Tips

Tips

Enterprise desktop management

  • Step 3: Differentiating security levels

    Administrators need admin privileges, but not all the time. Learn how to work securely by only elevating your privileges as necessary.  Continue Reading

  • Step 2: RunAs command line

    Administrators need admin privileges, but not all the time. Learn how to work securely by only elevating your privileges as necessary.  Continue Reading

  • Step 1: RunAs dialog

    Administrators need admin privileges, but not all the time. Learn how to work securely by only elevating your privileges as necessary.  Continue Reading

  • Telecommuter security kit

    Telecommuters often feel isolated from their company, and security-wise that is the last thing you want. Contributor Jonathan Hassell provides a list of items -- from router configuration instructions to VPN alternatives -- to include in a ...  Continue Reading

  • Fight spear phishing

    Spear phishing, a phishing technique directed at a single company, poses a greater security risk to enterprise administrators than regular phishing. Contributor Tony Bradley recommends taking steps to educate your users and to employ anti-phishing ...  Continue Reading

  • Spear phishing: Don't be a target

    Hackers are beginning to use targeted attacks to exploit network vulnerabilities. In this tip, Al Berg introduces a specific targeted attack, spear phishing, and provides tactics information security practitioners can use to protect their ...  Continue Reading

  • Plan out your network security testing for these eight reasons

    You would think that if you are taking the time to test your Windows networks for security vulnerabilities, that any testing is a good thing. Not so, says security testing expert Kevin Beaver. In this article he discusses eight reasons why you need ...  Continue Reading

  • Windows features you can live without

    The security risk associated with some convenient Windows features often outweighs the reward. Windows hardening expert Jonathan Hassell looks at some of these features and explains how to secure them.  Continue Reading

  • Vista's security features: What to expect

    It is still a few months away, but Windows Vista will provide quite a few security features that you will be able to take advantage of right away. Contributor Brien Posey gives you an overview of some of those features and his opinion on their ...  Continue Reading

  • Rolling back patches

    Patches and hotfixes can break as much as they fix. Contributor Serdar Yegulalp looks at some of your options when the need to roll back patches arises. He details the procedures for a roll back by hand and System Restore and provides the pros and ...  Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

Close