Vol. 22, #24 - June 12, 2017 - Issue #1135

Privacy briefs

Free Tool: Permissions Analyzer for Active Directory 


SolarWinds® Permissions Analyzer for Active Directory™ gives you instant visibility into user and group permissions and a complete hierarchical view of the effective permissions and access rights for a specific NTFS file folder or share drive – all from a user friendly desktop dashboard.  Browse permissions by group or individual user, and analyze user permissions based on group membership combined with specific permissions.  Unravel a tangled mess of file permissions: network share, folder, Active Directory, inherent, explicit, calculated and more.

Download the Free Permissions Analyzer Tool Today. 

Editor's Corner

This week's newsletter is all about issues relating to privacy that are of interest to IT professionals and those who manage IT departments. We also have a new Ask Our Readers item we need your help with, plus the second installment of my new IT Pro Fitness Corner with an exercise tip that may help you stay fit. And of course we have other tips, tools, and links to stuff both informative and amusing.

Speaking of fitness, it's almost been seven years since I began my personal journey from "fat IT pro" to "fit IT pro" and I'll share a few details about where I'm at with my journey sometime in the Fall. I originally shared the beginnings of my journey back in March 2013 in Issue #922 of this newsletter and the flood of responses I received, some of which we published afterwards in Issue #926, certainly indicates that fitness (or the lack thereof) is a big concern for many of our readers. So with my own 7-year fitness anniversary approaching in a few months, I decided last week to add the IT Pro Fitness Corner section to each issue where I share some of my own fitness tips, thoughts, and observations (plus any that you readers send to me) to help those of you who are on the same journey towards fitness that I'm on.

After all, we all know from Dilbert that engineers, like IT pros, are generally overweight and underfit. But as this particular Dilbert comic strip indicates, there's hope for all of us:


Ask Our Readers - Creating a USB HHD rescue disk for Windows (new question)

A reader named Wlad from Alabama, USA sent us the following question which we're tossing out to our readers to try and answer:

Would it be possible to pose the following question to ask on our readers forum? I have spent last month researching the issue and I'm more confused than ever. I want to create a "rescue disk" for several systems I use, starting with Windows 7 and ending with Windows 10. What I have in mind is a single USB HDD for each system. The drive would be formatted as a "bootable USB" first (whatever that means, I found a dozen different descriptions) and then further partitioned to include a secondary, non-bootable partition. On that second partition I want to create the computer's HDD clone, but not in the form of the USB HDD being a clone of the computer HDD, but the USB HDD containing a file (or a filesystem) that is an exact clone of the source HDD. Let us call it a "total HDD image". The goal is to have a single USB HDD that, in case of emergency (wannacry ?) I could connect to the computer in distress, boot from, and then restore the entire HDD from the total HDD image backup. The aim is to restore everything, bit for bit (boot bootstrap, system, Windows files, installed programs, user data, EVERYTHING).
Has anybody done this? Could it even be done or am I chasing an impossible dream? Microsoft is not helping with their constant "improvements" of backup and recovery mechanisms and associated mess of confusing terms that have changing meaning over time (like a system backup that may or may not include non-MS applications). Thanks.

If any of you readers have any suggestions for Wlad please email us at [email protected]

Ask Our Readers - Sharing files between Hyper-V host and Windows client (some responses)

Last week we received the following question from a reader named Geoff:

Thanks for your article:


Followed it and it worked -- have a Windows 10 Host and a Windows XP client. But after applying ransomware patch, the shared folders in the Windows 10 Host cannot be seen anymore by the virtual Windows XP, any advice you can give me to make this work again? tried recreating the shared folders but didn't work, Virtual WinXP can ping Windows 10 host, but when opening \\hostname of host\ or \\ip address of host\ , nothing. Would appreciate your advice.

Chuck Timon, a Senior Premier Field Engineer (PFE) at Microsoft, has provided an explanation of what's happening:

Geoff, I read about your issue in the WServerNews.com newsletter that I receive. Microsoft patched an SMBv1 vulnerability in order to combat the ransomware issue. Windows XP uses SMBv1. I am guessing that is why the sharing no longer works in your environment that was patched. Newer versions of SMB do not work in Windows XP:


There is a fix for the vulnerability in XP here:


but I do not believe that will bring back your ability to connect to the share on Windows 10.

