Tips
Tips
-
How to create a Windows Vista boot CD with WinPE
Using WinPE, admins can launch Vista from a disk and use the deployment to create and restore images. Continue Reading
-
Windows 2000 batch file command reference
Check out this reference guide to batch file commands for Windows 2000, based on Microsoft documentation, but rewritten to increase usefulness and readability. Continue Reading
-
Password cracking, network rights and Windows Firewall expert advice
Our experts share advice on cracking Windows passwords, managing folders and permissions in Windows and how to manage Windows Firewall in the top expert advice from 2007. Continue Reading
-
Device driver rollback and System Restore: Two more options for rolling back changes in Windows XP
Windows administrators have several options when attempting to restore XP to a functional state. In part 2 of this series, Microsoft MVP Brien Posey explains how to use a couple more techniques and gives details on when to use them. Continue Reading
-
Disabling annoying Windows XP startup programs
Some applications and services can cause problems when booting Windows XP. Fortunately, there are several tips and tricks that admins can use to solve these bothersome startup issues. Continue Reading
-
Use the Last Known Good Configuration option to roll back changes in Windows XP
So you've made an incorrect configuration change and now Windows won't boot properly. What do you do? The Last Known Good Configuration option can be a valuable tool for rolling back catastrophic configuration changes. Continue Reading
-
The last resort for troubleshooting hardware resource conflicts
Brien Posey explains how to use the Windows Device Manager to manually reallocate system resources. Be careful, though, or you may be forced to reinstall Windows from scratch. Continue Reading
-
Using sudowin to grant administrator privileges in Windows
With sudowin, it's easy to achieve privilege escalation in Windows, which allows you to run programs with administrator privileges in one user account. Find out how in this tip. Continue Reading
-
Troubleshooting Windows XP Device Manager error codes continued
Brien Posey expands on the error codes he described in his first article on Windows XP Device Manager. Here are more error code explanations, starting with error code 10, which relates to the device driver. Continue Reading
-
Troubleshooting Windows XP Device Manager error codes
Windows XP Device Manager alerts you if a system's hardware malfunctions, but often you need an advanced degree in unraveling cryptic code in order to understand the problem. Device Manager's error codes may be puzzling, but once you crack them, ... Continue Reading
-
Conquer forgotten Windows passwords with Password Reset Wizard
Password Reset Wizard is a tool used to help mobile employees reset their own passwords, and it can be a big help to forgetful road warriors. But there are a couple of caveats. Continue Reading
-
Use Driver Query to resolve device driver problems
The Driver Query utility may not be perfect, but it can help to compile a device driver usage history. Continue Reading
-
Find Windows vulnerabilities with a hex editor
If you haven't heard of a hex editor, then pay attention, because it could be the security testing tool that you've been waiting for all your life. Read how this underrated tool can help you find weaknesses and vulnerabilities in your Windows ... Continue Reading
-
The Jack PC is one very thin client
Form factors of computers continue to shrink. The Jack PC packs an entire Windows CE .NET 4.2 thin client into a form factor that can fit into a space the size of an Ethernet wall jack. Continue Reading
-
Troubleshooting generic error messages related to EFS
When Encrypting File System (EFS) has trouble decrypting a file, Windows usually displays a generic error message that is fairly meaningless. This article discusses what some of the more common error messages mean so you'll know where to begin the ... Continue Reading
-
Windows pagefile security risks and how to avoid them
Learn about the security risks involved in using Windows pagefile, and avoid putting your sensitive data in harm's way. Continue Reading
-
Interpreting the five disk-related Blue Screen of Death errors
A dreaded Blue Screen of Death error message can provide insight into the root cause of the failure. Here you'll learn what the five most common disk-related BSOD Stop messages mean. Continue Reading
-
A guide to power converters for laptop use overseas
If one of your users is heading overseas with his laptop, you'll need to do your homework on power converters. Continue Reading
