Security


SA Exposed

Customers have few kind words for Microsoft's Software Assurance, and even fewer good choices for upgrades.

Open 24 Hours: Load Balancing

The proper level of load balancing services can ensure consistent availability of Web services.

Safety in New ISA Server 2004 Exam

New exam follows on heels of newest version of Microsoft's server for speedy, secure computing.

Cut Your Losses

FirstDefense-ISR can be your first line of defense against disk failure and data loss.

Dumb and Dumber

This veteran penetration tester has seen some stupid security lapses in his time. Here are six of the worst.

Data at Rest Is a Sitting Duck

Recommendations for reducing risk to your stored data, whatever its form.

Take Control

The Altiris Management Suites give you complete control over every aspect of your network operations.

MCSE: Security Tops 4,000

Growing ranks of those with MCSE: Security offers some proof that security remains hot.

Top 3 Encryption Myths

Misconceptions of encryption keep us from obtaining the full range of benefits it offers.

The 10 Essential Rules of Patch Management

The more work you put in up front, the easier it will be to get and stay current when the patches hit.

Download Lockdown

Worried about trojans and viruses sneaking in with downloaded files? DownloadSecurity can help you stop them at the gate.

SP2: More Ammo for the Security Battle

Rollout pain aside, users laud the long overdue enhancements that SP2 brings to IE, along with new GPOs, RPC lockdown and more.

Choose the Right Preventive Security Technologies

Ensuring maximum asset availability requires multiple layers of security working in concert to protect against intrusions, enforce usage policies, and allow machines to remain resilient to attacks - even when patching is not an option.

Keys to the Domain

Available now, DomainKeys is one promising entry into the fight against spam.

Encryption All Around

With Windows 2003, you can use the Encryption File Systems to give multiple users access to the same encrypted files.

Q&A: Protect Users From Phishing Scams

Just because something "appears" to be from a legitimate sender doesn't make it so.

Best of the Best

2005 Redmond Magazine Readers' Choice Survey: Find out how your favorite tool fared as nearly 2,200 readers pick their favorites in more than 40 product categories.

Intrusion Interrupted

We test three software-based intrusion detection systems that can help alert you when you've got barbarians at the gate.

Valid ID Required

Fighting spam requires authenticating e-mail addresses on the fly. Despite igniting a battle of its own, the Microsoft-backed Sender ID spec is shaping up as the best option.

Remote Scripting for SP2

Is Windows XP SP2 bringing your remote admin scripts down? Mr. Script has the answer you've been looking for.

Subscribe on YouTube

Upcoming Training Events

0 AM
Live! 360 Orlando
November 17-22, 2024
TechMentor @ Microsoft HQ
August 11-15, 2025