Is Windows security an afterthought?
As the editor of SearchWindowsSecurity.com, I often speak with users about their Windows security responsibilities. One senior systems analyst in particular sent me an interesting note recently… To...
View ArticleData vs. perimeter vs. network security
A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about <a...
View Articleping from outside
hi, could you please tell me which command in cisco routers prevent them from being ping from outside networks. and also how can i prevent terminals inside a network to ping outside ips(group policies...
View ArticleFiles and directory access loging
one of my clients is asking about a daily report contains all files and directories accessed every day and who is accessing it (time and mode:delete ,read ,write.) on a spicific share. so i tried using...
View ArticleCertificates
I am pretty new to the 2003 Microsoft world, but I am NT 4 MCSE. My setup: 2 W2K3 DC’s 1 Exchange 2K3 member server 1 W2K3 member server–web server about 60 users–single domain some of my users want to...
View ArticleIM Blocking and URL Filtering
We have Pix515E which is gateway to Internet. We also got IWSS Proxy(Trend Micro) along with URL filtering module. Domain users get directed to IWSS proxy (GPO settings) and restrictions about URL...
View Articleaaa authorization ?
Which of the following authorization commands are valid? (we have to choose 2 correct) A. aaa authentication exec home radius B. aaa accounting exec home radius C. aaa authorization default none D. aaa...
View ArticleShares Baseline Security Information
Hello, I use the Microsoft Baseline Security Analyser 2.0 to retrive information about shares in some local servers. I can not understand the diference between the information give in the report, about...
View ArticleSecurity advisories
Does a security research firms track record of vulnerabilities and exploits published make you trust them more, or more likely to hire them?
View Articlewhich tools can be used to analyse vulnerabilities?
Question Edited by Michael Tidmarsh
View ArticleWhich is more vulnerable among IBM, MS, Apple, Samsung?
Question Edited by Michael Tidmarsh
View Article