Another reader named Pat also shared his own experience as follows:

With regards to the query from Geoff, I assume the 'Ransomware patch' he's referring to is the Windows update that killed off SMB1? We had a similar issue/setup with a client of ours who was running a Server 2012R2 host and had a Server 2003 client, also with folder sharing from host to client.

Long and short of this story is that once we applied the Microsoft patch the folder share no longer worked. From what I gather Server 2003 and Windows XP only understand SMB1 so once the patch is applied, it severs this protocol for good. And I mean, for good! Uninstalling it didn't help at all.

In the end we decided not to waste any more time than we already had trying to make this work and just setup user access to the host machine instead but I think if Geoff has done the same thing as we did, then it simply won't work anymore. Credit to Microsoft; they really have done a hell of a job in killing off SMB1 stone dead.

I'll personally be very interested to see if anyone else has managed to resolve this issue as at the risk of sounding slightly cynical, this does seem to have been a convenient way for Microsoft to hammer another nail into XP's coffin.

And another reader named Tony comments:

I think the reason that the ransomware patch may have broken this is down to the fact that the problem is with SMB1. Older Windows systems only use SMB1; newer ones use SMB2 and SMB3.

The reader does not say how he is connected to the Windows XP client. Regardless of how it is, the problem may actually be with his Windows 10 -- after the ransomware issue, it was recommended to disable SMB1 on machines. The downside of this is that they cannot then connect to Windows XP or Windows 2003 server. He should check to see that he still has SMB1 enabled as a protocol on his Windows 10 host.

This same point applies to NAS's and anything else on the network. If anything is as old as Windows XP and Windows 2003 server, then you must keep the old SMB1 protocol running for any machines that need to share files over the network. So, for example, my desktop still needs SMB1 as I have a Windows 2003 server VM running on it that has a legacy program running on it, but I have turned off SMB1 on my NAS's and other servers.

Ask Our Readers - Isolating "training" network from "work" network (two comments and a request)

A few weeks ago we published some reader response to the following question from Alain:

Hi Mitch, thanks for continuing the very good WServerNews newsletter -- it always provides good tips. Can I ask you some advice on network setup? I want to extend my current small business network setup which works perfectly for my purposes to have a second "training" network setup so that trainees are not able to access my work network, but still have access to an application on the internet…

While Alain has already thanked our readers for their help on this matter, we did receive two more comments this week that we felt we should publish. This first one comes from a reader named David who is a CISSP:

I see in the "closing the loop" comment Alain seems resigned to putting in a separate network, thus impacting the business case. If he would replace his current internet router with a small firewall appliance (Fortinet, Sonicwall, WatchGuard, PFSense, you get the idea) he could create an isolated network for the training users. He could then set up any necessary routes in the appliance to allow access to specific servers or the internet, while denying all other traffic. That seems much more economical than adding a completely separate circuit. Fortinet even offers access points, so he could have a very integrated solution all managed from one interface. Add the necessary SSIDs and put them on separate VLANs. It's not very hard at all, and there are lots of help available via his favorite internet search engine.

The second is from Tony in the UK who also has a request about VLANs we're redirecting to our readers:

I had a thought on this -- even most switches support VLANs these days but I suspect few of us, me included, know how to use them properly and securely. I was prompted to think of this because Alain commented that it would increase the cost by doubling the communications. This also led me on to think about Hyper-V and the fact that virtual machines are easy to have (so long as you have enough memory) and that Hyper-V also supports different LANs and virtual networks.

This led me to think that maybe there is a generic solution possible for anyone who needs to do training, based on VMs and VLANs, which could obviate the need to have dedicated hardware. To be secure you might need to either dual boot to a VM or real training installation. A lot of it also comes down to understanding VLANs and how they can be isolated and made secure. A scheme of doing this would also be great for testing things out.

Maybe we could use the power of your readership and set up a collaboration to develop a solution for all based on this. I don't know enough about VLANs but they have always interested me as to how secure and isolated they potentially are as they would enable network infrastructures to be much more generic and possibly more resilient. At the moment, I run a system similar to those proposed for Alain -- I have an "external network" -- used for guests and devices such as smart TVs and then a firewall separating it from an "internal network". But it would be a lot easier if these could be isolated VLANs on the same network infrastructure. Like probably everyone else, I have not had the time to do enough investigation into VLANs and their security and isolation to be sufficiently confident I can achieve close to the same security as a physical system.

