Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Prevent copying files from shared folders to remote computers
It's a tricky issue -- how to stop users from copying files from shared folders. Learn how to manage a user's file and folder copying rights with this advice from Windows security expert Kevin Beaver. Continue Reading
Secret Windows command line tools can boost security
Believe it or not, you've already paid for -- but may not know about -- a bunch of command line tools that will broaden the security of your hard drives, remote hosts, connections, directories and more. Check out this list of easy-to-use commands ... Continue Reading
Metasploit 3.0 security testing tool -- free, easy and improved
An easy and free security testing tool for Windows users, Metasploit 3.0 is Kevin Beaver's recommendation for you. Read why in this security expert's tip. Continue Reading
-
Use RunAs to run Explorer window with elevated privileges in IE7
In IE6, admins who use the secondary logon (RunAs) when logged on as a user with limited rights were able to run an Explorer window with elevated privileges. But this feature no longer exists in Internet Explorer 7. Here's a workaround. Continue Reading
Restricting user permissions in folders
If you have a question about managing the permissions of a folder in your domain, this advice from Jonathan Hassell tells you how to set those permissions and prevent users from deleting that folder. Continue Reading
Reduce your Web server's attack surface
Prevent security vulnerabilities in your system by reducing your Web server's attack surface . Learn the five steps that can help you protect yourself further.Continue Reading
Cracking a hard drive password
Windows hardening expert Jonathan Hassell explains what to do if you can't boot up a system equipped with Windows software and how to crack Windows passwords for hard drives.Continue Reading
What to do if system hangs when building DMI pool
When powered on, a PC creates the DMI pool, which shows the devices available to the BIOS. If a PC hangs at this point, here are some possible culprits.Continue Reading
Sharing Excel files safely
Sharing files is a very common practice, but you may be doing it in a non-secure way. This tip will explain how to safely share an Excel 2007 workbook and how to keep it safe, too.Continue Reading
Tips on hardening and securing IE7
Jonathan Hassell gives his recommendations on how you can make IE7's new features secure and hardened for your everyday needs.Continue Reading
-
Making a Windows folder read-only
Windows hardening expert Jonathan Hassell explains how to make a Windows folder that multiple users share read-only.Continue Reading
Prevent users from deleting files in shared folders
Jonathan Hassell explains one of the functions of using Advanced Permissions.Continue Reading
Virus causing sound and video problems?
Are your sound and video problems a result of a virus? Even though anything is possible with malicious code, says site expert Kevin Beaver, that might not be the problem you're experiencing.Continue Reading
Essential elements of a good security assessment report
Security guru Kevin Beaver outlines the six steps you can take to put together a solid assessment report.Continue Reading
Questions about using BitLocker Drive Encryption
Questions about using BitLocker Drive Encryption with Windows Vista? Serdar Yegulalp discusses some myths and other concerns surrounding it.Continue Reading
Harden your file servers with Windows wizard tool
Jonathan Hassell explains how to secure your file servers that are running Windows Server 2003 using the Security Configuration Wizard; both in an automated fashion and through manual tweaks to the configuration.Continue Reading
Patch Tuesday: An after-the-fact checklist
Serdar Yegulalp explains the steps you should take post-Patch Tuesday to make sure that your system continues to run smoothly after a patch is applied.Continue Reading
Remove bots from your system -- a four-step process
Kevin Beaver outlines four steps you can take to balttle the bot, malware's most notorious villain.Continue Reading
Backing up and restoring NTFS permissions on a specified volume
Serdar Yegulalp explains how you can harden your security by using the script NTFSBKP to back up and restore NTFS permissions -- either on one folder or to an entire drive.Continue Reading
Device drivers: Installation and configuration
To install hardware devices on Windows servers, admins must install the appropriate device drivers first. Here are some guidelines for installing, configuring and troubleshooting device drivers.Continue Reading
