Security Watch


Linux: Avenue for Windows Sneak Attack?

Any hole, irrespective of OS, is the weakest link.

Insecurity, in Black and White

Proper preventive measures can mitigate attacks on data storage.

Lock Down Remote Registry Access

Block anonymous users from accessing confidential information.

Virtualize This

Test networks on Microsoft Virtual Server 2005 beta.

Digging Deep

Build effective security moats with a defense-in-depth strategy.

Inside Windows XP SP2 Security Enhancements

Control of external connections made easier through Windows Firewall.

Troubleshooting Tips: Get to Know FRS

Healthy FRS means healthy Group Policy.

Trustworthy Computing Isn't Just for Microsoft

It takes two to make the security world go round.

Using RPC Over HTTP

Specifics help build security.

Testing, Testing, 1, 2, 3...

Disaster recovery plans should be part of any testing plan.

Educational Opportunities

Security training, free for the asking.

RSA Musings

Something old, something new, something quite innovative at this year's security show.

The Microsoft Security Debate: The Final Chapter

Roberta responds to a readers' essay on what he views as Microsoft's poorly implemented security strategy.

The Microsoft Security Debate, Part Two

Roberta responds to the critics of Microsoft's methods.

The Microsoft Security Debate, Part One

Two users critique Microsoft's understanding of security.

Subscribe on YouTube

Upcoming Training Events

0 AM
Live! 360 Orlando
November 17-22, 2024
TechMentor @ Microsoft HQ
August 11-15, 2025