Four great collections from TechRepublic and tons of extra storage

Document Sample
Four great collections from TechRepublic and tons of extra storage Powered By Docstoc
					Four great collections from
TechRepublic and tons of extra
storage right in your pocket!

Administrator's Guide to Disaster Planning and Recovery, Third Edition
TechRepublic's unique disaster planning and recovery collection contains the
hands-on resources you need to ensure that your IT organization is ready for its
next crisis. From disaster planning and prevention to server and client recovery,
these articles and tools will help you prepare for and recover from catastrophes
of any size.

TechRepublic Field Manual
Troubleshooter. Computer expert. Technician. Whatever your title, your job
requires you to have an enormous amount of information right at your fingertips.
That's why we're offering the TechRepublic Field Manual, the how-to and
troubleshooting information you need on the topics of user administration, client
systems, server systems, networking, hardware, and security.

IT Shop in a Box
Not sure if your IT shop has everything you need? This collection will help you
get your network up and running, and it includes starter policies, tools to help you
hire the right person for the job, tips on setting up shop, and ready-to-present
PowerPoints for training end users.

The Best of TechRepublic
We've gathered nearly 400 of the best TechRepublic downloads, and they're all
right here!
FAQ

Table of Contents

  * Managing the Human Element
  * Creating a Disaster Plan
  * Policies
  * Checklists
  * Tools


Managing the Human Element
Build human accountability into your disaster recovery plan
Don't overlook the human factor in your DR plan
9/11: A lesson in crisis control
Let's share what we've learned about managing through this crisis
Towering accomplishment: How one company rebuilt after catastrophe


Creating a Disaster Plan
Business Impact Analysis is the starting point for disaster recovery
-- Impact analysis form

Use these guidelines to develop a disaster recovery plan
-- Develop an effective disaster recovery plan

A cost-effective, cooperative disaster recovery plan that you can customize
-- Disaster recovery plan template
-- Server documentation templates


Policies
Use our crisis communications policy to keep your workers informed
-- Crisis communications policy

Establishing a server triage policy
-- Server triage policy

Use our guide to decide who gets help first
-- Help desk triage policy
Checklists
-- Check out our basic contingency plan checklist Contingency plan checklist

Identify the holes in your network planning with our network documentation
checklist
-- Network documentation checklist
-- Disaster recovery checklist: Preparing your organization
-- Disaster recovery plan: Manager's update checklists


Tools
How to select off-site and hot-site vendors
-- Gap analysis tool: Enterprise backup software
-- Vendor selection checklist: Enterprise backup software
-- Vendor reference questionnaire: Enterprise backup software
-- Gap analysis tool: Server colocation
-- Vendor reference questionnaire: Server colocation
-- Vendor selection checklist: Server colocation
-- Gap analysis tool: Business continuity planning software
-- Vendor selection checklist: Business continuity planning software
-- Vendor reference questionnaire: Business continuity planning software
-- Gap analysis tool: Backup power systems
-- Vendor selection checklist: Backup power systems
-- Vendor reference questionnaire: Backup power systems
-- Gap analysis tool: Outsourced data backup solutions
-- Vendor selection checklist: Outsourced data backup solutions
-- Vendor reference questionnaire: Outsourced data backup solutions
-- Financial scenario planner: Outsourced data backup solutions
FAQ

Table of Contents

  * User Administration

  * Client Systems

  * Server Systems

  * Networking

  * Hardware

  * Security


User Administration
Eight cost-free steps to improve workstation ergonomics
TechProGuild's New User Education Form
10 things you should do before letting users take their laptops out the door
Avoid support headaches with this program rollout checklist
10+ things you should know when deploying Windows desktops from images
Apply local Windows XP restrictions with the Group Policy Console
Lock down user desktops with Group Policy


