Tips

  • Unauthenticated vs. authenticated security testing

    Security testing as a user signed into the network can yield different results. Use unauthenticated and authenticated testing and learn the pros and cons of each method.

  • Enhancing patch management with NAP

    Patch management has always been a necessary evil for Windows systems. But now, thanks to Network Access Protection (NAP), patch management just got a whole lot easier.

  • How to exploit two common Windows vulnerabilities

    Metasploit and other free security testing tools can help you uncover Windows security vulnerabilities, like unencrypted laptop drives and local Windows password hashes.

  • Install Windows XP on a Vista-ready machine

    It's more complicated than you think to install Windows XP on a Vista-ready machine. Learn how you can downgrade Vista and run XP on new machines.

  • The 10 most common Windows security vulnerabilities

    Most Windows networks, including yours, have a number of security holes. Fortunately, though, many of these holes can be filled quickly and easily before they pose a major threat to your business-c...

  • Free security testing toolkit review: BackTrack 3

    The latest update to the BackTrack toolkit not only features several tools that can help lighten the load of security assessment in your organization, but it's also free. In this review, learn why ...

  • IE8 to focus on cross-browser compatibility

    With IE8, for the first time Microsoft will have a browser that adheres to pre-established Web standards. The browser, which is still in beta, will play by an established set of rules which will br...

  • Associating proper apps with file types

    Learn how to reset file extensions in Windows Vista and to assign the applications that should be used to open certain files on your computer.

  • Service level security in Vista and Server 2008

    Windows Service Hardening, a service level security feature in Windows Server 2008 and Vista, reduces security risks by limiting enabled services and privileges. Find out how in this excerpt from "...

  • UAC in Vista: Blessing or curse?

    More than a few admins have had issues with Windows Vista's User Account Control feature. Learn the basics of how UAC works, and why disabling it might not be the best idea.

  • Hybrid hard drive support boosts laptop performance

    Windows Vista is one of the first operating systems to fully support hybrid hard drives. Learn the pros and cons of using such drives with network laptops.

  • How to defend against cross-site scripting attacks

    Cross-site scripting is a threat to Web browsers everywhere, and that includes the onese in your company. See how a hacker can use an XSS attack to steal sensitive information from your organizatio...

  • Using Vista's overhauled Windows Task Scheduler

    Microsoft revamped its Task Scheduler tool with the release of Windows Vista. Learn how new enhancements to the console give administrators more control over triggers and actions.

  • IE8 delivers improved security features

    Although Internet Explorer 8 is not necessarily going to be a security-centric release, it does include some rather promising new security features. It's still too early to tell whether or not the...

  • Buffer overflows can be prevented by GS cookies

    Buffer overflows have plagued Windows users for years, but by using a compile time technology known as GS cookies, you can prevent them from damaging your Windows shop.

  • Making sense of Vista's Windows Experience Index

    Learn what Microsoft's Windows Experience Index scores mean, and how understanding them can help ensure better system performance of machines running Windows Vista.

  • How to use Group Policy to control wireless access

    Group Policy can be used to control wireless access in Windows networks. Find out which Group Policy settings you should create to accomplish this in this tip.

  • Creating a custom control panel in Vista

    While Microsoft's Control Panel in Windows Vista is more complex than its predecessors, admins can create a custom control panel to quickly find the icons they want.

  • Protect critical system resources with WRP

    Windows Resource Protection (WRP) has undergone some changes since it's predecessor, Windows File Protection (WFP) was used to protect critcal Windows system files. Learn about WRP's evolution and ...

  • Windows Task Manager: What's new in Vista?

    While already a useful tool for administrators, Microsoft made several improvements to its Task Manager utility for Windows Vista. Technical writer Brien Posey breaks down what has changed.