March 2006
-
March 30, 2006
30
Mar'06
Microsoft repackages e-mail hosting service
Microsoft has renamed FrontBridge Technologies' hosted e-mail technology as Exchange Hosted Services. It includes services for antispam, archiving, encryption and disaster recovery. Continue Reading
-
March 30, 2006
30
Mar'06
Fresh Bagels offer baked-in rootkits
The prolific worm's latest variants now sport rootkit functionality; one AV firm says most malware may soon include rootkits because attackers won't be able to resist the ROI. Continue Reading
-
March 28, 2006
28
Mar'06
Third-party fixes available for IE flaw
The unofficial work-arounds for the createTextRange flaw suggest the security community doesn't like waiting for Microsoft to address potentially dangerous vulnerabilities. Continue Reading
-
March 27, 2006
27
Mar'06
Spear phishing: Don't be a target
Hackers are beginning to use targeted attacks to exploit network vulnerabilities. In this tip, Al Berg introduces a specific targeted attack, spear phishing, and provides tactics information security practitioners can use to protect their ... Continue Reading
-
March 23, 2006
23
Mar'06
Surveillance exposes malware that comes back from the dead
By using test machines to surf questionable Web sites, one vendor has found malware that outsmarts today's defenses, often by recreating itself after being deleted. Continue Reading
-
March 22, 2006
22
Mar'06
Open source Windows security tools
For Windows security, open source tools are often an afterthought, but they can be more flexible than Microsoft tools and less costly than third-party tools. Contributor Tony Bradley reviews a few of the lesser known open source security tools. Continue Reading
-
March 22, 2006
22
Mar'06
Microsoft investigates two IE flaws
Attackers could use the latest security holes to cause a denial of service or launch malicious code. Proof-of-concept exploit code has been written for one flaw. Continue Reading
-
March 22, 2006
22
Mar'06
Licensed enterprises will see Vista in November
Microsoft customers with Enterprise Agreements will get Vista bits in November. Everyone else will have to wait until January 2007. Continue Reading
-
March 21, 2006
21
Mar'06
Managing Samba: Windows network identity basics
Linux administrators keen to manage Samba well should be just as keen on learning the basics of Windows network identity, says Samba team co-founder John H. Terpstra. Understanding Windows networking identity basics can make Samba management a lot ... Continue Reading
-
March 21, 2006
21
Mar'06
Comparing rootkit detection tools
Do you suspect a rootkit has been installed on your computer? Windows security threat expert Kevin Beaver tells you what tools can help you find these rootkits and provides a helpful article to see which detection tool is most effective. Continue Reading
-
March 21, 2006
21
Mar'06
Nessus Technical Guide
Nessus Technical Guide Continue Reading
-
March 21, 2006
21
Mar'06
Removing rootkits
Windows security threats expert Kevin Beaver provides an article that shows you how to remove rootkits discovered by Rootkit Revealer. Continue Reading
-
March 21, 2006
21
Mar'06
Golden's Rules: Mixing Linux and Windows
If you listen to the debate between Microsoft advocates and open source zealots, you might easily conclude that it's an all-or-nothing proposition. For them, it's one or the other. Continue Reading
-
March 21, 2006
21
Mar'06
Running open source without dropping Windows
Technology executives are taking advantage of open source applications without shutting down their cherished Windows. Continue Reading
-
March 21, 2006
21
Mar'06
Robin Miller: How OpenOffice 2.0 stacks up against Microsoft Office
Author Robin Miller compares OpenOffice 2.0 and Microsoft Office in this interview and calls for the OS community to deliver personable, usable training for new OO and OSS users. Continue Reading
-
March 21, 2006
21
Mar'06
Displaying hidden windows
Is a worm running hidden windows on your machine? Windows security threats expert Kevin Beaver shares a useful tool to show all processes that your system is currently running. Continue Reading
-
March 21, 2006
21
Mar'06
Knoppix Hacks: Use Knoppix to rescue Windows
In "Knoppix Hacks," author Kyle Rankin explains how the Knoppix CD can be used as an indispensable, multi-purpose tool for administrators. One of the many things Knoppix can accomplish is rescuing Windows. In this e-mail exchange, Rankin provides ... Continue Reading
-
March 20, 2006
20
Mar'06
Nessus 2.1
Keeping patching up-to-date in today's worm and virus riddled world is critical to your network's security. This tool keeps track of the missing patches of a given system, without the potential hazards and false positives of remote security checks. Continue Reading
-
March 20, 2006
20
Mar'06
Adding users to a power user group
Windows security threat expert Kevin Beaver shares helpful articles about how to add users to a local power user group. Continue Reading
-
March 20, 2006
20
Mar'06
Lesser known Microsoft security utilities
Microsoft makes a big deal of security, but some of its useful security utilities fly under the radar. Contributor Brien M. Posey highlights a few of the more valuable Microsoft tools and provides short descriptions of each. Continue Reading