Client Systems
10 things you can do when Windows XP won't boot
10 things you can do to optimize and maintain your PCs
Boot Windows XP from a USB flash drive
10+ things you should know about troubleshooting a slow PC
10 things you should do to improve every new Windows PC
10 things you should do to a new PC before connecting it to the Internet
Task Sheet: Solution to 'Local policy does not permit you to log on'
Moving Windows XP desktop settings from one computer to another
Establish a client connection to a Windows VPN with this step-by-step guide
Configure the Windows XP Firewall to allow Remote Desktop access
Connect to Windows XP Remote Desktop over the Internet
The anatomy of the Windows registry
10 things you should know about working with the Windows registry
Printable reference: Registry backup and restore
Get IT Done: Recover lost passwords with these tricks and tools
10 things you should know about Windows XP's System Restore tool
TechRepublic Real World Guide: Recovering Windows Client Data


Server Systems
46 things to check when you're having server problems
TechProGuild's IT New User Server Task Form
TechProGuild IT Server Task Form: Employee Promotion
IT change control form
TechProGuild's IT Server Task Form: Employee Lateral Move
TechProGuild's IT Server Task Form: Employee Demotion
Step by step: Configure a Windows Server VPN -- server side
Troubleshooting permissions problems in Windows Server 2003 and Windows
XP
Troubleshoot 10 common Exchange problems with these expert answers
Recover deleted e-mail
Recover Exchange 2000 and 2003 data with these step-by-step Visio decision
trees
Recovering mailboxes on an Exchange Server
10 things you should know about Automated System Recovery

Networking
Visualize and master the five network types with these diagrams
TPG Power Checklist: Troubleshooting TCP/IP
Visio flowchart: Workstation connectivity troubleshooter
10 things you should know about troubleshooting VPN connections
Troubleshoot DNS with this flowchart
10 things you should know about the NETSH tool
The Route Utility
NetStat Tool
IP addressing workbook
Network documentation checklist


Hardware
10+ tools you should have in your support tech repair kit
Hard drive failure troubleshooting checklist
Extend equipment life by following this PC cleaning checklist
Sorting out differences in video cards
Sorting out the differences in motherboards
Troubleshooting wireless keyboards and mice
Diagnose common LCD monitor issues with these tips
Power-supply troubleshooting with a multimeter
The anatomy of CAT5 cable
CAT5 Patch/Crossover cable creation guide
Unshielded twisted-pair cabling basics
Simplify your record-keeping with this hardware repair ticket
Track issued equipment and installed software with these comprehensive
worksheets
Computer hardware inventory list
Windows XP Device Manager Error Code Help File
Download TechRepublic's IRQs At-A-Glance checklist
BIOS beep codes list for desktops
AwardBIOS POST error message list
IBM BIOS POST error code list
HP BIOS POST error code list
Dell BIOS POST error code list


Security
Checklist for deploying file and printer shares
Manage network access with this Cacls.exe quick reference
10 things you should know about working with permissions
Windows PC: Lock it down in 10 steps
End user laptop: Lock it down in 10 steps
Task Sheet: Disable Internet access on a Windows PC
10 registry hacks for hardening Windows XP security
Windows XP services that can be disabled
10 things you should know about securing DNS
Tips and tricks to secure Windows Server 2003
Windows Server 2003: Lock it down in 10 steps
10 ways to make SharePoint more secure
Active Directory: Lock it down in 10 steps
Exchange Server: Lock it down in 10 steps
Lock IT Down: Fifteen tips for properly securing IIS Web servers
Small business network: Lock it down in 10 steps
Linksys wireless access point: Lock it down in 10 steps
Lock it down in 10 steps: Linksys router
10 things you should know about securing wireless connections
FAQ

Table of Contents

  * Getting your network going
  * Starter Policies
  * Hiring Staff
  * Setting up Shop
  * Lunch and Learns

Getting your network going
Quick Guide: Windows Server 2003 Administration Fundamentals
TechRepublic Real World Guide: Securing Windows XP
Windows Server 2003: Upgrade or Technology Shift?
Quick Guide: Lock Down the IT Department
Quick Guide: Spyware Detection and Removal
Wireless LAN Project Plan

