• September 22, 2005 22 Sep'05

    Find a hacker by fingerprinting the bad guys

    Fingerprinting is a hacker technique for acquiring operating system information. According to Microsoft MVP Brien Posey it can be used against hackers to both acquire evidence against them and to obscure the identification of your own servers.  Continue Reading

  • September 22, 2005 22 Sep'05

    Firefox 1.0.7 fixes security holes

    Mozilla has corrected some serious security holes with the latest release of its Firefox browser.  Continue Reading

  • September 22, 2005 22 Sep'05

    Using gpedit.msc without affecting admin rights

    Site expert Kevin Beaver explains how you can use local and Active Directory policies to lock down laptops on a WLAN without affecting administrator privileges.  Continue Reading

  • September 22, 2005 22 Sep'05

    Opening secure files with FileReader

    One of the best ways to keep files secure in an NT-kernel environment is through the use of NTFS permissions. Here, site expert Jonathan Hassell explains how to access these secure files through FileReader.  Continue Reading

  • September 21, 2005 21 Sep'05

    cellular automaton (CA)

    A cellular automaton (CA) is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells.  Continue Reading

  • September 21, 2005 21 Sep'05

    patch management

    Patch management is an area of systems management that involves acquiring, testing, and installing multiple patches (code changes) to an administered computer system.  Continue Reading

  • September 21, 2005 21 Sep'05

    strong password

    A strong password is one that is designed to be hard for a person or program to discover.  Continue Reading

  • September 21, 2005 21 Sep'05

    Curl

    Curl is an object-oriented programming language designed to replace HTML, JavaScript, and related tools as a means for creating interactive Web pages.  Continue Reading

  • September 21, 2005 21 Sep'05

    ISA Server (Internet Security and Acceleration Server)

    Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to Microsoft's Proxy Server 2.0 (see proxy server) and is part of Microsoft's .NET support.  Continue Reading

  • September 21, 2005 21 Sep'05

    Anna Kournikova virus VBS.SST

    The Anna Kournikova VBS.SST computer virus, informally known as "Anna," is a viral worm that uses Visual Basic to infect Windows systems when a user unwittingly opens an e-mail note with an attachment that appears to be a graphic image of Russian ...  Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close