Setting permissions for a shared Excel file
Do you get the "read only file" error message when trying to save changes in a shared Excel file?Continue Reading
An introduction to Google Hack Honeypots
A Google hack is a way hackers can use Google's query tools to find information exposed by insecure Web applications. According to Microsoft MVP Brien Posey, you can use a Google Hack Honeypot to acquire information on would-be hackers employing ...Continue Reading
Clear the hard drive BIOS password
Kevin Beaver explains how to clear the hard drive password in the BIOS.Continue Reading
Patch management tools: Different types, different approaches
Patch management tools seem pretty simple, but there are a couple different types with unique functionalities. Contributor Serdar Yegulalp takes a look at different types of tools and offers advice to companies trying to settle on a single product.Continue Reading
Check your Windows XP system info
Checking the system info on your computer will produce a lot of useful info, including the system uptime.Continue Reading
Step 2: RunAs command line
Administrators need admin privileges, but not all the time. Learn how to work securely by only elevating your privileges as necessary.Continue Reading
The difference between antivirus and antispyware/malware software
Windows security threat expert Kevin Beaver provides a thorough description of the differences between antivirus and antispyware/malware software.Continue Reading
Understanding Windows XP file systems FAT32 and NTFS
When installing Windows XP from scratch, you are prompted to select from two different file systems: FAT32 and NTFS. Find out how to make this choice.Continue Reading
Preventing domain admins from logging onto domain controllers
Windows network security expert Wes Noonan explains how to control who can log onto domain controllers.Continue Reading
Rolling back patches
Patches and hotfixes can break as much as they fix. Contributor Serdar Yegulalp looks at some of your options when the need to roll back patches arises. He details the procedures for a roll back by hand and System Restore and provides the pros and ...Continue Reading
Running System Restore from the Recovery Console (well, sort of)
Recovery Console has no built-in way to run System Restore. If the Registry is corrupted, it is possible to do a manual restore, to revert the system to a previous Registry version. But the method is far from perfect.Continue Reading
Tricks for optimizing WSUS performance
Dealing with the monthly rollout of patches can grind an organization to a halt. Contributor Brien Posey shares some tricks for optimizing performance by carefully adjusting WSUS settings.Continue Reading
Cleaning up items in Startup menu can help PC run faster
Cleaning up items listed in your Startup menu can help your PC run faster.Continue Reading
Office 2003 Setup copies installation files
Microsoft Office 2003's ability to copy the installation files to a hidden folder on the hard drive can be a huge help to anyone who supports an Office deployment. Now an alternative version of Setup adds two features that make it even more useful.Continue Reading
How to automate Web server log archiving
Archiving Web server logs can be tedious. Here are several tools and tactics admins can use to automate Web server log archiving.Continue Reading
SUS, WSUS, SMS and beyond
Microsoft is discontinuing support for Software Update Services next year, and you have to come up with an alternative plan. This article compares patch management options like WSUS, SMS and other third-party contenders.Continue Reading
WinDump: The tcpdump tool for Windows
WinDump, the Windows version of tcpdump, can help you analyze network traffic to look for signs of active malware. Contributor Serdar Yegulalp explains how to use WinDump and some of its applications.Continue Reading
How to automate desktop folder synchronization
Keeping folders in sync is the job every administrator hates. No matter whether it's synchronizing files between a network file share and a desktop computer or a USB thumb drive and a laptop, the job is a major hassle. Rather than do it manually (...Continue Reading
How to automate cleanup of Windows temporary directories
Temporary directories in Windows are also one of the main reasons for undiagnosed program failures. That's why it's best to keep Windows' temporary directories clean. However, few Windows admins want to make a manual cleanup part of their regular ...Continue Reading
Does your computer reboot when using PowerPoint?
