides shortcuts for those who are too busy to deal with network security.

Planning Trust Relationships in a Windows Server 2003 Environment

In a Windows 2000 or Windows 2003 based forest, every domain automatically trusts all of the other domains in the entire forest. However, there are situations in which this automatic trust relationship constitutes a major security risk. In this article, I will explain what some of these situations are and how you can create the necessary trust relationships without posing a security risk.

How to Avoid Phishing Scams

If you received an E-mail message from your bank saying that your checking account was overdrawn because of a check that you didn’t write, what would you do? Before you answer, it’s important to realize that you may not really be overdrawn and that there is a good chance that someone is trying to scam you. In this article, I will explain exactly how this type of scam works and how to avoid being a victim.

Troubleshooting Windows Shutdown Problems

One of the most common, but most overlooked problems with the Windows operating system are shut down problems. People tend to place a low priority of fixing Windows shutdown problems, but these problems can be symptoms of something more serious. In this article, I will explain how to diagnose a Windows shutdown issue.

Scroll to Top