-
Windows offers quick fix for apps that are invisible or offscreen
Many Windows applications retain some memory of their window size and placement onscreen. This sometimes creates a problem where the window size is spuriously set to zero, or the window is placed entirely offscreen. A fix exists in Windows that will... Continue Reading
-
Fast Reboot: quick reboot utility for Windows
Windows' shut down/reboot process is not that snappy; it can take a couple of minutes for everything to terminate and be written to disk. You can initiate a reboot quickly with a tool like Fast Reboot, which performs the usual quick-reboot/shutdown ... Continue Reading
-
BareGrep: Barebones search utility for Windows
The Unix grep command-line tool is a way to search iteratively through files and folders for a particular string to match against a filename or the contents of a file. Many ports of grep have been written for Windows. Now there's a simple search ... Continue Reading
-
Secret Windows command line tools can boost security
Believe it or not, you've already paid for -- but may not know about -- a bunch of command line tools that will broaden the security of your hard drives, remote hosts, connections, directories and more. Check out this list of easy-to-use commands ... Continue Reading
-
Metasploit 3.0 security testing tool -- free, easy and improved
An easy and free security testing tool for Windows users, Metasploit 3.0 is Kevin Beaver's recommendation for you. Read why in this security expert's tip. Continue Reading
-
Use RunAs to run Explorer window with elevated privileges in IE7
In IE6, admins who use the secondary logon (RunAs) when logged on as a user with limited rights were able to run an Explorer window with elevated privileges. But this feature no longer exists in Internet Explorer 7. Here's a workaround. Continue Reading
-
Reduce your Web server's attack surface
Prevent security vulnerabilities in your system by reducing your Web server's attack surface . Learn the five steps that can help you protect yourself further. Continue Reading
-
What to do if system hangs when building DMI pool
When powered on, a PC creates the DMI pool, which shows the devices available to the BIOS. If a PC hangs at this point, here are some possible culprits. Continue Reading
-
Sharing Excel files safely
Sharing files is a very common practice, but you may be doing it in a non-secure way. This tip will explain how to safely share an Excel 2007 workbook and how to keep it safe, too. Continue Reading
-
Tips on hardening and securing IE7
Jonathan Hassell gives his recommendations on how you can make IE7's new features secure and hardened for your everyday needs. Continue Reading
-
Essential elements of a good security assessment report
Security guru Kevin Beaver outlines the six steps you can take to put together a solid assessment report. Continue Reading
-
Questions about using BitLocker Drive Encryption
Questions about using BitLocker Drive Encryption with Windows Vista? Serdar Yegulalp discusses some myths and other concerns surrounding it. Continue Reading
-
Harden your file servers with Windows wizard tool
Jonathan Hassell explains how to secure your file servers that are running Windows Server 2003 using the Security Configuration Wizard; both in an automated fashion and through manual tweaks to the configuration. Continue Reading
-
Patch Tuesday: An after-the-fact checklist
Serdar Yegulalp explains the steps you should take post-Patch Tuesday to make sure that your system continues to run smoothly after a patch is applied. Continue Reading
-
Remove bots from your system -- a four-step process
Kevin Beaver outlines four steps you can take to balttle the bot, malware's most notorious villain. Continue Reading
-
Backing up and restoring NTFS permissions on a specified volume
Serdar Yegulalp explains how you can harden your security by using the script NTFSBKP to back up and restore NTFS permissions -- either on one folder or to an entire drive. Continue Reading
-
Device drivers: Installation and configuration
To install hardware devices on Windows servers, admins must install the appropriate device drivers first. Here are some guidelines for installing, configuring and troubleshooting device drivers. Continue Reading
-
An introduction to Google Hack Honeypots
A Google hack is a way hackers can use Google's query tools to find information exposed by insecure Web applications. According to Microsoft MVP Brien Posey, you can use a Google Hack Honeypot to acquire information on would-be hackers employing ... Continue Reading
