User passwords and network permissions

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • 8 tips in 8 minutes: Password authentication and protection

    As part of the 25 password hardening tips in 25 minutes series, these eight quick tips offer best practices for password authentication and protection from SearchWindowsSecurity.com experts and contributors. 

  • 7 tips in 7 minutes: Windows password creation

    As part of the 25 password hardening tips in 25 minutes series, the the following seven quick tips offer best practices for creating strong passwords from SearchWindowsSecurity.com experts and contributors. 

  • #7: How to manage multiple unique passwords

    Do you really need to use unique passwords for every account? Get Roberta's answer to that question and her advice for managing multiple passwords in this expert response. 

  • How to securely connect Windows NT Web server to SQL Server

    Get best practices from your peers for connecting an NT Web server to SQL Server. 

  • Featured ITKnowledge Exchange Tips

    Here you'll find an archive of some of the best Windows security tips and tricks shared in our ITKnowledge Exchange. Check back frequently for a new topic. 

  • The weakened state of the network perimeter

    In part one of this three-part series, author Wes Noonan addresses data security issues associated with a porous network perimeter, and explains why removing the perimeter is not the solution. 

  • Graphical passwords still far from picture perfect

    The proliferation of data and devices is making more enterprises consider graphics-based authentication, from which arises a greater pool of possibilities -- and problems.