Security

Last Updated on 22 May 2008, Total: 35 Knowledge Base Tips

  1. Wipe Your Drive

    Hard drives should be wiped clean before disposing of them... Read More

  2. Using Users to Test Patches

    You can use your own users to test patches for client OSes and applications, if you do it the right way... Read More

  3. Group Policy and Laptops

    Common misconception concerning laptops and Group Policy... Read More

  4. Using the Windows Firewall without a router in Windows XP SP2

    The Windows Firewall does a great job for it's purpose for protecting inbound traffic to protect you from unsolited traffic from the Internet. By now, everyone has probably installed Service Pack 2 (SP2) or is slowing getting it installed on their machines. The important thing to note with the Windows Firewall is that is set for all network connections by... Read More

  5. Prevent Ordinary Users From Installing Devices

    Enhance security by preventing ordinary users from being able to install devices... Read More

  6. Microsoft Baseline Security Analyzer (MBSA)

  7. Rename The Administrator Account

    Some experts say that renaming the Administrator account is pointless. Any worthy hacker knows that the true Administrator account has a unique identifier and how to find it. But, that doesn't mean you need to make it easy for the hackers who aren't worthy... Read More

  8. National Security Agency : Security Recommendation Guides

  9. Configure and Maintain AutoComplete

    Microsoft Internet Explorer offers the AutoComplete feature to remember past entries and automatically pre-populate fields as you type to save you some time and effort. You may find it quite convenient, but having AutoComplete remember username or password information can pose a security risk... Read More

  10. Use 'Run As' To Protect The Registry

    Members of the Administrators group typically have full control to modify registry keys. Unwittingly executing a malware-infected or other questionable program with Administrator privileges can result in registry additions or edits which may adversely affect the system. To safeguard the registry without logging out you can use this trick... Read More

Featured Links