Do any readers want to take a stab at responding to Tony's request? Email us at [email protected]

Ask Our Readers: WServerNews has almost 100,000 subscribers worldwide. That's a lot of expertise to tap into. Do you need help with some issue or need advice on something IT-related? Got a question you'd like us to toss out to our readers to try and answer? Email us at [email protected]

From the mailbag

Last week in Issue #1134 Bad day for BA we summarized what we know and can learn from the IT disaster that hit British Airways recently. Several readers wrote to us to comment on this matter and their own personal experiences. For instance, a reader named John says:

If you want to get to the bottom of BA's problem, you have to go further into the business process than just pointing out that the IT support was outsourced. The real problem for BA and many other companies arrived when companies were advised to put the CFO in charge of IT. Now, accounts who are constantly playing with numbers and calculating risk and loss in order to satisfy shareholders are the ones deciding whether security, redundancy, and business continuation plans are "affordable". Ask yourself these questions:

Bean counters run the numbers and figure it's "better" to run the risk and "maybe" file insurance claims and pay off consumers rather than fund CAPEX expenditures and provide more than minimal OPEX budgeting necessary to update, maintain, and protect IT infrastructure systems. As long as making shareholders happy with short term profits is most important, this will ALWAYS happen and the customers will pay the penalties.

I'm sure many other readers who are involved in IT decision-making and management may feel similar to how John does. Feel free to comment further on this by emailing your stories to us at [email protected]

Another reader named Joanne who is an IT Director for a Canadian not-for-profit organization had a question which some of our readers who manage datacenters may be able to answer:

In the clip you included from the UP2V article, it said: "Unfortunately, computers in these data centres are used to being up and running for lengthy periods of time. That means, when you restart them, components like memory chips and network cards fail." 

Is this a common thing? Why would restarting after being up for a long period of time suddenly cause them to fail? And does this mean that they should have scheduled reboots as part of their normal maintenance window? My company is too small to have a data centre but as we grow larger it sounds like something I need to keep in mind.

Many of the news articles about the IT disaster BA experienced tell affected flyers that they're eligible for compensation under EU law. Tony from the UK had several stories to share regarding this matter of compensation:

Hi Mitch, had to do this one (not BA) -- it is a long story, but summarized:

  1. Alitalia cancelled flight -- I had to book onto another airline at higher cost.
  2. I put in the standard EU denied boarding compensation claim. No response.
  3. I went to my MEP who I happen to know well pointing out that EU consumer legislation was not much use if it was not enforced. This went to the EU transport Commissioner, who sent it to the UK government. They replied to me that it was an offence with a fine not to pay this.
  4. Meanwhile, Alitalia filed Chapter 11 and I had to file a claim in Rome in Italian, which I did, but of course got nothing.
  5. So I claimed on my credit card (under the UK's consumer credit acts). My bank then decided it was a charge card and therefore not covered, despite this card having travel insurance (which doesn't cover this because it is covered by EU compensation) and stated that it provided better protection than the standard credit card. Eventually after months of wrangling, the bank made an ex-gratia payment of the standard EU compensation amount.

Ryanair had several high profile disagreements with the EC claiming they did not need to pay compensation until they were finally forced to pay up. However, I have just failed in another claim, which is worth reporting to your readers, as I am sure many will want to know about this one.

  1. My wife flew to Brussels and with her had a cabin bag within the required dimensions. However, they took it from her at the aircraft steps and put it in the hold. At the other end, they threw it out before giving it to her at the aircraft steps. When she got to her destination, she found her touch screen laptop had been smashed. The airline denied the claim, on the basis that they were not responsible because it was checked baggage. We went to the new ADR (Airline Dispute Resolution) procedure, which took 5 months and came down with the airline.

  2. Despite being told by the airline staff subsequently when they took my cabin bag that it remained hand baggage, the legal position is that when they take it from you it becomes checked baggage. Therefore they are not responsible for anything valuable or fragile.

  3. There is one further point. The rules are quite complex on electronic equipment these days -- some is only allowed in checked baggage and some only allowed in hand baggage. Thus, when taking your bag to be put in the hold, they should recheck that there are no items in it that are not allowed in the hold, but I have never known them do this, and the CAA (UK equivalent of the FAA) confirmed to me that this is an omission in the airline's security procedure.
With all the talk of banning laptops in the cabin on flights, your readers might like to know that they then become checked baggage and the airline has virtually no responsibility for their damage or loss.

