Ensuring maximum asset availability requires multiple layers of security working in concert to protect against intrusions, enforce usage policies, and allow machines to remain resilient to attacks - even when patching is not an option.
Available now, DomainKeys is one promising entry into the fight against spam.
- By Roberta Bragg
- 01/01/2005
With Windows 2003, you can use the Encryption File Systems to give multiple users access to the same encrypted files.
- By Derek Melber
- 01/01/2005
Just because something "appears" to be from a legitimate sender doesn't make it so.
- By Ben Schorr and Jim McBee
- 01/01/2005
2005 Redmond Magazine Readers' Choice Survey: Find out how your favorite tool fared as nearly 2,200 readers pick their favorites in more than 40 product categories.
We test three software-based intrusion detection systems that can help alert you when you've got barbarians at the gate.
Fighting spam requires authenticating e-mail addresses on the fly. Despite igniting a battle of its own, the Microsoft-backed Sender ID spec
is shaping up as the best option.
- By Karen Epper Hoffman
- 01/01/2005
Is Windows XP SP2 bringing your remote admin scripts down? Mr. Script has the answer you've been looking for.
- By Chris Brooke
- 12/01/2004
The latest incarnation of Microsoft's primary firewall offering is more secure and easier to use.
New hacking methods make short passwords unsafe, but Microsoft makes it tough to go long. Her's how to forge an effective policy.
- By Derek Melber
- 12/01/2004
Early adopters laud GUI, VPN and administration features.
- By Stephen Swoyer
- 11/01/2004
Round out your new or updated security strategy by establishing a process to evaluate, manage, and deploy patches in your network. Here are some guidelines and tool recommendations.
- By Danielle Ruest and Nelson Ruest
- 11/01/2004
Honey drops can help you detect attacks in progress--without sticking you with false positives.
- By Mark Burnett and James C. Foster
- 11/01/2004
Concentrate on awareness, process, readiness, and privacy as you put your security plan into action.
- By Danielle Ruest and Nelson Ruest
- 11/01/2004
Securing your network goes beyond your hardware or software firewalls. You must define the role of each server and then implement delta security policies to protect your services.
- By Danielle Ruest and Nelson Ruest
- 11/01/2004
Remote access policies are at the heart of remote access--and at the root of most problems. Learn how they work and avoid the mistakes that can lock out your remote users.
Datakey Axis is a simple solution for smart card deployment.
- By Rick A. Butler
- 11/01/2004
Keeping systems patched is time-consuming and laborious, but it's crucial. Here are seven tools that can help you automate the process.
- By David W. Tschanz
- 11/01/2004
Roberta Bragg looks at Sender ID, the new anti-spam technology being developed by Microsoft.
- By Roberta Bragg
- 11/01/2004
Using password filters and longer passphrases will help keep your passwords from being cracked.
- By Derek Melber
- 11/01/2004