Print Page      Email Page      info@relevanttechnologies.com
 
2005 Security Articles

Step-by-Step Guide: Google Hacking to Test Your Security
Brien Poseyís five part series on how to using Google to hack your own website helps you determine if your website is exposing sensitive information.
October 20, 2005

Plug those Bluetooth Inspired Vulnerabilities
Bluetooth is the wireless technology most often used to synchronize your mobile device to a desktop computer. It also enables wireless keyboards and mice to connect to desktop or laptop computers, for example. Laura Taylor fills you in on Bluetoothís security vulnerabilities.
October 4, 2005

Fingerprinting the Bad Guys
Learn how to identify the operating system running on a hackerís computer to gain evidence against the hacker. Brien Posey explains how.
September 22, 2005

Basic Security Safeguards for PocketPC
Brien Posey tells you how to beef up the security on your PocketPC.
September 13, 2005

It's Easy to Secure Windows 2000 Servers: Part 6
In the earlier installments of this series, you learned how to use Microsoft's Management Console (MMC) to automatically configure and enforce security policies by creating security templates and installing them on multiple servers. In Part 6, we're going to cover how to secure a Windows 2000 Exchange server. (The settings described in this article were tested and verified with Exchange Server 5.5.)
August 17, 2005

Itís Easy to Secure Windows 2000 Servers: Part 5
In the earlier installments of this series, you learned how to use Microsoft's Management Console (MMC) to automatically configure and enforce security policies by creating security templates and how to install them on multiple servers. In this part, I'm going to teach you what settings to configure in order to secure a Windows 2000 DNS server.
July 13, 2005

Anti-Virus Software Market Review 2005
Computer viruses are spreading through the Internet at an unprecedented rate and the antivirus market is now a $3 billion (USD) a year industry. This report measures the financial health and product quality of four key industry players: Symantec, McAfee, Computer Associates, and Trend Micro.
June 24, 2005

Itís Easy to Secure Windows 2000 Servers: Part 4
In the earlier installments of this series, you learned how to use Microsoft's Management Console (MMC) to automatically configure and enforce security policies by creating security templates. Now that you know how to automate security policies for a basic Windows 2000 server, it's time to learn how to distribute this policy so that you can use it on multiple systems and, by doing so, standardize your security configurations.
June 6, 2005

Itís Easy to Secure Windows 2000 Servers: Part 3
In the first two parts of this series, you learned how to use Microsoft's Management Console (MMC) to automatically configure and enforce security policies by creating security templates. You also learned how to create a security template and assign Account Policies, Local Policies, and Event Log security policies to it for a basic Windows 2000 server. In Part 3, Laura Taylor teaches you how to configure and assign System Services, Registry Settings, and File System Settings security policies.
May 3, 2005

Handheld Security Part 5 - Enforce Policies, Keep Your Network Safe
After much resistance, you've finally decided to allow your employees to connect their cell phones, personal digital assistants, and smartphones to your corporate network. From an operational standpoint, you've already set up provisions for a handheld VPN client for users to make use of and have made handheld firewalls and anti-virus software available to them. The only thing you have left to do before you give the green light for launching the new functionality and privileges are the security policies that need to be put into place.
March 29, 2005

It's Easy to Secure Windows 2000 Servers: Part 2
In the first part of this series, we learned how to use Microsoft's Management Console (MMC) to automatically configure and enforce security policies by creating security templates. We also learned how to create a security template and assign Account Policies to it for a basic Windows 2000 server. In Part 2, we'll teach you how to assign Local Policies and Event Log security policies to your basic Windows 2000 server templates.
March 16, 2005

Information Security Firewalls Market Report Part One: Market Overview and Technology Background
The firewall market is a mature and competitive segment of the information security market. With numerous vendors and firewalls in all price ranges choose from, IT decision makers should be especially selective. This report presents a market overview and some criteria for selecting products from the long list of contenders.
March 1, 2005

It's Easy to Secure Windows 2000 Servers: Part 1
Configuring servers for security is an important part of mitigating risks to enterprise networks. Although Windows 2000 servers have a reputation for being notoriously insecure, if you take the time it is actually possible to lock them down so tightly that leading scanners will not even recognize that they are Windows servers. The best way to do this is to automate the security on your servers by using security templates, sometimes referred to as .inf files.
January 4, 2005





 
DHTML Menu By Milonic JavaScript