A routine audit of Active Directory permissions can expose this example back-ended breach.
- By Bill Boswell
- 03/09/2004
Something old, something new, something quite innovative at this year's security show.
- By Roberta Bragg
- 03/08/2004
Roberta responds to a readers' essay on what he views as Microsoft's poorly implemented security strategy.
- By Roberta Bragg
- 03/01/2004
Find out how Active Directory Application Mode and Windows Authorization Manager can simplify security, personalization, and configuration for your directory-enabled applications.
- By Enrico Sabbadin
- 03/01/2004
Why it's important for remote users to change passwords regularly.
- By Chris Brooke
- 03/01/2004
- By MCP Magazine Readers
- 03/01/2004
Are you role-playing with your network? If not, you’re missing a powerful way to make it more secure.
- By Roberta Bragg
- 03/01/2004
Firewall Analyzer knows what your firewalls are doing.
Can Spam...Can't.
Special report, RSA Conference 2004: In a nutshell, panelists in IT governance discussion agree that government should play limited role, but they diverge on approaches.
Security companies form coalition to combat growing threats of cyber- crime, cyber-terrorism.
New security features promise more secure desktops, says Microsoft chairman at RSA Conference 2004.
Roberta responds to the critics of Microsoft's methods.
- By Roberta Bragg
- 02/23/2004
Exam counts toward MCSE: Security on Windows Server 2003 track.
- By Michael Domingo
- 02/18/2004
Two users critique Microsoft's understanding of security.
The process of keeping systems updated shouldn't be treated as the mindless that we mistake it for; no strategy is an invitation to disaster.
- By Roberta Bragg
- 02/09/2004
Letters from the security front.
- By Roberta Bragg
- 02/04/2004
Enlist everyone, even your relatives, in the fight against the spread of malware.
- By Roberta Bragg
- 02/02/2004
Many security-related tasks can be tedious—and, therefore, overlooked. Using these 10 scripts can make your life easier, while simultaneously locking down your network.
A reader's encrypted files are safe and recoverable if he turned on the Data Recovery Agent.
- By Bill Boswell
- 02/01/2004