Starter Policies
TechProGuild's Password Policy
TechProGuild's Software Installation Policy
TechProGuild's Internet Usage Policy
TechProGuild's E-mail Usage Policy

Hiring Staff
Recruiter Checklist
IT Hiring Kit: Support Professional
IT Hiring Kit: Network Administrator
TechProGuild's Business Case Template: New IT Manager

Setting up Shop
TechProGuild's IT New User Software Request Form
TechProGuild's New User Education Form
TechProGuild's New User Hardware Request Form
Essential IT Forms
TechProGuild's New User License Calculator

Lunch and Learns
Maximize Lunch and Learns: Make the Most of Your Presentations
TechRepublic's Internet and E-mail Usage Lunch and Learn Presentation
Stay Secure: Best Practices for Safe Computing
FAQ

Table of Contents

Project Proposal and Special Clarification forms
Windows XP services that can be disabled
Use this action item log to keep project team meetings on task
10 things you should know about Automated System Recovery
Use this workbook to generate scheduled downtime reports
Avoid support headaches with this program rollout checklist
10 things you should know about Windows XP's System Restore tool
10+ tools you should have in your support tech repair kit
10 things you should know about device driver rollback in Windows XP
Extract troubleshooting info from Windows XP BSOD error messages
Simplify your record-keeping with this hardware repair ticket
10 things you can do to optimize and maintain your PCs
Calculating TCO and ROI on open source platforms
The 10 worst ways to communicate with end users
10 things you can do to protect your data
10 things you should know about building a PC from scratch
Find a lost Windows product key
Boost server disk I/O performance with a battery-backed write cache
Measure CPU and memory consumption of a Java application using standard
APIs
SolutionBase: Set up an automatic logon to Windows XP
SolutionBase: Set Outlook 2003 to automatically download graphics
10 things you should know about deploying technology in harsh environments
10 essential competencies for IT pros
SolutionBase: Configure Internet Explorer to work as an FTP client
Infrastructure monitoring: Measure your servers' up/down activity with this script
Automate tedious admin tasks with these batch files and Windows Task
Scheduler
10 dumb things users do that can mess up their computers
10 useful server variables you should know for creating dynamic Web pages
10 ways to effectively estimate and control project costs
Clarify project roles with this simple responsibility matrix
Rescuing a failed domain controller: Disaster recovery in action
Disable Internet access on a Windows PC
IP subnetting made easy
SolutionBase: Use DHCP Class to deny Internet access to unauthorized
machines
Role-specific backups boost the odds of an effective recovery
10 ways to protect systems from electrical catastrophes
Take steps now to prepare for a system failure
How do I... Add storage to a PC or workgroup network?
Get an in-depth look at Vista firewall's advanced configuration features
Generate your own ready-to-use Cisco 871W configuration with this handy tool
10 things you should know about Windows XP Backup
How do I... Add Macs To A Windows Workgroup?
10 things to consider before rolling out Windows Vista in your organization
10 dumb things IT pros do that can mess up their networks
Use this template to create your own ready-to-use Cisco 851W or 871W
configuration (DSL PPPoE implementations)
Coding fun solutions to crummy problems using XSLT collections
Use this template to create your own ready-to-use Cisco 851W or 871W
configuration (static IP WAN implementations)
Use this template to create your own ready-to-use Cisco 851W or 871W
configuration (DHCP or cable modem Internet connections)
Create text that stands out against an image using this handy TextHalo tool
How do I... Manage disk quotas on Windows server operating systems ?
How do I... Make the autorun.inf file for automatic loading of CDs and DVDs
10 common HP printer problems and what you can do to fix them
How do I... Apply local Windows XP restrictions with the Group Policy Console?
10 ways to begin a data warehouse project
10 things you should do before installing Windows Vista on a computer
Use this workbook to rapidly configure IPSec tunnels on Cisco IOS devices
Create a superscope to solve the problem of dwindling IP addresses
Add a text or graphic watermark to your images with this timesaving tool
