• January 31, 2006 31 Jan'06

    Step-by-step guide: Blocking IM and P2P

    In the wrong hands, IM and P2P file sharing can be too much of a risk for your organization. There are many ways to block this traffic, but some are more elegant -- with fewer adverse effects -- than others. Contributor Serdar Yegulalp details the ...  Continue Reading

  • January 31, 2006 31 Jan'06

    Step 4: The "block the application" approach

    In the wrong hands IM and P2P file sharing can be too much of a risk for your organization. There are many ways to block this traffic, but some are more elegant -- with less adverse effects -- than others. Contributor Serdar Yegulalp details this ...  Continue Reading

  • January 31, 2006 31 Jan'06

    Top 15 security tools for testing Windows

    Being proactive with security assessments can find unexpected vulnerabilities and ease pressure on patch Tuesday. Contributor and security testing guru Kevin Beaver discusses his 15 favorite security testing tools.  Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

Close