Legacy Security Articles Archives

More Information on Firewalls

Jul 14 2014 01:27 PM | Stephen in Legacy Security Articles

It seems nowadays if you are not online, you don't exist. It really does not matter what type of company you run, you should have an online presence to let your prospects and clients know about your company and services. When you decide to take the lea...

Read story →    0 comments    -----    security, shell code and 1 more...

Corporate Spyware Fight

Jul 14 2014 01:28 PM | Stephen in Legacy Security Articles

Companies have begun to take a stance against spyware by implementing spyware tools across their entire network. In the recent past Infoworks Technology and Unisys developed a partnership when Infoworks announced they would be providing their SpyRemove...

Read story →    0 comments    -----    security, windows, scanning and 1 more...

Info on anonymous remailers

Jul 14 2014 01:29 PM | Stephen in Legacy Security Articles

The newest version of this document can be obtained by sending mail to: mg5n+ remailers@andrew.cmu.edu Automated software will email you a copy. I try to keep this info as up to date as possible, but I may have missed something. If there are any errors...

Read story →    0 comments    -----    networking, network security and 1 more...

So, What IS Spyware?

Jul 14 2014 01:32 PM | Stephen in Legacy Security Articles

You've heard all kinds of terrible things about it, but just what IS it - and how does it get on your computer in the first place? Spyware is a real pain in the arse, to put it bluntly. It bogs down your computer's memory, causes you to be spammed to...

Read story →    0 comments    -----    security, networking, scanner

How To Remove Winfixer 2005 Plus Unwanted Spywa...

Jul 14 2014 01:34 PM | Stephen in Legacy Security Articles

Spyware and adware is advertising supported software that allows its publishers to snoop on a computer user's internet activity. It is designed to obtain information about computer users and their surfing behavior usually without their knowledge or co...

Read story →    0 comments    -----    windows, security, scanning

Armoring Linux

Jul 14 2014 01:36 PM | Stephen in Legacy Security Articles

Organizations throughout the world are adopting Linux as their production platform. By connecting to the Internet to provide critical services, they also become targets of opportunity. To help protect these Linux systems, this article covers the basics...

Read story →    0 comments    -----    unix, virus, security

Analyzing Wireless Network Security at the Pack...

May 10 2014 02:19 PM | Stephen in Legacy Security Articles

The tricky thing about a wireless network is that you can't always see what you are dealing with. In a wireless network, establishing connectivity isn't as simple as plugging in a cable, physical security isn’t nearly as easy as just keeping unauthoriz...

Read story →    0 comments    -----    security, networking and 1 more...

Kaspersky Security for Mail Server - Voted Wind...

May 10 2014 02:14 PM | Stephen in Legacy Security Articles

Winner in the Email Anti Virus Category of Readers’ Choice Awards: Kaspersky Security for Mail Server June 24, 2010 - Kaspersky Security for Mail Server was selected the winner in the Email Anti Virus category of the WindowSecurity.com Readers’ Choice...

Read story →    0 comments    -----    security, server, advisory

Painless Encryption:Intel Advanced Encryption S...

May 10 2014 02:08 PM | Stephen in Legacy Security Articles

With the increasing ubiquity of computing devices permeating all areas of our lives at work and at home, the need for encryption has become more important than ever. Desktops, laptops, smart phones, “pad” PCs, PDAs, Blue-ray players, and many more devi...

Read story →    0 comments    -----    network, anonymous proxy and 1 more...

Reasons to Look at Event Viewer in Windows 2008...

May 10 2014 01:58 PM | Stephen in Legacy Security Articles

I have been working with Windows-related solutions for over 15 years. During that time period, the Event Viewer has always been a hard topic to discuss as it has fallen short of even being very functional for most of that time period. The events have b...

Read story →    0 comments    -----    windows, network security and 1 more...

It's Time to Get Smart About Smart Phone Se...

May 10 2014 01:53 PM | Stephen in Legacy Security Articles

In 2008, I published an article on this site about the threats that mobile phones can pose to business networks and steps you could take to secure Windows Mobile 6.1 phones. The smartphone market has boomed since then and companies are faced with a ple...

Read story →    0 comments    -----    network security, cyber security and 2 more...

GFI LANguard - Voted WindowSecurity.com Readers...

May 10 2014 01:49 PM | Stephen in Legacy Security Articles

Winner in the Patch Management Category of Readers’ Choice Awards: GFI LANguard August 25, 2010 - GFI LANguard was selected the winner in the Patch Management category of the WindowSecurity.com Readers’ Choice Awards. Ecora Patch Manager and WinINSTALL...

Read story →    0 comments    -----    security, windows, networking

Attaching Tasks to Event Viewer Logs and Events

May 10 2014 01:31 PM | Stephen in Legacy Security Articles

As a Windows network administrator, you have limited time on your hands. If you can automate a task it means that you have saved yourself some money! Well, the Event Viewer and the associated logs have for years been a “pain in the neck” for Windows ad...

