Security


Put Your Finger on Proper Security

A roundup of five biometric products that go the extra security mile—for when passwords alone aren't enough.

On the Offensive

It's time to become proactive about stopping computer crime.

You Ask, Ballmer Answers

MCP Magazine readers get a crack at the Microsoft CEO.

Protection Through Isolation

This admin got a shock when he discovered that usernames and passwords for his new employer's sensitive documents were being sent in cleartext. Fortunately, he was able to see the forest for the trees.

A Trustworthy Response?

Everyone--Microsoft and its customers--needs to get more serious about the virus threat.

Lock Down Remote Registry Access

Block anonymous users from accessing confidential information.

XML and Web Services: Are We Secure Yet?

From confidentiality, integrity, and availability to authentication, authorization, and audit, find out how you can employ best practices to make Web services secure.

Log Jam

Use caution when setting log file limits; plus, some scripting books to check out.

Patching Windows Security

Get the scoop on Microsoft's series of releases and updates that will tighten security on both the latest Windows operating systems as well as most other Microsoft products.

Taming Kerberos

If you’re using Windows 2000 Server or above, chances are you’re also using Kerberos authentication. It’s time to get to know this three-pronged protocol and learn how to troubleshoot it.

Rainbow Crack--Not a New Street Drug

You can roll your own (pardon the pun) cracks for Windows LM passwords.

Managing User Profiles in ASP.NET 2.0

Learn how to implement user profile management, a hot new feature in ASP.NET 2.0.

Lock Down Those Scripts!

Take care of this task throughout the company via this Active Directory trick.

Developer Exams Now Live

Registration for security-focused developer exams 70-330 and 70-340 begins June 28.

Helping Those Who Help Themselves

Mysterious Exchange migration stopped; issuing a complex password challenge to users that they might actually like.

All That JAAS

JAAS is based on the Pluggable Authentication Modules model and provides authentication and authorization services. Check out its many security benefits for Java applications.

XP SP2--Dedicated To Security

Microsoft’s next Service Pack for Windows XP is almost totally about improved security. And it shows.

Lock Down Your Handheld Devices

As the capabilities of handheld devices have grown, so have the threats.

Boot-Time Security

Boot-up is a dangerous time for your systems, a time before security policies to protect them may be active. Avoid danger with persistent policies.

Defending Against Layer 8

Remember the 8th layer of the OSI networking stack: humans. System administrators must educate themselves and their users about social engineering practices to prevent attacks.

Subscribe on YouTube