Use this simple Access application to catalog MP3s and other files
10 handy Windows XP efficiency tricks
10 customization tricks to save you time in Windows XP
10 things you can do to give old servers a second life
How do I... Uninstall Microsoft Internet Explorer 7?
Use this template to configure QoS on your Cisco router
10 common Cisco VPN problems and how to resolve them
How do I... Provide remote assistance on computers behind a NAT device?
Use this registry file to enable S3 sleep mode in Windows XP
How do I... Speed up the switch port initialization process?
Working with (and around) Windows Vista User Account Control
Use this template to configure a Cisco Catalyst 2950 switch
Secure your Bluetooth wireless networks and protect your data
Windows Vista's service hardening adds a valuable layer of protection
10 tips for customizing menus and toolbars in your Access apps
Protect your organization against pretexters with help from Sun Tzu and The Art
of War
Build a fast, reliable, and affordable switch infrastructure for your datacenter
TechRepublic's ultimate guide to enterprise wireless LAN security
Excel Template: Configure Aironet access points for enterprise security
Use this template to configure a Cisco PIX Firewall
Windows Defender in Vista offers built-in spyware protection
Create a bootable WinXP CD slipstreamed with SP2 and hotfixes
100 things you should know about Windows Vista
10+ tweaks, tricks, and hacks to make Windows Vista fly
Vista's Network Access Protection (NAP) helps keep "unhealthy" computers off
your LAN
10 things you'll miss when you upgrade to Vista (and how to get some of them
back)
10 things you should know about networking two buildings
Don't be misled by these 10 Windows Vista myths
Use IPCop to turn the TK-63T into a Linux-based Internet gateway/router
Take advantage of the improved Microsoft Windows Server Update Services
How do I... Install Windows Vista in a dual-boot configuration along with Windows
XP?
Meet VoIP bandwidth requirements without crippling your network performance
How do I... Create and use System Restore in Windows Vista?
Illustrated walk-through: Creating a bootable USB flash drive for Windows XP
10 tricks for working more efficiently in Microsoft Outlook
The Seven Deadly Sins of AJAX application development
EIA chart
Prevent data theft with Windows Vista's Encrypted File System (EFS) and
BitLocker
SolutionBase: Follow these steps to secure your hard drive with Windows Vista
BitLocker
How do I... Adjust what files are in the search index in Windows Vista?
10+ tips for designing flexible and efficient Access tables
Connect securely to Windows Vista Remote Desktop
New XSLT 2.0 features every application developer should know
How do I... Use the Memory Diagnostic Tool in Windows Vista?
Get to know Windows Vista's new boot loader architecture
10 Windows XP tips and tools to simplify your work
Top 10 Windows Vista annoyances
Add Vista-like search capabilities to Windows XP
How do I... Change file extension associations in Windows Vista?
SolutionBase: Performing common administrative tasks in Solaris 10
Get quick control over your Linux server with server commands
SolutionBase: Get familiar with Windows Storage Server administration tools
SolutionBase: Expanding storage options with Windows Storage Server
Worst practices for disaster recovery
SolutionBase: Supercharge the command line with Windows PowerShell 1.0
Price comparison: Scalix vs. Exchange
SolutionBase: Troubleshooting a DNS server failure on Windows Server 2003
SolutionBase: Countering DNS Security Threats
Make your home PCs accessible anywhere with Dynamic DNS for free
SolutionBase: Surveying the dual-core processor landscape
REG file to protect against zero-day RPC flaw in Microsoft DNS
An introduction to enterprise data storage
Safeguard your Office 2007 files with encryption, document protection, and digital
signatures
SolutionBase: Preparing to migrate from Exchange Server 2003 to Exchange
Server 2007
SolutionBase: Migrating from Exchange Server 5.5 to Exchange Server 2007
SolutionBase: Make Office XP and Office 2003 compatible with Office 2007's
new Open XML format
SolutionBase: Increase reliability and performance of your Exchange-based e-
mail system with clustering
SolutionBase: Performing common tasks in Exchange Server 2007
Boost Office 2007 security with Information Rights Management, the Document
Inspector, and the Trust Center
9 VoIP add-ins that help boost productivity