Read story →    0 comments    -----    security, advanced, server

Group Policy Resource Guide

May 10 2014 01:23 PM | Stephen in Legacy Security Articles

I sometimes get stuck in my ways and can’t see the wood for the trees. I also find that many administrators find themselves in this situation, especially when it comes to Group Policy. In an attempt to create a list of resources and tools that you can...

Read story →    0 comments    -----    programming, assembly, scanning and 1 more...

Myths of Securing Windows Desktops (Part 1)

May 10 2014 01:17 PM | Stephen in Legacy Security Articles

If you would like to be notified on when Derek Melber releases the next part in this article series please sign up to our WindowSecurity.com Real Time Article Update newsletter. Introduction I have spent the better part of the past 6 years focusing o...

Read story →    0 comments    -----    security, windows, virus

Securing Remote Desktop Services in Windows Ser...

May 10 2014 01:04 PM | Stephen in Legacy Security Articles

Remote Desktop Services (RDS) on Windows Server 2008 R2 has more than just a new name; this is not your father’s Terminal Services. With new features (some of them introduced in Windows Server 2008) such as RemoteApp, RD Gateway, and RD Virtualization...

Read story →    0 comments    -----    security, scanning, html, windows and 1 more...

Security Log Management Tips

May 10 2014 12:53 PM | Stephen in Legacy Security Articles

The security log for Windows is full of great information, but unless you know how to control, manage, and analyze the information, it is going to take you much longer to get the information that you want out of it. This article will describe some of t...

Read story →    0 comments    -----    security, networking, network

AccessPatrol - Voted WindowSecurity.com Readers...

May 10 2014 12:47 PM | Stephen in Legacy Security Articles

Winner in the Endpoint Security Category of Readers’ Choice Awards: AccessPatrol May 26, 2010 - AccessPatrol was selected the winner in the Endpoint Security category of the WindowSecurity.com Readers’ Choice Awards. USB CopyNotify! and GFI EndPointSec...

Read story →    0 comments    -----    windows, security, networking

Securing DNS Connections with Windows Server 20...

May 10 2014 12:42 PM | Stephen in Legacy Security Articles

With the upcoming insurgence of IPv6, accessing computers through DNS names will be more important than ever. While those of us who have been working with IPv4 for many years have found it fairly easy to remember a great number of IPv4 addresses using...

Read story →    0 comments    -----    security, windows, networking

Windows 7 Security Primer (Part 2)

May 10 2014 12:29 PM | Stephen in Legacy Security Articles

If you would like to be notified of when Robert Shimonski releases the next part in this article series please sign up to our WindowSecurity.com Real Time article update newsletter. If you would like to read the first part in this article series please...

Read story →    0 comments    -----    windows, security, server

Better Security through Sandboxing

May 10 2014 12:21 PM | Stephen in Legacy Security Articles

Sandboxing refers to creating an isolated environment for running applications that could present a security risk. Some Internet apps are now built with their own sandboxes, but there are several ways you can create a sandboxed environment for any appl...

Read story →    0 comments    -----    security, advanced, intermediate

Collecting Threat Intelligence (Part 1)

May 10 2014 11:56 AM | Stephen in Legacy Security Articles

If you would like to be notified of when Chris Sanders releases the next part in this article series please sign up to our WindowSecurity.com Real Time Article Update newsletter. Introduction Those defending the network are at a significant disadvantag...

Read story →    0 comments    -----    security, windows, network

Quest GPOADmin - Voted WindowSecurity.com Reade...

May 10 2014 04:25 PM | Stephen in Legacy Security Articles

Winner in the Group Policy Management Category of Readers’ Choice Awards: Quest GPOADmin July 29, 2010 - Quest GPOADmin was selected the winner in the Group Policy Management category of the WindowSecurity.com Readers’ Choice Awards. ScriptLogic Activ...

Read story →    0 comments    -----    security, windows, networking

AdventNet EventLog Analyzer - Voted WindowSecur...

May 10 2014 04:22 PM | Stephen in Legacy Security Articles

Winner in the Event Log Monitoring Category of Readers’ Choice Awards: AdventNet EventLog Analyzer March 25, 2010 - AdventNet EventLog Analyzer was selected the winner in the Event Log Monitoring category of the WindowSecurity.com Readers’ Choice Awar...

Read story →    0 comments    -----    security, windows, networking and 1 more...

Netwrix Product Review

May 10 2014 04:07 PM | Stephen in Legacy Security Articles

Change management has become an essential part of managing IT system security. Changes to system configuration - even when the changes are authorized – can result in unintended consequences such as exposure of the systems and network to malicious code...

Read story →    0 comments    -----    network security, network and 1 more...