• August 31, 2005 31 Aug'05

    Patching Windows compared to Linux

    When it comes to Windows versus Linux, patching vulnerabilities is an often overlooked arena of comparison. In many ways, though, ease of patching can determine overall security, says security guru Jonathan Hassell. In this article, Hassell compares...  Continue Reading

  • August 29, 2005 29 Aug'05

    Deadline for SUS support extended

    Customers can no longer download the older version of Microsoft's free patch management tool, but they'll still be able to get software updates through the service for a little while longer if they are already using it.  Continue Reading

  • August 26, 2005 26 Aug'05

    Network safety relies on reaction time to Patch Tuesday

    Taking a wait-and-see approach before installing updates on Patch Tuesdays can leave your company vulnerable to attacks, thanks to zero-day exploits. Take some steps to provide your network assets have "defense in depth."  Continue Reading

  • August 21, 2005 21 Aug'05

    Windows Server 2003 SP1 reliability

    Site expert Jonathan Hassell gives his opinion on the reliability of Windows Server 2003, with or without Service Pack 1.  Continue Reading

  • August 21, 2005 21 Aug'05

    Establishing a network printer connection without authentication

    Authenticating users prior to granting them access to resources is is a cornerstone concept in Microsoft resource access says site expert Wes Noonan. Though not recommended, he does reveal a way to print without using Windows Active Directory.  Continue Reading

  • August 19, 2005 19 Aug'05

    How to protect your network from the Plug and Play exploits

    Security experts offer practical advice to reduce the risk of your company's networks being infected by a variety of malicious code now circulating.  Continue Reading

  • August 19, 2005 19 Aug'05

    How 'limited' malcode pulled off the year's biggest attack

    Experts thought worms targeting the Plug and Play flaw wouldn't do much because only Windows 2000 was affected. So how did they mount the biggest attack since Sasser?  Continue Reading

  • August 18, 2005 18 Aug'05

    Target network

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • August 18, 2005 18 Aug'05

    Initial compromise

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • August 18, 2005 18 Aug'05

    Hacking other machines

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • August 18, 2005 18 Aug'05

    Elevating privileges

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • August 18, 2005 18 Aug'05

    Enabling auditing on a File&Print server

    Enabling auditing has performance implications, but site expert Jonathan Hassell says unless your hardware is more than five years old or you have an unusually busy server, you won't even notice it.  Continue Reading

  • August 18, 2005 18 Aug'05

    Taking over the domain

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

Close