Security

LATEST

Disable EFS in Windows 2000

How can I disable EFS on Computers Running Windows 2000? To disable EFS on computers running Windows 2000, you must remove the default data recovery agent from the computer. This restriction is removed in Windows XP and Windows Server 2003 to help prevent security attacks on computers that are not members of a domain. The…

View Article

What is Windows Auditing?

Security is an ever increasing concern in almost every area of society today and computers are no exception. A detailed computer security plan should not only include policies and procedures to ensure that proper access rights are configured for all users, it must also include methods for verifying that these rights are effectively deployed throughout…

View Article

New EFS Features in Windows XP

What are the new EFS features in Windows XP? Microsoft Windows 2000 introduced the capability for data recovery with the implementation of Encrypting File System (EFS), and this capability has been enhanced in Windows XP. Microsoft Windows XP provides many enhancements in the area of data protection – especially Encrypting File System (EFS). Windows XP…

View Article

Cleaning your Computer from Malware with the Microsoft Malware Removal Starter Kit

Every day, viruses, spyware, and other malware are triggered by employees, potential adversaries and/or malicious users. Some are sent to you by e-mail, others attempt to invade your computer after surfing to malicious websites or running macros that contain viruses. As an IT professional focused on security, the first step toward containing the spread of…

View Article

The Importance of Web Application Scanning

The Importance of Web Application Scanning White paper – November ‘05 Organizations need a Web application scanning solution that can scan for security loopholes in Web-based applications to prevent would-be hackers from gaining unauthorized access to corporate applications and data. Web applications are proving to be the weakest link in overall corporate security, even though…

View Article

Shavlik HFNetChk Pro/LT

Featuring Shalvik’s exclusive PatchPush, HFNetChkPro is the easiest way to manage security patches on your network, keeping your network safe. You no longer need to walk to each computer to install patches, or track security patches by hand. HFNetChkPro does this job for you, providing significant time savings in dealing with the large number of…

View Article

What are IPSEC Policies?

What are IPSEC Policies and how do I work with them? If you’ve studied Windows 2000 security much, then you know that one of the biggest security features that’s included in Windows 2000 is the IPSec protocol. IPSec is a protocol that’s designed to protect individual TCP/IP packets traveling across your network by using public…

View Article

Create a mountable virtual encrypted hard drive in Windows Vista using TrueCrypt

TrueCrypt is a free, open-source application for Windows XP and Windows Vista that will create a mountable, virtual, encrypted, hard disk. The encrypted files can be easily transported to mobile media including thumb drives, CDs, external hard drives, etc. The entire process is graphical and can be completed by users of any experience level. TrueCrypt…

View Article

Reducing Help Desk Calls With The Specops Password Reset Tool By Daniel Petri

One of the most time consuming administrative tasks is the password reset issue. Research shows that help desk calls may consist of up to 40% of password reset related issues. When I’ve learned about a new tool that was designed to help mitigate these issues I wanted to test it out. The tool is called…

View Article

Forgot the Administrator’s Password? – Change Domain Admin Password in Windows Server 2008 AD

Step 1 Restart Windows 2003 in Directory Service Restore Mode. Note: At startup, press F8 and choose Directory Service Restore Mode. It disables Active Directory. When the login screen appears, log on as Local Administrator. You now have full access to the computer resources, but you cannot make any changes to Active Directory. Step 2…

View Article
Go to page