-
Patch management tools: Different types, different approaches
Patch management tools seem pretty simple, but there are a couple different types with unique functionalities. Contributor Serdar Yegulalp takes a look at different types of tools and offers advice to companies trying to settle on a single product. Continue Reading
-
Check your Windows XP system info
Checking the system info on your computer will produce a lot of useful info, including the system uptime. Continue Reading
-
Step 2: RunAs command line
Administrators need admin privileges, but not all the time. Learn how to work securely by only elevating your privileges as necessary. Continue Reading
-
Understanding Windows XP file systems FAT32 and NTFS
When installing Windows XP from scratch, you are prompted to select from two different file systems: FAT32 and NTFS. Find out how to make this choice. Continue Reading
-
Rolling back patches
Patches and hotfixes can break as much as they fix. Contributor Serdar Yegulalp looks at some of your options when the need to roll back patches arises. He details the procedures for a roll back by hand and System Restore and provides the pros and ... Continue Reading
-
Running System Restore from the Recovery Console (well, sort of)
Recovery Console has no built-in way to run System Restore. If the Registry is corrupted, it is possible to do a manual restore, to revert the system to a previous Registry version. But the method is far from perfect. Continue Reading
-
Tricks for optimizing WSUS performance
Dealing with the monthly rollout of patches can grind an organization to a halt. Contributor Brien Posey shares some tricks for optimizing performance by carefully adjusting WSUS settings. Continue Reading
-
Cleaning up items in Startup menu can help PC run faster
Cleaning up items listed in your Startup menu can help your PC run faster. Continue Reading
-
Office 2003 Setup copies installation files
Microsoft Office 2003's ability to copy the installation files to a hidden folder on the hard drive can be a huge help to anyone who supports an Office deployment. Now an alternative version of Setup adds two features that make it even more useful. Continue Reading
-
How to automate Web server log archiving
Archiving Web server logs can be tedious. Here are several tools and tactics admins can use to automate Web server log archiving. Continue Reading
-
SUS, WSUS, SMS and beyond
Microsoft is discontinuing support for Software Update Services next year, and you have to come up with an alternative plan. This article compares patch management options like WSUS, SMS and other third-party contenders. Continue Reading
-
WinDump: The tcpdump tool for Windows
WinDump, the Windows version of tcpdump, can help you analyze network traffic to look for signs of active malware. Contributor Serdar Yegulalp explains how to use WinDump and some of its applications. Continue Reading
-
How to automate desktop folder synchronization
Keeping folders in sync is the job every administrator hates. No matter whether it's synchronizing files between a network file share and a desktop computer or a USB thumb drive and a laptop, the job is a major hassle. Rather than do it manually (... Continue Reading
-
How to automate cleanup of Windows temporary directories
Temporary directories in Windows are also one of the main reasons for undiagnosed program failures. That's why it's best to keep Windows' temporary directories clean. However, few Windows admins want to make a manual cleanup part of their regular ... Continue Reading
-
How to automate Windows software updates
When it comes to automating Windows software updates, administrators have a choice of several third-party tools. Continue Reading
-
Patching non-Microsoft products
We all know we need to keep Windows and Microsoft applications patched, but don't forget to patch those non-MS products. Microsoft MVP Brien Posey provides some ways to get those third-party patches deployed. Continue Reading
-
Checklist: Measuring patch management metrics
How effective is your patch management program? In this checklist, patch management expert Jason Chan recommends the most important patch management metrics to track. Continue Reading
-
Metasploit: A penetration testing tool you shouldn't be without
Penetration testing is an invaluable way to make sure your systems are secure as well as prove to management that they aren't and you need to increase your security budget. In this article Kevin Beaver examines a useful penetration testing tool ... Continue Reading
-
How attackers install backdoors and what to do about it
