Patches, alerts and critical updates

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Never assume that a default software installation is secure

    This excerpt from "The administrator shortcut guide to patch management" provides a list of services you should never disable if you want to maintain strong security. 

  • Close all unused ports

    This excerpt from "The administrator shortcut guide to patch management" describes how to restrict traffic by only allowing it through certain firewall ports. 

  • The security landscape

    This excerpt from "The administrator shortcut guide to patch management" lists the top vulnerability categories and discusses the growing number of computer security threats that require patching. 

  • Types of vulnerabilities affecting patch management

    This excerpt from "The administrator shortcut guide to patch management" categorizes vulnerabilities into "administrative," "product" and "physical." 

  • Types of vulnerabilities affecting patch management

    This excerpt from "The administrator shortcut guide to patch management" categorizes vulnerabilities into "administrative," "product" and "physical." 

  • Simplify your Windows XP SP2 install

    XP SP2 helps protect your systems from time-sensitive security threats, making a speedy and smooth install essential. Here are tips to get multiple computers updated and secure. 

  • Prioritizing critical Windows patches

    Microsoft recently announced a new list of critical vulnerabilities that must be patched ... but which ones should you patch first? Get help setting your patch order here. 

  • Microsoft issues 10 security bulletins, seven critical

    Windows shops have 10 Microsoft security updates to sift through for October, covering fixes for a wide range of products. 

  • Windows Server 2003 security infrastructures: Chapter 5, 'Kerberos'

    Get technical detail and advice on using Kerberos authentication and authorization techniques to secure Windows 2000, Windows XP and Windows Server 2003 OSes in the excerpts from Chapter 5, 'Kerberos,' of Jan De Clercq's book Windows Server 2003 s... 

  • Schneier: Security outsourcing widespread by 2010

    In the second of a two-part interview, security luminary Bruce Schneier predicts rise in security outsourcing and talks about the strengths and weaknesses of security blogs.