Software Restriction Policies is a terrific new security tool—if you know what it can’t do, as well as what it can.
- By Roberta Bragg
- 04/01/2004
Knowing what’s in your Event Logs is a key to knowing what your servers are doing. Here’s how to make sense of them.
- By Derek Melber
- 04/01/2004
You can adapt the logical perimeter network design to suit your own access requirements, but most common requirements are met with this design.
- By Danielle Ruest and Nelson Ruest
- 04/01/2004
Computer networks allow people to share resources, but computer security prevents access to resources. How to decide if you need PKI, and a step-by-step guide to installing PKI on your servers.
Traffic-management switches are quickly becoming easier to deploy and support, with greater intelligence to repel more sophisticated application attacks
- By Hariharan Krishnan
- 04/01/2004
You can use a script to compile log info into a file for closer examination.
- By Chris Brooke
- 04/01/2004
How to move the default directories created by IIS from the system drive. Plus, methods to make FTP more secure.
- By Danielle Ruest and Nelson Ruest
- 04/01/2004
- By MCP Magazine Readers
- 04/01/2004
This script allows logoff and shut down of remote users.
Security expert fired over controversial report that accused Microsoft of contributing to global insecurity now at Verdasys.
Code might be viewable, but intellectual property laws prevent its use by legitimate software companies, says expert.
- By Kristen Kazarian
- 03/25/2004
Disaster recovery plans should be part of any testing plan.
- By Roberta Bragg
- 03/22/2004
Security training, free for the asking.
- By Roberta Bragg
- 03/15/2004
A routine audit of Active Directory permissions can expose this example back-ended breach.
- By Bill Boswell
- 03/09/2004
Something old, something new, something quite innovative at this year's security show.
- By Roberta Bragg
- 03/08/2004
Roberta responds to a readers' essay on what he views as Microsoft's poorly implemented security strategy.
- By Roberta Bragg
- 03/01/2004
Find out how Active Directory Application Mode and Windows Authorization Manager can simplify security, personalization, and configuration for your directory-enabled applications.
- By Enrico Sabbadin
- 03/01/2004
Why it's important for remote users to change passwords regularly.
- By Chris Brooke
- 03/01/2004
- By MCP Magazine Readers
- 03/01/2004
Are you role-playing with your network? If not, you’re missing a powerful way to make it more secure.
- By Roberta Bragg
- 03/01/2004