How did that backdoor get there? If you've ever had this thought, there are a couple things you should know, according to Tony Bradley. In this article, he looks at how backdoors are installed, how to keep them from being installed and how to track ... Continue Reading
-
Fast User Switching and privilege elevation in XP
Fast User Switching in Windows XP can provide occasional elevated privileges, but it is not a cure-all, according to Serdar Yegulalp. His tip explains how to use Fast User Switching as well as some of its limitations. Continue Reading
-
Step-by-Step Guide: How to deploy a successful patch
This step-by-step guide explains how to deploy a patch, and provides the tools you will need to mitigate the risk of a compromised computer. Continue Reading
-
How to Bypass BIOS Passwords
BIOS passwords can be a liability if a user forgets his password. Here are a few tips and tricks that can help to bypass or reset the BIOS password on most systems. Continue Reading
-
Restricting Windows XP password expiration
This tip explains how you can prevent your Windows XP password from expiring. Continue Reading
-
Patching Windows compared to Linux
When it comes to Windows versus Linux, patching vulnerabilities is an often overlooked arena of comparison. In many ways, though, ease of patching can determine overall security, says security guru Jonathan Hassell. In this article, Hassell compares... Continue Reading
-
Scripting resources to automate patching
Although lacking the bells and whistles of commercial patching tools, scripts can offer a quick and simple way to automate Windows patch deployment. Contributor Tony Bradley identifies several handy patching scripts and resources in this tip. Continue Reading
-
Infected with malware? Stop it from spreading
A worm, virus or other malicious software is spreading throughout your network. How can you stop the "bleeding" before too much damage is done? Windows security threats expert Kevin Beaver offers his tips for containing malware. Continue Reading
-
How to prevent malware outbreaks in eight steps
It's impossible to prevent malware outbreaks that you've never seen, but having the right security measures in place could you'll be your organization's saving grace. Continue Reading
-
Windows patches: When to push or pull them
To deploy Windows patches, you can push patches from a central server to Windows machines or have clients contact the central server directly to pull the patches down. Continue Reading
-
Configure Group Policy to prevent attacks
This list of critical Group Policy settings will help you lock down Windows against security threats, whether you want to thwart automated password cracking attacks, enable audit logging or simply force attackers to jump through more hoops. Continue Reading
-
Practice effective security log analysis
Collecting security log data is useless if your log isn't properly configured, monitored and analyzed. Get tips for effective data logging in part one of this two-part series. Continue Reading
-
Manual vs. automated patch tracking
With new patches coming at you seemingly a mile a minute, you may wonder what the best way is to manage them. Get help comparing manual vs. automatic patch tracking. Continue Reading
-
Security Configuration Wizard quick setup checklist
The Security Configuration Wizard (SCW) is considered a significant new security enhancement in a Windows service pack. Learn how to setup SCW with this checklist. Continue Reading
-
Disable Windows XP Remote Desktop
Is Windows XP Remote Desktop causing havoc on your machine? Find out how you can disable or enable this feature with a simple registry tweak. Continue Reading
-
Block Internet Explorer Web surfing via Group Policy
Learn how to block a user's ability to surf the Web using Microsoft Group Policy. Continue Reading
-
How to Google hack Windows servers
You should Google your public-facing Windows servers before a bad guy thinks to Google them first. Kevin Beaver offers Google tools and queries to help you find vulnerabilities. Continue Reading
-
Empty the prefetch folder
Empty the Prefetch folder Continue Reading
-
Prevention Guide: Detecting and removing rootkits in Windows
Rootkits are stealthy tools used by hackers to remotely control your Windows system, and chances are you won't detect the attack. Don't be a rootkit victim. Get help in this guide. Continue Reading
-
Guard against internal hackers
Up to 80% of data compromises occur inside the network, yet few resources are spent on internal protection. Get three basic tips to help you prevent internal hacking. Continue Reading
-