Your computer keeps rebooting -- but only when you run Microsoft Office applications. In this response, site expert Kevin Beaver helps troubleshoot your rebooting computer woes.Continue Reading
How to automate Windows software updates
When it comes to automating Windows software updates, administrators have a choice of several third-party tools.Continue Reading
Setting 'log-on-to machines' in Active Directory
Many enterprise environments need to limit systems access by setting account options. In this response, site expert Jonathan Hassell explains more about the "set log-on-to machines" feature.Continue Reading
Patching non-Microsoft products
We all know we need to keep Windows and Microsoft applications patched, but don't forget to patch those non-MS products. Microsoft MVP Brien Posey provides some ways to get those third-party patches deployed.Continue Reading
Checklist: Measuring patch management metrics
How effective is your patch management program? In this checklist, patch management expert Jason Chan recommends the most important patch management metrics to track.Continue Reading
Metasploit: A penetration testing tool you shouldn't be without
Penetration testing is an invaluable way to make sure your systems are secure as well as prove to management that they aren't and you need to increase your security budget. In this article Kevin Beaver examines a useful penetration testing tool ...Continue Reading
How attackers install backdoors and what to do about it
How did that backdoor get there? If you've ever had this thought, there are a couple things you should know, according to Tony Bradley. In this article, he looks at how backdoors are installed, how to keep them from being installed and how to track ...Continue Reading
Fast User Switching and privilege elevation in XP
Fast User Switching in Windows XP can provide occasional elevated privileges, but it is not a cure-all, according to Serdar Yegulalp. His tip explains how to use Fast User Switching as well as some of its limitations.Continue Reading
Default passwords for Windows 2000 and Windows XP
With or without administrator access, resetting a particular account's password could be difficult. Site expert Kevin Beaver suggests Proactive Password Auditor or NTAccess to solve this authentication problem.Continue Reading
Step-by-Step Guide: How to deploy a successful patch
This step-by-step guide explains how to deploy a patch, and provides the tools you will need to mitigate the risk of a compromised computer.Continue Reading
How can I restore my search engine to its default?
I keep getting unwanted search engines appearing as a default when looking for a site. How can I set my default search engine and keep it set that way?Continue Reading
How to Bypass BIOS Passwords
BIOS passwords can be a liability if a user forgets his password. Here are a few tips and tricks that can help to bypass or reset the BIOS password on most systems.Continue Reading
Restricting Windows XP password expiration
This tip explains how you can prevent your Windows XP password from expiring.Continue Reading
Creating a testing environment for hotfixes and patches
Testing patches and hotfixes in a live environment ensures a more successful deployment process. Site expert Jason Chan describes how to set up a testing environment.Continue Reading
"Failed to Open the Group Policy Object" error
"Failed to Open the Group Policy Object" error could indicate an Active Directory communications issue. Site expert Kevin Beaver gives advice on how to solve this AD problem.Continue Reading
Patching Windows compared to Linux
When it comes to Windows versus Linux, patching vulnerabilities is an often overlooked arena of comparison. In many ways, though, ease of patching can determine overall security, says security guru Jonathan Hassell. In this article, Hassell compares...Continue Reading
Setting NTFS rights to deny Delete permission
Site expert Wes Noonan explains how to set NTFS rights on a Windows 2000 Advanced Server so that users are not able to delete files or folders, but they are able to save and make changes.Continue Reading
Establishing a network printer connection without authentication
Authenticating users prior to granting them access to resources is is a cornerstone concept in Microsoft resource access says site expert Wes Noonan. Though not recommended, he does reveal a way to print without using Windows Active Directory.Continue Reading
Scripting resources to automate patching
Although lacking the bells and whistles of commercial patching tools, scripts can offer a quick and simple way to automate Windows patch deployment. Contributor Tony Bradley identifies several handy patching scripts and resources in this tip.Continue Reading
Infected with malware? Stop it from spreading
A worm, virus or other malicious software is spreading throughout your network. How can you stop the "bleeding" before too much damage is done? Windows security threats expert Kevin Beaver offers his tips for containing malware.Continue Reading
How to prevent malware outbreaks in eight steps
It's impossible to prevent malware outbreaks that you've never seen, but having the right security measures in place could you'll be your organization's saving grace.Continue Reading
Windows patches: When to push or pull them
To deploy Windows patches, you can push patches from a central server to Windows machines or have clients contact the central server directly to pull the patches down.Continue Reading
Configure Group Policy to prevent attacks
This list of critical Group Policy settings will help you lock down Windows against security threats, whether you want to thwart automated password cracking attacks, enable audit logging or simply force attackers to jump through more hoops.Continue Reading
