Security


The Mystery of the Event Logs

Knowing what’s in your Event Logs is a key to knowing what your servers are doing. Here’s how to make sense of them.

Five Layers of Defense

You can adapt the logical perimeter network design to suit your own access requirements, but most common requirements are met with this design.

Getting Started With PKI

Computer networks allow people to share resources, but computer security prevents access to resources. How to decide if you need PKI, and a step-by-step guide to installing PKI on your servers.

Finding a Home for Application Security

Traffic-management switches are quickly becoming easier to deploy and support, with greater intelligence to repel more sophisticated application attacks

Event Log Dissection

You can use a script to compile log info into a file for closer examination.

Securing IIS

How to move the default directories created by IIS from the system drive. Plus, methods to make FTP more secure.

Remote Shutdown

This script allows logoff and shut down of remote users.

Fired Security Researcher Resurfaces

Security expert fired over controversial report that accused Microsoft of contributing to global insecurity now at Verdasys.

Microsoft Has Law on Its Side After Code Leak

Code might be viewable, but intellectual property laws prevent its use by legitimate software companies, says expert.

Testing, Testing, 1, 2, 3...

Disaster recovery plans should be part of any testing plan.

Educational Opportunities

Security training, free for the asking.

In Through the Back Door

A routine audit of Active Directory permissions can expose this example back-ended breach.

RSA Musings

Something old, something new, something quite innovative at this year's security show.

The Microsoft Security Debate: The Final Chapter

Roberta responds to a readers' essay on what he views as Microsoft's poorly implemented security strategy.

Secure Your Directory-Enabled Apps

Find out how Active Directory Application Mode and Windows Authorization Manager can simplify security, personalization, and configuration for your directory-enabled applications.

Password Currency

Why it's important for remote users to change passwords regularly.

Divide and Conquer

Are you role-playing with your network? If not, you’re missing a powerful way to make it more secure.

No Holes Here

Firewall Analyzer knows what your firewalls are doing.

Subscribe on YouTube