Windows Server and Network Security

Email Alerts

Register now to receive SearchWindowsServer.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Windows Weekly Newscast: A new IE patch and more releases from Microsoft

    SearchWinIT.com's Brendan Cournoyer recaps the most important Windows stories of the past week in the latest edition of our Windows Weekly Newscast. This week, listen to the latest on Microsoft's critical patch release for Internet Explorer, the new ... 

  • Give new users help info via log-on script

    I'd like to run a "welcome" document that tells a new user how to install a printer, set up email and get help. And I'd like it to run from a log-on script and only the first time the user logs on. Can you help? I have a mix of Windows 2000 and XP ma... 

  • Prevent users from erasing URL history

    How can I prevent a user from erasing the URL history of Web sites visited? 

  • Fending off an Active Directory attack

    Whether you view the security of Active Directory as a matter of defense or of improving its configuration management, it's a system that must be protected. 

  • Fix damaged or absent external USB drives

    When a USB drive stops working often times it's because the Registry key is damaged or has gone missing. 

  • Step 1: Exploiting a missing patch

    File servers hold much of an enterprise's sensitive data and are certainly a prime target of malicious hackers. Security testing expert Kevin Beaver says you'd be surprised how easy it is to attack these servers, from inside or outside the network. K... 

  • Step 3: Stumbling across sensitive files

    File servers hold much of an enterprise's sensitive data and are certainly a prime target of malicious hackers. Security testing expert Kevin Beaver says you'd be surprised how easy it is to attack these servers, from inside or outside the network. K... 

  • Step 4: Executing related hacks that indirectly affect file servers

    File servers hold much of an enterprise's sensitive data and are certainly a prime target of malicious hackers. Security testing expert Kevin Beaver says you'd be surprised how easy it is to attack these servers, from inside or outside the network. K... 

  • Step 2: Sniffing the network for juicy info

    File servers hold much of an enterprise's sensitive data and are certainly a prime target of malicious hackers. Security testing expert Kevin Beaver says you'd be surprised how easy it is to attack these servers, from inside or outside the network. K... 

  • Check updates on a Web site

    Users often load Web pages from the hard disk to increase the browsing speed. With Internet Explorer 6 you can customize how often you want to check for updated content.