If any other readers want to comment on any of the above you can email us at [email protected]

Now let's catch up on some news regarding privacy that may be of interest to our readers…


Protecting NTP

SlashDot has a post about a proposal for hardening the Network Time Protocol to increase privacy and protect users from spying:


OneLogin hacked

Users of the password manager / SSO provider OneLogin need to be aware that their customer information may have been compromised. See this ZDNet article for details:


Adblocking superweapon

Many users see modern web advertising techniques as an invasion of privacy, especially when they are designed to render adblocking software ineffective. Vice MotherBoard has an article about a new adblocking "superweapon" that "may put an end to the ad-blocking arms race":


VPN interest rises

Now that the FCC broadband privacy rules have been repealed in the USA, interest in VPN services seems to be on the rise as this Reuters article suggests:


What VPN service do our readers use if any for their business or personal use to ensure privacy? Email your recommendations to us at [email protected]

Not so smart TVs

A post on SolyentNews suggests that 90% of Smart TVs are vulnerable to remote hacking via rogue TV signals:


Better watch what you say in your living room!

Read those updated privacy policies!

This news is a bit old, but back in December Evernote "announced that it will be updating its privacy policy next month to allow employees to physically see data users upload to its service" as indicated in this article in The Financial Post:


Two days later The Financial Post published a second article titled "After public backlash, Evernote reverses new privacy policy that allowed employees to read customer data"


The moral of the story is that you should be vigilant concerning changes to a service provider's privacy policy!

Silent voicemail

Voicemail can be annoying when a telemarketer leaves messages. How much worse though when the messages are recorded but your phone never rings! The New York Times has the story:


Color printer fingerprints

I didn't know this but The Washington Post has an article about the alleged source of a recent NSA leak which says, "Nearly all modern color printers feature such tracking markers, which are used to identify a printer’s serial number and the date and time a page was printed."

Or as data analyst Tim Bennet tweeted, "Color printers spy on you."

What other commonly used technologies "spy" on you without your general awareness of it occurring? Email us at [email protected] so we can better protect our privacy.

Send us your feedback

Got feedback about anything in this issue of WServerNews? Email us at [email protected]

Recommended for Learning

VIDEO: What's New in Microsoft Internet Information Server 10 with Windows Server 2016

In this episode we will reveal all of the great new features and performance enhancements included so that you can understand how this may affect your deployment decisions with Windows Server 2016. We will review support for HTTP2, Nano Server, containers, management, deployment on premise vs. cloud and open source options.



Microsoft Virtual Academy

Cloud App Security: Understanding

Watch this course for a greater understanding of Microsoft Cloud App Security and its key functionality, benefits and advantages. Our expert instructors explore this comprehensive service and set of data protection features that also provide visibility into files and sharing status across cloud-based applications.


NEW! - IT Pro Fitness Corner

Fitness Tip - Always exercise legs

I always try to exercise my legs every day.

Yes, every day.

Apparently I'm in good company as Jason Statham says he does the same--check out the April issue of Men'sHealthUK magazine for this interview The Stath:


But what about days where I focus on resistance (weight) training instead of doing cardio? Even on strength training days, I'll start off with 10-15 minutes of progressively heavier work on a reclining exercise bike before I start lifting iron. Why? Because I've found that a short but intense leg workout does something morning caffeine just won't do for me: get my body warmed up and ready to lift weights. If I skip my bike time and go straight to weights I often find I don't have much drive or enthusiasm for pumping iron, and my workout usually suffers as a result of my slower metabolism and reduced motivation. But if I pump my body up first by exercising the largest muscles in my body (legs) then I usually find I have the energy to do a really good resistance training workout even if it's only a half hour in duration.

Hope that helps!

Disclaimer:  I'm not a certified fitness professional or nutritionist so take any suggestions I make "as is" with a grain of salt and a heaping supply of your own judgment. And send me your feedback and any fitness tips of your own you might have by emailing me at [email protected]

Factoid of the Week

Last week's factoid and question was this:

Motorists waste 29 hours every year using sat navs. What was the worst thing that ever happened to you when you relied on GPS to drive to some destination?

