• July 19, 2005 19 Jul'05

    Microsoft's enterprise antispyware may be anticlimactic

    Despite a growing threat from rootkits and other malware, analysts say an enterprise version of Microsoft's Windows AntiSpyware technology isn't likely to be widely adopted -- unless the price is right.

  • June 10, 2005 10 Jun'05

    Ask Microsoft: How can I automate Disk Defragmenter?

    A manager for Microsoft's internal IT organization talks about how automate Disk Defragmenter using the Task Scheduler tool in Windows XP.

  • June 07, 2005 07 Jun'05

    Software patching remains a laborious process

    IT professionals at Microsoft's TechEd conference say they are still scrambling to keep their Windows systems one step ahead of vulnerabilities, despite the steady stream of new products designed to ease their burden.

  • May 25, 2005 25 May'05

    Attack uses Microsoft flaw to hold files hostage

    "Ransom-ware" is uncommon, but uses a disturbing method to extract money from enterprises. Learn how to protect your company.

  • May 19, 2005 19 May'05

    Run, don't walk, toward IPS security

    An intrusion detection system (IDS) won't cut it when it comes to Windows security. Author Jonathan Hassell explains why you must deploy an intrusion prevention system (IPS) ASAP.

  • Sponsored News

    View All Sponsored News
  • May 08, 2005 08 May'05

    What are user-mode vs. kernel-mode rootkits?

    All modes of rootkits are difficult to detect, but one type is preferred by hackers over another. Read about different rootkits in this tip.

  • May 08, 2005 08 May'05

    How does an attacker install a rootkit?

    Learn how an attacker installs a rootkit on a Windows system in this tip.

  • May 08, 2005 08 May'05

    What is a rootkit?

    Learn about the history of rootkits and how attackers use them for evildoing in this tip.

  • May 08, 2005 08 May'05

    How can I detect and remove rootkits from Windows?

    When a rootkit detection tool is updated or a new tool is released, rootkit authors update their malware to avoid detection. How can you get around this problem? Get help here.

  • April 21, 2005 21 Apr'05

    I've been hacked -- I think ...

    Get advice from your peers on how to identify if you've been hacked, what steps to take to contain the damage and how to prevent future attacks.

  • April 20, 2005 20 Apr'05

    You've been hacked: Stage one -- Diagnosis

    Given the information in the hacking scenario, has this person been hacked or not? Find out what the experts have to say.

  • March 13, 2005 13 Mar'05

    Learning Guide: Authentication

    Without proper hardening defenses in place, Windows authentication quickly becomes a target for hackers and crackers. Learn about important Windows authentication credentials and protocols, and get help hardening authentication for user logon, ...

  • March 03, 2005 03 Mar'05

    Spy Fighters: Antispyware lessons learned by readers

    When asked which antispyware solutions work best, readers have a lot to say. A group of true spy fighters share their nightmares, opinions and advice on beating spyware.

  • March 03, 2005 03 Mar'05

    Spy Fighters: Managing spyware protection for remote employees

    This remote access engineer and reader explains how he centrally manages spyware protection and cleansing for 45,000 employees' work and home machines.

  • March 01, 2005 01 Mar'05

    How much encryption is too much?

    Many security companies try to thwart competitors by including stronger encryption in their products. But is this a battle worth fighting? Brien Posey offers his take on encryption-strength wars and explains how to ultimately achieve adequate ...

  • February 28, 2005 28 Feb'05

    Reduce spyware infections by educating users

    Get suggestions on the best methods for reducing spyware, adware and malware on users' PCs in this ITKnowledge Exchange Tip of the Week.

  • February 24, 2005 24 Feb'05

    XP SP2 fix not your typical security update

    Microsoft has released a patch for Windows XP SP2 that may surprise some users, given that it breaks with the Patch Tuesday cycle and was unaccompanied by a security bulletin.

  • February 08, 2005 08 Feb'05

    Microsoft issues critical fixes

    The software giant issues critical patches to plug security holes in Internet Explorer, Media Player, MSN Messenger and Microsoft Office.

  • February 04, 2005 04 Feb'05

    Gates signals a switch in Microsoft's philosophy

    Despite taking a swipe at open source, Microsoft's co-founder is no longer pressing customers to go Microsoft-only, according to an analyst who dissected a public e-mail message from Bill Gates on software interoperability.

