From confidentiality, integrity, and availability to authentication, authorization, and audit, find out how you can employ best practices to make Web services secure.
- By Mark O'Neill
- 07/20/2004
Use caution when setting log file limits; plus, some scripting books to check out.
- By Bill Boswell
- 07/06/2004
Get the scoop on Microsoft's series of releases and updates that will tighten security on both the latest Windows operating systems as well as most other Microsoft products.
- By Danielle Ruest and Nelson Ruest
- 07/01/2004
If you’re using Windows 2000 Server or above, chances are you’re
also using Kerberos authentication. It’s time to get to know this
three-pronged protocol and learn how to troubleshoot it.
- By David W. Tschanz
- 07/01/2004
You can roll your own (pardon the pun) cracks for Windows LM passwords.
- By Roberta Bragg
- 07/01/2004
Learn how to implement user profile management, a hot new feature in ASP.NET 2.0.
- By Dino Esposito
- 07/01/2004
Take care of this task throughout the company via this Active Directory trick.
Registration for security-focused developer exams 70-330 and 70-340 begins June 28.
- By Michael Domingo
- 06/28/2004
Mysterious Exchange migration stopped; issuing a complex password challenge to users that they might actually like.
- By Bill Boswell
- 06/15/2004
JAAS is based on the Pluggable Authentication Modules model and provides authentication and authorization services. Check out its many security benefits for Java applications.
Microsoft’s next Service Pack for Windows XP is almost totally about improved security. And it shows.
- By Bill Boswell
- 06/01/2004
As the capabilities of handheld devices have grown, so have the threats.
- By Jonathan Gossels and Dick Mackey
- 06/01/2004
Boot-up is a dangerous time for your systems, a time before security policies to protect them may be active. Avoid danger with persistent policies.
- By Roberta Bragg
- 06/01/2004
Remember the 8th layer of the OSI networking stack: humans. System administrators must educate themselves and their users about social engineering practices to prevent attacks.
- By Danielle Ruest and Nelson Ruest
- 05/27/2004
Network security is more important than ever. But network protection must move beyond the firewall. What new tools are on the horizon to help you with your combat strategy?
- By Danielle Ruest and Nelson Ruest
- 05/25/2004
Get online training for secure networking and application development; limited time availability.
- By Michael Domingo
- 05/19/2004
Test networks on Microsoft Virtual Server 2005 beta.
- By Roberta Bragg
- 05/10/2004
Prevent Internet Information Server from being installed automatically.
Microsoft's password complexity filter: what's wrong with it and why you might need something better.
- By Bill Boswell
- 05/04/2004
Build effective security moats with a defense-in-depth strategy.
- By Roberta Bragg
- 05/03/2004