Security


Anti-Spam Law Ineffective

Can Spam...Can't.

The Role of Government in IT Security

Special report, RSA Conference 2004: In a nutshell, panelists in IT governance discussion agree that government should play limited role, but they diverge on approaches.

New Association to Raise Cyber Security Awareness

Security companies form coalition to combat growing threats of cyber- crime, cyber-terrorism.

Gates Shows Off Windows XP Service Pack 2

New security features promise more secure desktops, says Microsoft chairman at RSA Conference 2004.

The Microsoft Security Debate, Part Two

Roberta responds to the critics of Microsoft's methods.

Security Implementer Exam Now Available

Exam counts toward MCSE: Security on Windows Server 2003 track.

The Microsoft Security Debate, Part One

Two users critique Microsoft's understanding of security.

The Perils of Patching

The process of keeping systems updated shouldn't be treated as the mindless that we mistake it for; no strategy is an invitation to disaster.

A Call to Arms, Continued

Letters from the security front.

A Call to Arms

Enlist everyone, even your relatives, in the fight against the spread of malware.

Automate Your Security

Many security-related tasks can be tedious—and, therefore, overlooked. Using these 10 scripts can make your life easier, while simultaneously locking down your network.

Secret Agent Plan

A reader's encrypted files are safe and recoverable if he turned on the Data Recovery Agent.

The Magic of RPC over HTTP

If you have the latest and greatest from Microsoft—Windows Server 2003, Outlook 2003 and Exchange 2003—your users can get seamless remote access to e-mail.

Psychologically Acceptable Security

Getting user buy-in for security is critical. Using certificate autoenrollment is a way to make it pain-free.

Storm Stories

It’s a truism in IT that various parts of your network—servers, hard drives, video cards, that mission-critical software program—will grind to a halt eventually. Here we present four disaster-recovery scenarios and how to recover from each.

Microsoft Beefs up Online Security Offerings

Perhaps no company in the industry is working harder than Microsoft at making sure the public knows what steps to take to secure its products.

Use the Best Security for SQL Server

Learn tips for administering SQL Server securely.

Books: Implement Security and Cryptography

NET Security and Cryptography by Peter Thorsteinson and G. Gnana Arun Ganesh lays down the foundation for .NET security features and shows you how to use them properly.

Separation, No Anxiety

Separation of duties is a good idea in the business world. It’s also a good one in the IT world.

Subscribe on YouTube