In the second part of this series, I will discuss some of the disadvantages of Server Based Computing and what the limitations of Windows Server Based Computing are. We’ll also […]
Server Based Computing is hot these days. Seems like Server based Computing is the way to go. But is it? Is Server Based Computing a goldmine or a snakepit?
In Terminal Server/Citrix environments there are always applications that aren’t exactly mainstream. Usually they do not come with proper management tools. You of course want to manage them in a […]
In this article I will discuss how hackers use tools to perform brute force password hacking in Terminal Server environments.
This article discusses how to use ResHacker to lock down Terminal Server applications.
In this second part of the series we will talk about how you can determine if you have Fileserving performance issues and how you can prevent this from occurring by […]
Fileserving very often is a much underestimated part of Terminal Server environments. Improperly configured fileserving components can wreak havoc on your performance. In this two-part article we will explore fileserving […]
Terminal/Citrix environments by their very nature allow interactive access to their servers. Interactive access to a server also happens to be the Valhalla in hackerland. Seems like you’re stuck between […]
In this review I will take a look at 2X LoadBalancer. My review of 2X LoadBalancer was performed with three Windows 2000 Server systems. One server acted as the “gateway” […]
Join Our Newsletter
Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.
Over 1,000,000 fellow IT Pros are already on-board, don't be left out!