178 Results for:W3C
- Sort by:
Router Expert: Initial configuration of a Cisco 1200 802.11g WLAN access point
31 Jan 2006Our router expert continues his series on building a secure wireless LAN with a Linux base. This article explains how to utilize a single Cisco 1200 series access point to provide access to three different IP ... Read More
Creation of virtual machines utilizing command-line tools
11 Feb 2007Creating virtual machines for your customers is useful for them and lucrative for you. This excerpt outlines VMware ESX Server's creation and cloning tools. Read More
Integrating JSP/JSF and XML/XSLT: The Best of Both Worlds
01 Feb 2003The long awaited releases of JavaServer Faces TM (JSF) version 1.0 and JavaServer Pages TM (JSP) version 2.0 promise to transform the way J2EE developers build Web applications. Meanwhile, Extensible Stylesheet ... Read More
Developing my first Web Service in 30 minutes
01 Dec 2001You've heard the hype, and your head is probably dizzy from all the acronyms. So just what are Web Services, and how can you use them? This series of articles is intended to demystify Web Services and show, ... Read More
Value chain mapping – making sense of executive strategy
09 Nov 2016In this first excerpt from his book on value chain mapping, Simon Wardley explains why business leaders need to understand the importance of maps for corporate strategy Read More
DNS for a wireless network: Router Expert
21 Jul 2006DNS services are essential for building a secure wireless LAN. Our Router Expert provides complete instructions for setting up a DNS server, including implementing BIND, configuring a non-authoritative server and ... Read More
32-bit Remote Desktop Connection Client - Terminal Services for Windows Server 2003
09 Aug 2007Since most users who access Terminal Server environments do so from 32-bit Windows client devices, this is the client platform that Microsoft has spent the most effort on. Read More
How Azure actually works, courtesy of Mark Russinovich
01 Nov 2010Mark Russinovich -- Microsoft technical fellow, a lead on the Azure platform and a renowned Windows expert -- took pains at PDC '10 (Watch the "Inside Windows Azure" session here) to lay out a ... Read More
Recovering an Active Directory root domain in a multiple domain forest
15 Feb 2010Imagine your entire forest root domain failed. What would you do? This case study explores the steps taken in such a situation. Read More
Most popular viruses and hacking tools
14 Feb 2005Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, Trojans and worms. Read More