News

News

  • April 10, 2006 10 Apr'06

    The pros and cons of a DNS-based front-end Exchange Server cluster

    Tutorial: How to set up a front-end Exchange Server cluster -- part 5 of 7.

  • April 09, 2006 09 Apr'06

    The pros and cons of a Network Load Balancing Service front-end Exchange Server cluster

    Tutorial: How to set up a front-end Exchange Server cluster -- part 2 of 7.

  • April 09, 2006 09 Apr'06

    A lesson in cluster node configuration and consistency

    Tutorial: How to set up a front-end Exchange Server cluster -- part 1 of 7.

  • April 09, 2006 09 Apr'06

    Related links from SearchExchange.com

    Tutorial: How to set up a front-end Exchange Server cluster -- part 7 of 7.

  • April 05, 2006 05 Apr'06

    Survey exposes lax mobile security

    Executives say they worry about smartphone security, but according to a survey from The Economist and Symantec, their approach to the problem is often inadequate.

  • Sponsored News

    • Transform Your Data to Transform Your Business

      B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More

    • Six Steps to Modernizing Your B2B Architecture

      This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More

    • Improve Security with Managed File Transfer

      File transfer is one of the vital functions of B2B collaboration. Organizations require safe, secure and compliant file transfer in order to drive revenue, satisfy customer requirements and enable effective collaboration across the entire B2B value chain. See More

    • Leveraging Cloud Models to Simplify B2B Collaboration

      Reducing complexity in managing business-to-business integration is one of the primary challenges for IT teams. With the growth of the Internet of Things (IoT), social networking and big data analytics, the need to simplify partner interactions and automate processes is becoming more critical than ever. By simplifying B2B collaboration, IT can reduce costs, enhance partner and customer experiences, and leverage real-time visibility and analytics to drive business innovation. See More

    View All Sponsored News
  • April 05, 2006 05 Apr'06

    Scam artists flocking to MySpace

    The Internet's most popular social networking site is all the rage in phishing circles, as crooks are using MySpace profiles to figure out users' enterprise passwords.

  • April 04, 2006 04 Apr'06

    Top 10 best practices for securing e-mail clients

    To protect Microsoft Outlook, SearchExchange.com resident spam and security expert, Richard Luckett, offers this Top 10 list of things you should do to make your e-mail clients more secure. This advice is not only for Exchange administrators, but ...

  • April 04, 2006 04 Apr'06

    Fake BBC e-mails seek to exploit IE flaw

    Attackers are using messages with BBC article excerpts to trick people into visiting a Web site that exploits the Internet Explorer createTextRange flaw.

  • April 03, 2006 03 Apr'06

    Top 10 best practices for e-mail archiving

    Regulatory compliance, litigation support and storage management all begin with an efficient e-mail archiving process. In this tip, storage consultant Bill Tolson offers 10 detailed best practices for effective e-mail archiving.

  • March 23, 2006 23 Mar'06

    Email basics for Exchange admins

    Learn the email basics that every Exchange admin should know, including the standard email process and email headers.

  • March 23, 2006 23 Mar'06

    Phishers use of open relays and proxy servers

    Discover how phishers get away with sending email through open relays and proxy servers and ways to prevent an attack.

  • March 23, 2006 23 Mar'06

    How phishers forge email headers

    Learn how it's possible for phishers to forge email headers with these examples.

  • March 23, 2006 23 Mar'06

    Anonymous phishing email

    Learn how to determine if you're receiving a phishing email and how they are created and sent anonymously.

  • March 23, 2006 23 Mar'06

    Phishing email and spam filters

    Learn how phishing emails get through your spam filters and what the future holds in the fight against spam and phishing.

  • March 23, 2006 23 Mar'06

    Understanding email delivery

    To understand the process of email delivery, read the following tip that explains email settings, SMTP communication, and the standard email infrastructure.

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close