Choosing an intrusion detection system: Network, host or application-based IDS
Different types of intrusion detection tools do different jobs. This tip offers help comparing three different types of IDS devices: network, host and application-based IDS. Continue Reading
-
How to turn System Restore on or off
System Restore is a handy feature offered in Windows XP by default. Find out how you can turn it on or off at your will. Continue Reading
-
Windows Server 2003 management tools: Remote Desktop for Administration
Remote Desktop for Administration is one of the new server features in Microsoft's management initiative for Windows Server 2003. Find out what benefits it offers. Continue Reading
-
Boost performance: change Group Policy refresh interval
You can improve Group Policy refresh performance by using these registry entries. Continue Reading
-
IDS options: Signature databases and heuristics
This tip details the differences between two defining IDS product features -- signature databases and heuristics -- and offers advice for choosing IDS solutions. Continue Reading
-
When to use Remote Desktop over VPN
When providing remote users protected access on a server, determine if they need it for connectivity or management purposes -- then you will know when to use Remote Desktop or VPN. Continue Reading
-
KillPol helps debug policy problems
It's not always easy to figure out the cause of a policy problem. KillPol, a utility, makes the debugging process less tedious and a whole lot less painful. Continue Reading
-
Use VBScript to monitor drive space
Use this script to monitor free space on systems or shares. Continue Reading
-
Choosing your spyware weapons: Ad-Aware vs. Spybot
Get help comparing the two most effective spyware tools, learn why they play well together and get one expert's two cents on how to ultimately solve the spyware dilemma here. Continue Reading
-
Checklist: How to configure the audit policy
A properly-configured audit policy can lead you to a goldmine of information in Windows event logs. Get help configuring the audit policy in this checklist. Continue Reading
-
Windows Firewall: Love it or hate it
In this article, Kevin Beaver reviews the pros and cons of the new Windows Firewall, and weighs just how valuable it is compared to third-party firewalls. Continue Reading
-
Null session attacks: Who's still vulnerable?
Null session vulnerabilities have fallen off the radar for many Windows shops, but at what price? Kevin Beaver explains which Windows machines are still at risk. Continue Reading
-
Guarding against malware infection from remote users
Learn how securing your telecommuters can fortify your network against malicious code attacks. Continue Reading
-
Manually resetting AUTOCHK.EXE for a drive
How to delete a persistent dirty bit. Continue Reading
-
Retrieving and modifying the product key for Windows XP
A procedure for retrieving and modifying the product key for Windows XP. Continue Reading
-
Remove shortcut arrow from desktop icons in Win XP
Remove shortcut arrow from desktop icons Continue Reading
-
Using Windows XP/Windows 2003 Server's SYSTEMINFO utility
XP and Win2003's SYSTEMINFO utility allows an admin to query a local or remote system for detailed system configuration information. Continue Reading
-
DOS printing from Windows XP
Allow DOS apps printing access on networked printers that do not use LPT1, such as IP printers. Continue Reading
-
Create ODBCs from a command line
Create ODBCs from a command line Continue Reading
-
Create custom shortcuts on Start button's right-click menu
Step-by-step instructions on how to create shortcuts on your Start button's right-click menu. Continue Reading
-
Windows XP's built-in administration tools
Take a look at the various administration tools built into Microsoft's latest desktop OS. Continue Reading
-
Speed up GPO processing during logon
How logons get bogged down by the synchronus policy application. And how you can change that. Continue Reading
-
Cut and paste to/from a DOS window
Using cut-and-paste in the command prompt is easy. Here's how you do it for Win2k Pro and Win2k server. Continue Reading
-
Put a command line shortcut in your mouse's right click menu
Create a command line shortcut in your mouse's right-click menu that will open the command line window in a specific folder that you select. Continue Reading
-
Default and predefined security templates
What's in the Windows-supplied templates. Continue Reading
-
How to enable or disable the command prompt extension
Step-by-step instructions for enabling or disabling the command prompt in Windows 2000. Continue Reading