SolutionBase: Finding the hidden bells and whistles in Firefox
SolutionBase: Troubleshooting network address translation
Comprehensive RAID performance report
Why VPN can't replace Wi-Fi security
What's new in Vista Group Policy?
10 things you'll miss when you upgrade to Exchange 2007
Set up S3 sleep state in Vista for significant power savings
Windows Vista services that can be disabled
A quick reference guide of HTML tags and their attributes
10 things you should know about Office 2007 compatibility issues
How do I... Disable services in Windows Vista?
Feature guide: What you need to know about Microsoft Office 2007
RAID storage explained
Follow these tips to boost Vista performance
How to fully degunk a PC to get rid of crapware
Price comparison: Zimbra vs. Exchange
A couple of MySQL stored procedures myths get busted
10 e-mail habits that waste time and cause problems
10 annoying Word features (and how to turn them off)
The role of 802.11n in the enterprise
10 things you can do to give your PowerPoint presentations a heartbeat
How do I... Secure Microsoft Windows XP Professional?
10 physical security measures every organization should take
A secure wireless LAN hotspot for anonymous users
How do I... Regain access to a file Windows Vista has mistakenly denied?
Implementing SSL or TLS secure communications
10 tech skills you should develop during the next five years
How do I... Change access permissions for all folders and files in Vista?
How do I... Populate an Access list control with the results of a dynamic search?
E-mail security has been around forever -- you just need to turn it on
10 things you can do to make sure your data doesn't walk out the door
10 reasons to deploy Microsoft Office SharePoint Server 2007
10 tech certifications that actually mean something
10 signs that you aren't cut out to be a support tech
TechRepublic CSS Reference Table
Printable reference: Starting and Exiting Windows Safe Mode
Automated Trouble Ticket Tool
Printable reference: Registry backup and restore
How to build a service catalog
The anatomy of a virus: Downloadable chart
Project Management FAQ
The Disk Cache Adjuster Tool
Wireless Equipment Checkout Tool
Folder Size Tracker Tool
The Windows XP IP Configuration Tool
The Hard Disk Information Tool
8Master Browser Tool Kit
Disaster Recovery Plan: Manager's update checklists
World time finder spreadsheet
Reset local administrator password VBScript
GUI front end for NetStat
Automated Laptop Checkout Tool
ARP Assistant
Square footage cost calculator
Hiring cost calculator
Unshielded twisted-pair cabling basics
A spare parts plan for maximum uptime
Project Bug Report
Project communications policy
Task Sheet: Set Outlook 2003 to look like the old Outlook
Project planning template for project managers
KiXtart script: Change a PC's registered owner on Windows NT/2000/XP
Task Sheet: Solution to 'Local policy does not permit you to log on'
Task Sheet: Disable Internet access on a Windows PC
Task Sheet: Configure Internet Explorer to work as an FTP client
Task Sheet: Set up an HTML mailto form without a back-end script
Task Sheet: What to do when you install XP SP2 and can no longer print
BIOS beep codes list for desktops
Lock it down in 10 steps: Linksys router
Task Sheet: Set the default folder for saving Outlook 2003 messages
IT tracking documents
Extend equipment life by following this PC cleaning checklist
Windows Service Process Identifier script
Linksys wireless access point: Lock it down in 10 steps
Network documentation checklist
Task sheet: Create calculated fields for Access queries
Windows Server 2003 Base Installation Flowchart
Active Directory: Lock it down in 10 steps
Microsoft Word 2003 keyboard shortcuts
Add Safe Mode to the standard Windows XP boot menu
The Anatomy of Windows XP's System Information tool
Microsoft SQL Server: Lock it down in 10 steps
KiXtart script: Deploy McAfee VirusScan with ease using this login script
Ten skills that can help you land an IT manager job
12 crucial components of facilities management
Configuring Windows XP security after you install Service Pack 2
Checklist for deploying file and printer shares
Essential support tools: One tech's top picks
P2P file-sharing policy
Seven signs that a job candidate won't work out
Disable EFS on Windows 2000 and Windows XP Pro clients
Criteria for a service level agreement
Client site preparation checklist
The anatomy of CAT5 cable
Eight cost-free steps to improve workstation ergonomics
