Security


Keys to the Domain

Available now, DomainKeys is one promising entry into the fight against spam.

Encryption All Around

With Windows 2003, you can use the Encryption File Systems to give multiple users access to the same encrypted files.

Q&A: Protect Users From Phishing Scams

Just because something "appears" to be from a legitimate sender doesn't make it so.

Best of the Best

2005 Redmond Magazine Readers' Choice Survey: Find out how your favorite tool fared as nearly 2,200 readers pick their favorites in more than 40 product categories.

Intrusion Interrupted

We test three software-based intrusion detection systems that can help alert you when you've got barbarians at the gate.

Valid ID Required

Fighting spam requires authenticating e-mail addresses on the fly. Despite igniting a battle of its own, the Microsoft-backed Sender ID spec is shaping up as the best option.

Remote Scripting for SP2

Is Windows XP SP2 bringing your remote admin scripts down? Mr. Script has the answer you've been looking for.

ISA Server at Your Service

The latest incarnation of Microsoft's primary firewall offering is more secure and easier to use.

New Password Mantra: Go Long

New hacking methods make short passwords unsafe, but Microsoft makes it tough to go long. Her's how to forge an effective policy.

ISA 2004 Passes the Test

Early adopters laud GUI, VPN and administration features.

Manage Patches and Updates

Round out your new or updated security strategy by establishing a process to evaluate, manage, and deploy patches in your network. Here are some guidelines and tool recommendations.

Sweet Enticement

Honey drops can help you detect attacks in progress--without sticking you with false positives.

Plan Your Defense Strategy

Concentrate on awareness, process, readiness, and privacy as you put your security plan into action.

Use Server Roles to Heighten Security

Securing your network goes beyond your hardware or software firewalls. You must define the role of each server and then implement delta security policies to protect your services.

RAP Traps

Remote access policies are at the heart of remote access--and at the root of most problems. Learn how they work and avoid the mistakes that can lock out your remote users.

Axis of Authentication

Datakey Axis is a simple solution for smart card deployment.

Grunt Work

Keeping systems patched is time-consuming and laborious, but it's crucial. Here are seven tools that can help you automate the process.

The Solution to Spam

Roberta Bragg looks at Sender ID, the new anti-spam technology being developed by Microsoft.

Reaching Password Nirvana

Using password filters and longer passphrases will help keep your passwords from being cracked.

CALL FOR USERS: MCSA: Security for Windows Server 2003

Looking for experts for advice on how to get the security certification.

Subscribe on YouTube