Search: password

More Results

Sort by: Relevance | Date
  • password entropy

    Password entropy is a measurement of how unpredictable a password is. Password entropy is based on the character set used (which is expansible by using lowercase, uppercase, numbers as well as...

  • password blacklist

    A password blacklist is a list of words disallowed as user passwords due to their commonplace use. Blacklists may also incorporate rules to prevent the use of common passwords with frequently-used...

  • Six endpoint management lessons from POS security breaches

    When it comes to compliance with security regulations, every retailer is doing just fine. At least that's what management, internal auditing and compliance officers will proclaim. Then it happens -- that big breach that's only supposed to hit...

  • Don't forget enterprise password protection in a merger or acquisition

    Data security is always a Windows admin priority, but be ready to explain the importance of enterprise password control during a merger or acquisition.

  • password strength meter

    A password strength meter is an indicator, either in graphical or text form, of the strength of a password as entered by a user. A password strength meter shows how resistant a given...

  • What you need to know about the Windows Security Accounts Manager

    These five capabilities of Security Accounts Manager, which is built into Windows, can help IT manage and enforce enterprise password management.

  • Microsoft takes aim at passwords

    Microsoft says it is determined to solve the problem of ineffective authentication that relies on usernames and passwords

  • Ensure compliance with Windows BitLocker encryption using MBAM 2.0

    In my previous article on Microsoft BitLocker Administration and Monitoring, we looked at how MBAM can help with...

  • Chapter excerpt: Defending the enterprise from password hacking

    In this excerpt from 'Hacking for Dummies, Fourth Edition,' author Kevin Beaver looks at the dangers of password hacking and how to respond to them.

  • Steering your career as a desktop admin in the mobility age

    As you already know if you've worked in enterprise IT for any length of time, change is inevitable. The desktop has evolved from a static canvas where each user's picture looked pretty much the same to a wildly dynamic playground where each user...

Search Again: