• October 18, 2005 18 Oct'05

    Backup tape encryption grows up

    Backup tape encryption technology has come a long way and offers security you wouldn't have otherwise. Here's advice on how to do it more efficiently and a sample of hardware appliances that speed the process.  Continue Reading

  • October 18, 2005 18 Oct'05

    Local accounts and passwords

    Client computers' local accounts are one of the most overlooked security issues in any enterprise. Locking down these accounts and passwords is the first step in securing clients.  Continue Reading

  • October 18, 2005 18 Oct'05

    Local system permissions

    This excerpt from The Definitive Guide to Securing Windows in the Enterprise covers local system permissions and how you can reconfigure the default permissions to reduce the likelihood of an attacker gaining access to your network.  Continue Reading

  • October 18, 2005 18 Oct'05

    AD security: Delegating administration

    Delegation of administration in Active Directory is a necessary way to give non-administrators the ability to create and control users and groups. This article by Microsoft MVP Derek Melber details ways to securely delegate administrative rights in ...  Continue Reading

  • October 18, 2005 18 Oct'05

    Removable storage

    Controlling access to removable storage, such as USB devices, will help make your network environment more secure. This excerpt from The Definitive Guide to Securing Windows in the Enterprise offers some third party tools for locking down ...  Continue Reading

  • October 18, 2005 18 Oct'05

    Service management

    Client computers come with several pre-enabled services which may represent security risks to your network. In this excerpt from The Definitive Guide to Securing Windows in the Enterprise, you will learn which services you should disable ...  Continue Reading

  • October 18, 2005 18 Oct'05

    Retrieve a computer name from a browse list

    Retrieve computer name from the browse list  Continue Reading

-ADS BY GOOGLE

SearchServerVirtualization

SearchCloudComputing

SearchExchange

SearchSQLServer

SearchWinIT

SearchEnterpriseDesktop

SearchVirtualDesktop

Close