These networks aren’t well known by many, yet they’re responsible for controlling much in our lives. And they’re not very secure.
- By Roberta Bragg
- 05/01/2004
MBSA offers much more than updates to your network.
Control of external connections made easier through Windows Firewall.
- By Roberta Bragg
- 04/28/2004
Healthy FRS means healthy Group Policy.
- By Roberta Bragg
- 04/26/2004
Run legacy apps without hitting the security barrier.
It takes two to make the security world go round.
- By Roberta Bragg
- 04/19/2004
- By Joe McKendrick
- 04/12/2004
Qualified MCSD candidates can take new security-based developer exams for free; exams set for April 21 beta testing.
- By Michael Domingo
- 04/12/2004
Specifics help build security.
- By Roberta Bragg
- 04/12/2004
Ports are a good way in, and often remain unchecked.
</i>MCP Magazine<i> asked Stephen Toulouse, security program manager, Microsoft Security Response Center, about the flaw and resulting controversy about the time delay.
Software Restriction Policies is a terrific new security tool—if you know what it can’t do, as well as what it can.
- By Roberta Bragg
- 04/01/2004
Knowing what’s in your Event Logs is a key to knowing what your servers are doing. Here’s how to make sense of them.
- By Derek Melber
- 04/01/2004
You can adapt the logical perimeter network design to suit your own access requirements, but most common requirements are met with this design.
- By Danielle Ruest and Nelson Ruest
- 04/01/2004
Computer networks allow people to share resources, but computer security prevents access to resources. How to decide if you need PKI, and a step-by-step guide to installing PKI on your servers.
Traffic-management switches are quickly becoming easier to deploy and support, with greater intelligence to repel more sophisticated application attacks
- By Hariharan Krishnan
- 04/01/2004
You can use a script to compile log info into a file for closer examination.
- By Chris Brooke
- 04/01/2004
How to move the default directories created by IIS from the system drive. Plus, methods to make FTP more secure.
- By Danielle Ruest and Nelson Ruest
- 04/01/2004
- By MCP Magazine Readers
- 04/01/2004
This script allows logoff and shut down of remote users.