How you can simulate poor WAN connections by using free tools.
In the second part of this series, I will discuss some of the disadvantages of Server Based Computing and what the limitations of Windows Server Based Computing are. We’ll also talk about what you need to know about to make your Server Based Computing initiative a success.
Server Based Computing is hot these days. Seems like Server based Computing is the way to go. But is it? Is Server Based Computing a goldmine or a snakepit?
In Terminal Server/Citrix environments there are always applications that aren’t exactly mainstream. Usually they do not come with proper management tools. You of course want to manage them in a professional manner, preferably using Group Policy. In this article I’ll show you how to go about this.
In this article I will discuss how hackers use tools to perform brute force password hacking in Terminal Server environments.
This article discusses how to use ResHacker to lock down Terminal Server applications.
In this second part of the series we will talk about how you can determine if you have Fileserving performance issues and how you can prevent this from occurring by adhering to best practises.
Fileserving very often is a much underestimated part of Terminal Server environments. Improperly configured fileserving components can wreak havoc on your performance. In this two-part article we will explore fileserving in Terminal Server environments and how you can make sure that you get the best performance out if it.
Terminal/Citrix environments by their very nature allow interactive access to their servers. Interactive access to a server also happens to be the Valhalla in hackerland. Seems like you’re stuck between a rock and a hard place, right? There’s only one thing to do: secure those servers! One of the tools you should use to secure your servers is the Security Configuration Wizard.