We received a number of hilarious stories in response to the above question, here's a short selection:

I’ve had a few mildly adverse experiences. Once when going to a park out in the country the GPS had me take a right (East bound) and travel several miles to the destination. After traveling past the designated point I turned around and went back to the initial turn to discover the park was only a 100 yards West of the intersection! Another time I was going to a hospital to visit an family member. The GPS had me go outside the town for 10 miles to an empty pasture.  Turns out the hospital was in the center of the town. One other time on vacation I was going to a condo on a peninsula in Florida. I had to get on a divided highway to cross the bridge to the peninsula. The GPS told me to turn down a specific road which would take me straight to the highway.  It did but ended 100 feed short of the road with a six foot fence blocking my path.  Turns out the connector had been removed and my GPS map had not been updated. - Tom, Senior Messaging Architect

This didn’t happen to me but I did find it interesting… Georgia homeowner Al Byrd is all too familiar with people having unnatural faith in technology. Byrd's home was demolished by construction crews who had put more faith in GPS coordinates than critical thinking. The house intended to be torn down was located across the street, but it was too late: Byrd's home-the one his father built brick-by-brick, the one containing decades of family heirlooms-was destroyed. --Don

Not the worst, but we had a laugh. When on a road trip, with our first GPS, in Lincoln, Oregon.  We had a lusting for a coffee shop.  After traipsing up and down some country roads, we were eventually lead to someone’s house.  Given the old signs leaning against the garage, we surmised that it was the registered business address, rather than the shop itself. -- Colin, Computer and Communications Systems Manager

Directed me down a road where the bridge washed out over 20 years ago and was never replaced. --John

Now let's move on to this week's factoid which continues with the military theme from two issues ago:

Fact: The phrase "too much queep" means too much paperwork in US Air Force lingo.

Source: http://www.wservernews.com/go/mtzzr69r/

Question: Do any readers know or use any similar weird jargon that expresses frustration in the workplace?

Email your answer to us at: [email protected]

Until next week, 

Mitch Tulloch


Admin Toolbox

Admin Tools We Think You Shouldn't Be Without

GOT ADMIN TOOLS or other software/hardware you'd like to recommend? Email us at [email protected]

Join the live webinar and learn how to protect MS Dynamics CRM with Veeam. Pick up the best backup strategies for mission-critical application: Microsoft AD, SQL Server and Dynamics CRM Server 2016.


Netwrix Effective Permissions Reporting Tool delivers actionable insight into who has permissions to what in Active Directory and file shares:


Microsoft's Junk E-mail Reporting Tool lets you easily report misclassified e-mail to Microsoft and its affiliates for analysis to help us improve the effectiveness of our e-mail protection technologies


FrontFace Lockdown Tool is a free tool which enables restricting or locking down any Windows user account:



This Week's Tips

GOT TIPS you'd like to share with other readers? Email us at [email protected]

Windows 10 S - Run any Win32 apps

While Microsoft's announced Windows 10 S platform is only supposed to run universal apps from the Windows Store, Citrix has released their Citrix Receiver client for XenDesktop and XenApp as a Windows 10 universal app which is now available from the Windows Store:


This means you can now run any Win32 app on Windows 10 S. Softpedia has news about it here:


Windows 10 - Free up disk space after installing Creators Update

BetaNews has a helpful tip on how you can reclaim over 20 GB of hard drive space on your system after upgrading to Creators Update:


Windows Server - Troubleshooting cluster validation

Mitch Garvis shares how he solved a validation failure when building a two-node cluster of Windows Server 2016 Hyper-V hosts:


Events Calendar

Microsoft Worldwide Partner Conference (WPC) on July 9-13, 2017 in Washington, D.C.


Microsoft Ignite on September 25-29, 2017 in Orlando, Florida


Add Your Event

PLANNING A CONFERENCE OR OTHER EVENT you'd like to tell our 100,000 subscribers about? Contact [email protected]

New on TechGenix.com

Roll your own: What the citizen developer wave means for your enterprise IT security

Your next work-based application may be coded by an end user, not a paid developer. A look at the advantages and pitfalls of the citizen developer wave.


Video: Install Azure CLI and Azure Functions CLI

Adding the Azure CLI and related functions can help you be more productive. This tutorial and video will get you up and running quickly.


Accessing Azure from PowerShell: All you need to know

Microsoft makes it easy to access Azure from PowerShell. Here are some tips, tricks, and useful cmdlets to get you started.