Information Security Policy
Learn the differences between the domain and forest types in Windows Server
2003
Change the registered owner of Windows with this Registry tweak
Hard drive failure troubleshooting checklist
Save time using batch files to perform repetitive tasks in a Windows environment
20 key features of enterprise backup software
Tutorial: Creating and distributing custom forms with Outlook
Database cheat sheet: Setting up an ODBC connection
Retrieve important user information using Windows Scripting Host
Business impact analysis form
Virus prevention checklist
Reclaim gigabytes by deleting unneeded files using a Rexx script
Resource list: Remote control tools
Computer crime reporting checklist
Computer crime evidence-preservation checklist
The top 10 peeves of a support tech
Project risk factors checklist
Windows Server 2003: Lock it down in 10 steps
IT Security Policy Checklist
Exchange Server: Lock it down in 10 steps
The anatomy of the Windows registry
3Monitor power consumption calculator
The Anatomy of Spyware
Resource list: Network inventory tools
Computer hardware inventory list
Windows PC: Lock it down in 10 steps
Quickly grab Event Log information in Windows with this script
Windows XP Pro File Sharing Interface Switcher VB script
Pocket PC: Lock it down in 10 steps
Delete Word Document Hyperlinks VBScript
12 useful Linux file manipulation commands you should know
Toggle Windows XP Pro IP address settings with this VB script
IIS configuration flowchart for Windows Server 2003
34 timesaving mouse tricks for Word users
Ten ways to decline a request for free tech support
Ten good reasons not to provide free tech support
User satisfaction survey form
Intrusion detection checklist: Six stages of handling attacks
Cisco IOS router: Lock it down in 10 steps
Sidestep these five tech support time wasters
50 Indispensable Microsoft Word tips
12 steps to avoid phishing scams
The 12 steps to designing a strategic security process
Avoid falling prey to these five security oversights
Relocating a server room: A case study
Use InfoPath 2003 to give your office applications access to production data
Strengthen your wireless security by avoiding these missteps
Twenty-four characteristics of a robust infrastructure process
Export Excel comments to Word VBScript
End user laptop: Lock it down in 10 steps
Adopt these 11 critical success factors to be a top-notch developer
Join a domain during Windows logon using a VPN client
Five tips for coaching young support pros
Build Your Own: E-mail Usage Policy
Ten commandments of egoless programming
An IT executive's guide to surviving a start-up
Visualize and master the five network types with these diagrams
100+ Telecom terms explained
Technical conference report template
Word help ticket: Removing mistakes from the custom dictionary
Windows Server 2003 services that can be disabled
Marketing the value of your IT department
Five steps to take before deciding to relocate
13 useful data manipulating Perl string functions
What to look for in network and system monitoring software
15 of the most often cited misuses of e-mail
Ten ways to make desktop visits more effective
Seven warning signs that you should turn down a job offer
Training/tuition reimbursement kit
Quality assurance checklist for outsourced projects
Active Directory object nomenclature checklist
80+ Keyboard shortcuts to move faster in Microsoft Outlook
10 GNU/GPL programs you can't live without
Outlook help ticket: Find mail faster with search folders
50+ Keyboard shortcuts to move faster in Microsoft PowerPoint
70+ Keyboard shortcuts to move faster in Microsoft Access
Windows Update patch reporting KiXtart script
Strategies for turning around a troubled project
Six reasons IT managers miss their budgets--and 11 tips to come in on target
Novice net admins: Avoid problems by following these seven basic rules
Negotiate a good severance deal before you accept a job offer
Keep stakeholders in the loop with this project status report template
Establish a client connection to a Windows VPN with this step-by-step guide
Build a foundation for project success with this definition template
Use this template to quickly create an all-purpose calendar in Word
Recognize and react to the signs a hacker is preparing to attack your network
10 things you should know about the Linux bash shell
10 things you should know about Cisco IOS access control lists (ACLs)
Address these eight concerns in your incident response policy