Practice effective security log analysis
Collecting security log data is useless if your log isn't properly configured, monitored and analyzed. Get tips for effective data logging in part one of this two-part series.Continue Reading
Manual vs. automated patch tracking
With new patches coming at you seemingly a mile a minute, you may wonder what the best way is to manage them. Get help comparing manual vs. automatic patch tracking.Continue Reading
Blocking software installation at an Internet cafe
Security Configuration Wizard quick setup checklist
The Security Configuration Wizard (SCW) is considered a significant new security enhancement in a Windows service pack. Learn how to setup SCW with this checklist.Continue Reading
Disable Windows XP Remote Desktop
Is Windows XP Remote Desktop causing havoc on your machine? Find out how you can disable or enable this feature with a simple registry tweak.Continue Reading
Block Internet Explorer Web surfing via Group Policy
Learn how to block a user's ability to surf the Web using Microsoft Group Policy.Continue Reading
Granting access to resources in a multiple domain environment
How to Google hack Windows servers
You should Google your public-facing Windows servers before a bad guy thinks to Google them first. Kevin Beaver offers Google tools and queries to help you find vulnerabilities.Continue Reading
Empty the prefetch folder
Empty the Prefetch folderContinue Reading
Prevention Guide: Detecting and removing rootkits in Windows
Rootkits are stealthy tools used by hackers to remotely control your Windows system, and chances are you won't detect the attack. Don't be a rootkit victim. Get help in this guide.Continue Reading
Guard against internal hackers
Up to 80% of data compromises occur inside the network, yet few resources are spent on internal protection. Get three basic tips to help you prevent internal hacking.Continue Reading
Choosing an intrusion detection system: Network, host or application-based IDS
Different types of intrusion detection tools do different jobs. This tip offers help comparing three different types of IDS devices: network, host and application-based IDS.Continue Reading
How to turn System Restore on or off
System Restore is a handy feature offered in Windows XP by default. Find out how you can turn it on or off at your will.Continue Reading
Windows Server 2003 management tools: Remote Desktop for Administration
Remote Desktop for Administration is one of the new server features in Microsoft's management initiative for Windows Server 2003. Find out what benefits it offers.Continue Reading
Seven steps to troubleshoot server access problems
Boost performance: change Group Policy refresh interval
You can improve Group Policy refresh performance by using these registry entries.Continue Reading
IDS options: Signature databases and heuristics
This tip details the differences between two defining IDS product features -- signature databases and heuristics -- and offers advice for choosing IDS solutions.Continue Reading
When to use Remote Desktop over VPN
When providing remote users protected access on a server, determine if they need it for connectivity or management purposes -- then you will know when to use Remote Desktop or VPN.Continue Reading
KillPol helps debug policy problems
It's not always easy to figure out the cause of a policy problem. KillPol, a utility, makes the debugging process less tedious and a whole lot less painful.Continue Reading
Can a power user install software and allow Windows Updates?
Why is our mapped drive reverting to previous mapping?
Use VBScript to monitor drive space
Use this script to monitor free space on systems or shares.Continue Reading
How to manually enable SMB signing
Choosing your spyware weapons: Ad-Aware vs. Spybot
Get help comparing the two most effective spyware tools, learn why they play well together and get one expert's two cents on how to ultimately solve the spyware dilemma here.Continue Reading
Checklist: How to configure the audit policy
A properly-configured audit policy can lead you to a goldmine of information in Windows event logs. Get help configuring the audit policy in this checklist.Continue Reading
Specifying users with Remote Desktop permissions through Group Policy
Windows Firewall: Love it or hate it
In this article, Kevin Beaver reviews the pros and cons of the new Windows Firewall, and weighs just how valuable it is compared to third-party firewalls.Continue Reading
Setting auditing policies in the registry
Finding the CLSID for ActiveX controls in IE
Null session attacks: Who's still vulnerable?
Null session vulnerabilities have fallen off the radar for many Windows shops, but at what price? Kevin Beaver explains which Windows machines are still at risk.Continue Reading
Bypassing the logon password on Windows 2000 Pro
Roberta Bragg explains that, while you cannot bypass the login password in Windows 2000 Pro, there are tools that help assist you crack passwords and/or replace them.Continue Reading
Guarding against malware infection from remote users
Learn how securing your telecommuters can fortify your network against malicious code attacks.Continue Reading
Using "netstat" to display open ports on a Windows XP computer
Ways a virus can enter a system
How can I prevent users from uploading files using IE?
Manually resetting AUTOCHK.EXE for a drive
How to delete a persistent dirty bit.Continue Reading
Retrieving and modifying the product key for Windows XP
A procedure for retrieving and modifying the product key for Windows XP.Continue Reading
Remove shortcut arrow from desktop icons in Win XP
Remove shortcut arrow from desktop iconsContinue Reading