Desktop
Windows Small Business Server 2011 : Installing the Second Server (part 4) - Enable Updates and Feedback
Windows Small Business Server 2011 : Installing the Second Server (part 4) - Enable Updates and Feedback The next group of settings on the ICT Wizard is used to set how updates are handled and what feedback is sent to Microsoft. The first setting in this ...
-  Windows 7 : Software Installation - What You Need to Know
-  Ultrabooks starts to succeed tablet
 
Website
IIS 7.0 : Managing IIS Manager Extensions
IIS 7.0 : Managing IIS Manager ExtensionsIn addition to the programmatic and command line options, the IIS 7.0 administration stack also provides a GUI management tool. IIS Manager, which replaces ...
-  Sharepoint 2013 : SharePoint Publishing Infrastructure (part 5) - Content Management - Putting It All Together
-  Developing an SEO-Friendly Website: Content Delivery and Search Spider Control (part 2)
 
 
Nokia Lumia 520 - Does Nokia Really Need Another Budget Windows Phone? (Part 2)
Nokia Lumia 520 - Does Nokia Really Need Another Budget Windows Phone? (Part 2)The Lumia 520 handled Windows Phone 8 quite well, with its top-notch cellular components offering decent HSPA+ speeds (often up to 21Mbps download), on par with the other smartphones we tested on the Vodafone network in London. In some places, it received an extra signal bar over fancier phones, so reception is definitely on the strong side.
-  Ipad : Presentations with Keynote - Building Your Own Slide
-  Spam Texts Will Finally Be Tackled As Networks Take Action
-  A Case For Quality (Part 3) - StilGut – UltraSlim Case for the new iPad, Toffee – Premium Leather Folio for iPad 2/3
-  Get More From Your Mobile Devices (Part 2)
 
 
 
 
Create Your Own E-Books (Part 3) - The Amazon Effect & Kindle Tools
Create Your Own E-Books (Part 3) - The Amazon Effect & Kindle ToolsUnsurprisingly, Amazon is keen to encourage new and established authors to bolster their e-book library. In fact, it's now seen as a serious competitor in the digital publishing industry, and is certainly powerful enough to compete with even the biggest ...
-  Manage and Covert Your eBooks (Part 1)
-  Holiday Gift Guide 2013 - Backpacks And Cases
-  Buying Advice: DSLR
-  Grouptest Headphones: $150-$210 - Phone Home (Part 4) - Grado SR60i
 
 
 
 
 
SQL Server 2005 : Basic OLAP - Building Your First Cube (part 5) - Using the Dimension Designer
SQL Server 2005 : Basic OLAP - Building Your First Cube (part 5) - Using the Dimension DesignerThe dimension designer, like the cube designer, has tabs across the top and a three-pane view in the rest of the window. Within the Dimension Structure tab, the Attributes pane is on the left, the Hierarchies And Levels pane is in the center, and the ...
-  Programming Microsoft SQL Server 2005 : FOR XML Commands (part 1) - FOR XML RAW & FOR XML AUTO
-  SQL Server 2005 : Beyond OWC: Full-On OLAP Development (part 3) - XMLA at Your Service
-  SQL Server 2012 : Troubleshooting Methodology and Practices - Approaching Problems
-  SQL Injection : Platform-Level Defenses - Using Runtime Protection (part 1) - Web Application Firewalls
 
 
 
 
Windows System Programming : The Registry
Windows System Programming : The RegistryThe registry is a centralized, hierarchical database for application and system configuration information. Access to the registry is through registry keys, which are analogous to file system directories.
-  Exchange Server 2010 Administration Overview (part 3) - Using the Graphical Administration Tools, Using the Command-Line Administration Tools
-  All We Need To Know About Green Computing (Part 3)
-  Microsoft Exchange Server 2010 : Creating and Managing Database Availability Groups (part 4) - Configuring Database Availability Group Properties
-  Master Apple Mail (Part 2)
 
 
 
 
Configuring a Web Application for Security
The sample web application that was illustrated in the previous section has one important limitation: It can be accessed by anonymous users that can access important data.
-  Sharing Files and Folders Over the Network in Vista
-  Windows Server 2008 and Windows Vista : GPO Security (part 1)
-  A Click Away From Malware
-  Programming .NET Security : Programming XML Signatures (part 2) - Embedding Objects in the Signature
-  How To Find And Follow The Best Backup And Password Strategies (Part 2)
-  Password Hacks (Part 2) - Criminal activity