Keep track of your problems with this project issues log
Get a better picture of a potential job by asking these 14 questions
Anatomy of an Excel Workbook: Build a foundation for success by mastering
user fundamentals
Anatomy of an Excel formula: Use built-in functions to calculate answers
Provide essential information with this project communication plan
Microsoft Outlook 2003: Lock it down in 10 steps
Master these 10 processes to sharpen your project management skills
Record essential details with this project issue submissions form
Microsoft Outlook Express: Lock it down in 10 steps
Three tricks to make Word templates easier to find and use
10 things you should know about troubleshooting VPN connections
Use this log to track and triage errors uncovered during testing
Record essential details of testing-phase errors with this reporting form
Get new IT employees off to the right start with this orientation checklist
Evaluate the potential impact of project risks using this calculator
Deliver on client expectations by building a comprehensive quality plan
10 things you should know about creating a successful e-commerce site
10 things you should know about securing DNS
10 things you should know about managing IT projects
Prioritize help desk requests with this call-level chart
50+ keyboard shortcuts for moving faster in Windows XP
10 things you should know about creating a resume for a high-level IT position
10 PowerToys that complete the Windows toolset and save you precious time
10 things you should know about securing wireless connections
10 things you should know about saving money on computer hardware
Anatomy of Excel formatting: Make better spreadsheet presentations - part 3
10 things you should know about working with NTFS permissions
10 things you should do to a new PC before connecting it to the Internet
46 things to check when you're having server problems
10+ things you should know about troubleshooting a slow PC
Anatomy of Excel formatting: Make better spreadsheet presentations - part 4
10 things you should know about the NETSH tool
Avoid potential conflicts of interest with this disclosure form
IT change control form
Automate the collection of domain names with this member submitted script
70+ Keyboard shortcuts to move faster in Apple Mac OS X
10 things you should do to improve every new Windows PC
Unblock Windows XP updates across a network with this member admin script
Restrict access on an IPSec VPN tunnel with this member-submitted script
10 things you should know about Active Directory domain trusts
The 7 most dangerous species of net admins
Use this business practices document to ensure IT responsiveness and
availability
Implement this rigorous control process to keep projects running smoothly
Presentation: 10 things you should know about securing DNS
Anatomy of Excel data analysis: Sorting and filtering information
10 things you should know about being a great IT manager
Presentation: 10 things you should know about Cisco IOS access control lists
(ACLs)
Making smart career decisions: Answers to 20 questions from IT pros
Three member-submitted admin scripts that will simplify your daily tasks
Salvage a derailed project with these assessment and recovery strategies
Presentation: Raise user awareness about password security
Define project expectations with this criteria acceptance form
Get the most from your Excel charts with these five tips
10 things you should do to protect your network against wireless devices
Control Excel data entry with these five powerful tips
Anatomy of Excel data analysis: Achieve better information organization with
subtotals
Word help ticket: Create a shortcut to paste unformatted text into a document
Automate mundane network admin tasks with four member-submitted scripts
Anatomy of Excel data analysis: Restructure worksheet information with
PivotTables
Presentation: Teach your users to recognize and resist social engineering ploys
10 things you should do to prepare every new Linux installation
Anatomy of Excel data analysis: Creating and modifying simple graphs
Presentation: Learn when and how to report computer crime
Presentation: 10 things you should know about computer crime evidence
preservation
10 things you should do to a new Linux PC before connecting to the Internet
Anatomy of Excel data analysis: Advanced graphs and PivotCharts

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:1
posted:11/5/2012
language:Unknown
pages:16