Network intrusion detection and prevention and malware removal

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Checklist: Block anonymous access

    You can change Windows account names to obscure them from attackers, but account SIDs can still be obtained using anonymous access. Foil intruders with this checklist. 

  • Real vs. virtual honeypots

    Honeypots are useful for faking out hackers -- but they're no panacea. This tip compares two main types of honeypots and offers best practices for keeping up with hack attempts. 

  • Defending Windows: How to choose an effective antivirus solution

    Antivirus software is an important piece of the security puzzle. This tip will help you choose the right solution to protect Windows from new virus, worm and malware threats. 

  • Get educated on URL spoofing scams

    In part one of this two-part series, find out how a little education goes a long way in preventing users from being badly misled by URL spoofing scams. 

  • Keep attackers from phishing in your waters

    Phishing perpetrators prey on naive users, making it critical that you prevent their scams from reaching inboxes at all. Here are some quick tips to block phishing attacks. 

  • Network perimeter defenses for smaller shops

    Windows security solutions in smaller shops should be simple and scalable over time. With this in mind, Wes Noonan offers his advice on setting up solid network perimeter defenses. 

  • How to prevent buffer overflow attacks

    In the final part of this two-part series, Brien Posey explains how to protect home-grown applications from buffer overflow attacks. 

  • How buffer overflow attacks work

    In part one of this two-part series, Brien Posey explains how hackers use buffer overflows to exploit home-grown applications. 

  • When malware attacks: Steps to proactively defend Windows

    As malware attacks become more creative and malicious, it's critical for administrators to proactively secure Windows. Get three steps to help save your servers from infection. 

  • Choosing your spyware weapons: Ad-Aware vs. Spybot

    Get help comparing the two most effective spyware tools, learn why they play well together and get one expert's two cents on how to ultimately solve the spyware dilemma here.