Columns


The Insecurity of Windows Shell and USB Drives

Stuxnet is on the attack. Plus: old-school encryption makes a comeback; sniffing out threats, more.

End of XP As We Know It

Plus: Microsoft cozies up to Russia, China on security; virtualization's security shortcomings.

Researcher: End of XP SP2 Support Means More Risk

Plus: Developer ignoring DEP and ASLR at peril; what the global 'spamscape' looks like.

Get Ready to Upgrade to SharePoint 2010: A Planning Guide

You may be tempted to jump right into a SharePoint 2010 upgrade, but it requires a substantial amount of planning. This will guide you through the upgrade planning process.

Apple, Microsoft, Google, Twitter: Who's Cool, Who's Not?

Is Apple still cool kid on the tech company block? Maybe not.

Understanding Microsoft's New Windows Virtual Desktop Licensing with Software Assurance

As of July 1, Microsoft will bundle VDI/VDA licensing for the Windows client OS into Software Assurance (SA). Here's how the changes may affect you.

Is Change Control Killing Your Business?

Change control can sound good on paper, but it can also be used to shut down change entirely. Here's the process controls you'll want to implement to make sure innovation stays alive and keeps you (and your employer) happy.

How Microsoft Is Busting Its Own 'The Browser Is Part of the OS' Myth

For years, Microsoft has insisted that the browser is an integral part of the operating system, yet the company's current strategies with IE 6 and IE 9 make that argument an absurdity.

Microsoft on Security: Actions Speak Louder than Words

Big targets are always easy to hit. Perhaps no company in the modern age of commerce knows this better than Microsoft.

New Zero-Day Issue Hits Microsoft's Help and Support Center

Plus: XP Service Pack 2 support set to expire, Adobe's newest patch is only a drop in the bucket.

Windows Mobile Platform Malware Places Calls to Somalia, South Pole

Plus: Ten for June's Patch Tuesday; MS responds to Google Banning Windows; Adobe encounters another critical security flaw.

Software vs. Services

Microsoftis driving its customers toward online services, but do its customers really want to ride along?

Celebs Aren't All Dopes: Famous People with Tech Backgrounds

From Liam Nissan to Todd Rundgren, here's some celebrities who easily could have found themselves working beside you.

RODCs: Understanding and Implementing the New Windows Server 2008 R2 Domain Controllers

Read-only domain controllers (RODCs), a new feature of Active Directory Domain Services, represent a fundamental change in how you'll use DCs -- for security and otherwise. Here's what you need to know to implement them in your enterprise.

Reader Letters May 2010: Telephone Woes

Readers chime in on communication methods, the future of computing in the cloud, PowerShell issues and more.

Why You Need User Virtualization

User virtualization offers IT shops more control, makes remote management easier and improves the overall experience for end-users.

Managing File Transfer with MFT and P2P

There's probably a dozen or more ways this is getting done in your shop. Here's what you need to know to create a supported, secure solution for everyone.

What Kernel Hooking is All About

Attackers now patching systems to allow for better attacks. Plus: Microsoft Office and Google Apps go toe-t-toe on security; insider threats growing, says report.

Criticism on Patch Process Thrown Microsoft's Way

Plus: McAfee explains patching problem; what security concerns make you lose sleep?; Patching in the dark.

The Security Patching Fun Never Ends

Two new off-cycle patches follow the usual Patch Tuesday release. Plus: Looking to third-party app security.

Subscribe on YouTube