Subtitle vulnerabilities attack allows for mass remote code execution

A subtitle vulnerabilities attack on users of popular streaming services is a viable threat. Here’s how to protect yourself.


Dell EMC, VMware Horizon introduce VDI Complete

Dell EMC and VMware have combined to offer VDI Complete, a product they say can be a solution for all your virtual desktop infrastructure requirements.



Tech Briefing


Introduction to MySQL & PHP on Azure App Services (WIMP) (Build on SharePoint)


Exploring the preconfigured browser-based Linux Cloud Shell built into the Azure Portal (Scott Hanselman)


Enterprise IT

StorSimple - the Answer I thought I'd never give (Aidan Finn)


Creating an Active Directory domain with PowerShell DSC (4sysops)



Hyper-V Container and Nested Virtualization in Microsoft Azure Virtual Machines (Thomas Maurer)


Editing a .VMCX file (Ben Armstrong)



The PowerShell WhatIf parameter (4sysops)


Using PowerShell to disable or remove SMB1 (Jan Egil Ring)



CNG Data Encryption Providers in IIS 10 (IIS.NET)


Microsoft Offers More Advice on Disabling Windows SMB 1 (Redmond Magazine)


Other Articles of Interest

Citrix is poised to be more aggressive as rivalry with VMware heats up

For the past few years, VMware has garnered most of the buzz in the Citrix/VMware rivalry. We may see a more aggressive Citrix and an increased rivalry heading into conference season this year. Find out more here.


How to pick the right VDI management and monitoring tools

VDI management and monitoring tools can solve different problems for different teams. Buyers must know what problems they need the product to address. When evaluating different tools, it is important to look for solid troubleshooting, load testing and capacity planning features to choose the most fitting tool for your organization.


Apperian eyes mobile application security after Arxan acquisition

MAM provider Apperian looks to take advantage of a larger support staff and new mobile application security technology following its acquisition by Arxan. What should Apperian customers expect from the acquisition? Learn more inside.


Microsoft, Google vie to be masters of the universal OS

Developers and IT admins have to manage and build apps for a multitude of different operating systems and device types. Windows 10 and Google's universal OS could change that. Universal operating systems could make it easier to develop and manage enterprise applications across multiple form factors.



WServerNews FAVE Links

This Week's Links We Like. Tips, Hints And Fun Stuff

GOT FUN VIDEOS or other fun links to suggest you'd like to recommend? Email us at [email protected]

Man Rides Drone Like A Hoverboard At Portuguese Cup Final

The match ball for the 2017 Portuguese Cup final was delivered to the referee by a man on a drone:


Flyboard Air Show By Zapata Racing

The 'fastest, safest and most maneuverable personal aviation system' demonstrated by its inventor Franky Zapata:


Magician Richard Jones

Magician Richard Jones, the grand price winner of Britain’s Got Talent 2016, makes a spectacular return as he amazes the judges and audience:


Two Cats - One Bowl Of Milk

Adorable and funny video of two cats bickering over who should be next to drink the milk out of the dish they share:


WServerNews - Product of the Week

Free Tool: Permissions Analyzer for Active Directory 


SolarWinds® Permissions Analyzer for Active Directory™ gives you instant visibility into user and group permissions and a complete hierarchical view of the effective permissions and access rights for a specific NTFS file folder or share drive – all from a user friendly desktop dashboard.  Browse permissions by group or individual user, and analyze user permissions based on group membership combined with specific permissions.  Unravel a tangled mess of file permissions: network share, folder, Active Directory, inherent, explicit, calculated and more.

Download the Free Permissions Analyzer Tool Today. 

WServerNews - Editors

Mitch Tulloch is Senior Editor of WServerNews and is a widely recognized expert on Windows administration, deployment and virtualization. Mitch was lead author of the bestselling Windows 7 Resource Kit and has been author or series editor for almost fifty books mostly published by Microsoft Press. Mitch is also a ten-time recipient of Microsoft's Most Valuable Professional (MVP) award for his  outstanding contributions in support of the global IT pro community. Mitch owns and runs an information technology content development business based in Winnipeg, Canada. For more information see www.mtit.com.

Ingrid Tulloch is Associate Editor of WServerNews and was co-author of the Microsoft Encyclopedia of Networking from Microsoft Press. Ingrid is also manages research and marketing for our content development business and has co-developed university-level courses in Information Security Management for a Masters of Business Administration program.