  • January 13, 2005 13 Jan'05

    10 tips in 10 minutes: Password policy considerations

    The following 10 quick tips offer expert advice on password policy considerations, from educating users on the importance of a password policy to enforcing minimum length passwords.

  • December 29, 2004 29 Dec'04

    On the record: The year in security quotes

    A look at some of the newsworthy moments, as told from those in the trenches and headlines.

  • December 22, 2004 22 Dec'04

    Quiz: Who done IT? A murder mystery

    It's a mess. Victims everywhere you look. People slumped at their computers, networks unraveling, browsers hijacked, disappearing e-mail. Your job: Analyze the scene, solve the crime.

  • December 22, 2004 22 Dec'04

    Know-IT-All Contest: Show us the number!

    Read clues and guess which terms our editors are looking for in this 2004 Know-IT-All contest.

  • December 21, 2004 21 Dec'04

    Definition of Microsoft patches

    Find out what types of new code introductions are included in Microsoft patch management in this book excerpt from Chapter 1 of "The complete patch management book."

  • December 21, 2004 21 Dec'04

    What is patch management?

    This is excerpt from Chapter 1 of "The complete patch management book" helps answer the question, "What is patch management?"

  • December 21, 2004 21 Dec'04

    What is included in a Microsoft patch?

    Get a technical overview of what's included in each type of Microsoft patch, from security patches to updates to drivers in this book excerpt.

  • December 21, 2004 21 Dec'04

    Why do we patch?

    Get a quick overview about why you need to patch in this excerpt from Chapter 1 of "The complete patch management book."

  • December 16, 2004 16 Dec'04

    Microsoft makes Giant antispyware purchase

    Redmond has acquired Giant Company Software Inc., the maker of a desktop tool to catch and remove insidious programs.

  • November 23, 2004 23 Nov'04

    Infected ad banners exploit IE's IFRAME flaw

    Experts recommend IE users switch to another browser or disable Active Scripting to guard against infected ad banners exploiting the IFRAME vulnerability.

  • November 03, 2004 03 Nov'04

    Ask Microsoft: Virus scanners and the 'no update' option

    IT administrators ask Microsoft security executive Gytis Barzdukas about buffer overflow vulnerabilities, automatic updates and the software maker's antivirus efforts.

  • October 23, 2004 23 Oct'04

    Eight strategies for securing Windows vulnerabilities

    This excerpt from "The administrator shortcut guide to patch management" provides eight strategies you can use to minimize the expose to dangerous security flaws.

  • October 22, 2004 22 Oct'04

    Always monitor logs

    This excerpt from "The administrator shortcut guide to patch management" describes the events in three kinds of logs that a computer running any version of NT or later will show.

  • October 22, 2004 22 Oct'04

    Close all unused ports

    This excerpt from "The administrator shortcut guide to patch management" describes how to restrict traffic by only allowing it through certain firewall ports.

  • October 22, 2004 22 Oct'04

    Never assume that a default software installation is secure

    This excerpt from "The administrator shortcut guide to patch management" provides a list of services you should never disable if you want to maintain strong security.

  • September 08, 2004 08 Sep'04

    Vulnerabilities found in WinZip

    An attacker could use vulnerabilities in the compression utility for Windows to execute arbitrary code or gain access to systems.

  • August 26, 2004 26 Aug'04

    Get your network hacked in 10 easy steps

    Microsoft security expert Jesper Johansson offers 10 common mistakes administrators make that can allow a hacker to freely roam a network.

  • August 11, 2004 11 Aug'04

    Keep secrets

    This excerpt from Chapter 1 of Roberta Bragg's "Hardening Windows systems" explains why you need to keep your mouth shut.

  • June 25, 2004 25 Jun'04

    One company's spyware is another's monitoring tool

    Enterprises often take steps to protect against spyware, in much the same way they do against viruses and worms. But some companies also use spyware to monitor employees suspected of illicit behavior.

  • February 23, 2004 23 Feb'04 Know-IT-all Chapter Quiz: Windows Server 2003 Pocket Administrator

    What do you know about administering identity servers? Check your skills in this quiz and get a chance to win a copy of Windows Server 2003 Pocket Administrator, courtesy of McGraw-Hill/Osborne Media.

  • March 24, 2003 24 Mar'03

    Step-by-step guide: Installing Software Update Services on the client

    There are only two changes you need to make in order to install SUS on your users' client machines. But don't try this at home if your PCs are not running XP or Windows 2000 Professional. Here are some installation pointers from Douglas R. Spindler,...