General

Last Updated on 23 June 2014, Total: 152 Blog Posts

  1. WinHlp32.exe is required to display ‘.hlp’ help files on Windows 8

    Windows Help (WinHlp32.exe) is a Help program that has been included with Microsoft Windows versions starting with the Microsoft Windows 3.1 operating system. However, the Windows Help program has not had a major update for many releases and no longer meets Microsoft's standards. Therefore, starting with the release of Windows Vista and continuing in Windows 8, the Windows Help program... Read More

  2. Windows 7 and Windows 8 Security Guidelines

    The Windows 8 Secure Boot process alerts a user when an attempt to subvert the security controls has taken place. It is important that users know how to identify and respond to this alert... Read More

  3. Windows Azure AD Rights Management tools

    Windows Azure AD Rights Management provides the ability to enable the use of digital rights management technology in organizations that subscribe to the Office 365 preview services. Office 365 Preview customers can enable rights management capabilities within the Preview versions of Exchange Online, SharePoint and Office. These downloads enable an administrator to manage Windows Azure AD rights management features and... Read More

  4. Windows Live Mesh will be retired on February 13

    After February 13, users of Windows Live Mesh would not be able to perform remote desktop and peer-to-peer activities. "Mesh synced storage" or "SkyDrive synced storage," will no longer be available through Mesh or devices.live.com, but copies of files on the local computer will remain unaffected. Microsoft recommends users to save all their cloud-based files to their local computers. However,... Read More

  5. Windows Patch Management Considerations

    There are certain times when organizations decide not to deploy a software update solution and use Windows native functionality – Microsoft Update, as their main solution. This may be the best approach when organizations have dispersed offices around the globe with a small number of standalone computers. It is simpler to enable automatic updates on these clients' computers rather than... Read More

  6. Windows Servers 2008 outbound traffic

    Managing outbound traffic has become very crucial in determining computer infections. Malware infects computers and then tries to send out stolen data to perpetrators. Viruses seek to replicate themselves by attempting to send packets to infect other computers. Users might use unapproved applications which may result in the transmission of confidential data. Therefore, it is appropriate to review your Windows... Read More

  7. Windows Servers Hardening

    A highly recommended best practice in securing Windows Servers is to stop unnecessary services and disable unused functionality. A brief checklist containing high level definitions of tasks to be performed would help administrators reduce the attack surface of their servers. A typical checklist would include: Stopping and disabling all unnecessary services and applications Renaming the Administrator account Creating a new... Read More

  8. Wireless mobile phone repeaters hacked by security experts

    The two researchers will give a demonstration about the femtocells hack at the Black Hat and Def Con hacking conferences in Las Vegas... Read More

  9. Your writing style can give you away!

    Researchers have found a technique based on linguistics that could track down users... Read More

  10. iCloud apparent flaw

    An apple user sells his MacBook Air and finds out that he can still track the device using Apple's "Find My Mac" feature, even though the laptop's hard drive has been completely erased. An apparent flaw in Apple's iCloud, allows owners of second-hand Apple devices to be tracked by the original owner, who can also remotely wipe all the data... Read More

  11. iCloud security and privacy overview

    Apple’s iCloud is built with industry-standard security practices and employs strict policies to protect users’ data... Read More

  12. “Smart defense” approach

    Here are some rules of thumb for Strategic Cyber Warning that were extracted form a paper prepared by the Smarter Alliance Initiative which is a partnership between the Atlantic Council and IBM. The key points are: Strategic disruptive effects are incredibly difficult, far harder than are usually thought. No known attacks have been both widespread and persistent enough to have... Read More

Featured Links