|
|
Windows Server 2008 and Windows Vista : GPO Security (part 2) |
This script grants the specified permission for the security principal specified to all GPOs in the SOM of the site, domain, or organizational unit targeted. Complete control is allowed with this script and switches; the Replace, None, and Recursive options allow you to tailor your permission and scope of the permission. |
|
Windows Server 2008 and Windows Vista : GPO Security (part 1) |
The Replace switch is very useful—it can remove the existing permissions and replace them with new permissions. If you specify a permission for a security group that already exists on the permission list for the GPO, the higher of the two permissions will be placed on the security group. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Hidden Security Tools You Must Use |
Avast Free Antivirus 2013 (www. snipca.com/8934) is highly efficient but it comes with heaps of junk. Opt out of the Google extras during a standard Avast installation by un-ticking them. Use Custom Install, Next, Custom to deselect all unwanted components. |
|
How To Find And Follow The Best Backup And Password Strategies (Part 3) |
First connect your Time Machine drive. Then start up your Mac from the Mountain Lion recovery partition by pressing (and holding) z-R at startup. This action launches Recovery Mode, a portion of your drive that Mountain Lion treats as a separate volume. It includes a few essential utilities for restoring files in case of a problem. |
|
|
How To Find And Follow The Best Backup And Password Strategies (Part 1) |
It doesn’t have to be. You can set up some backup plans once, in about 10 minutes, and then forget about them as they run here to eternity. If, on the other hand, you’re paranoid about data security, it isn’t much harder to set up a backup system that’s practically bullet-proof, with multiple layers of redundancy that will make it possible to restore not only your Mac but also one or two tiers of your backups when disaster strikes. |
|
Too Many Passwords? Let’s Simplify & Secure Your Digital Life |
In the past couple of years, attacks on Gawker.com and LinkedIn resulted in hackers gaining access to millions of passwords. The incidents have heightened awareness for the importance of using strong passwords, as these and other websites have advised users to change their passwords to something different (at least) or something difficult-to-guess and even potentially unique (even better). |
|
The Other Half Of The Security Equation (Part 2) |
Some experts argue every data center should have man traps installed. Others argue they’re effective if staffed and used properly but are not necessary for every data center. Regardless, a man trap offers a low-tech method of authorizing those entering the facility, as it uses two doors separating a contained space. |
|
The Other Half Of The Security Equation (Part 1) |
Throwing technology at the problem isn’t enough, though. As Jenna Maertz, research analyst with Info-Tech Research Group (www.infotech.com), says, “Technology fails. Embrace this mantra when designing your security strategy. You can have the newest and shiniest technology in place, and a security breach can still occur. |
|
Ultimate Security Suites Showdown (Part 4) |
The security software market is highly competitive, and it showed in our test results, where no suite detected less than 97.8 percent of recent known malware samples, or blocked less than 94.4 percent of new malware in our real-world attack-blocking tests. False positives were also largely a non-issue. But if you look closely, you can find some difference among the suites. |
|
|
|
|
Are Your Passwords Safe? (Part 4) |
When you create a password, you might choose to store it in a password manager, write it down, or commit it to memory. Sometimes, however, things go wrong: You find yourself without access to your password manager, you lose the paper on which you recorded you passwords, you forget a password you thought you had memorized, or you remember it wrong too many times and get locked out of the account. |
|
Are Your Passwords Safe? (Part 3) |
Ever since Mac OS 8.6, the Mac has managed passwords with Keychain, Apple’s password-management system. The Keychain Access application (/Applications/Utilities) is the front-end to that system. It stores a wide range of items including passwords for email, websites, servers, network shares, Wi-Fi networks, and encrypted disk images. |
|
Are Your Passwords Safe? (Part 2) |
Once you know which passwords you need to memorize, your next job is to choose passwords that are strong enough to defeat automated hacking attempts yet memorable enough that you can produce them instantly and for bonus points, they should be convenient to type. |
|
Are Your Passwords Safe? (Part 1) |
If you haven’t examined your approach to making and using passwords recently, now is a good time to rethink your assumptions. Here are a few important facts about passwords you may not have realized and what they mean for you. |
|
|
|
|
|
10 Contenders For The 'Ultimate Protector' Crown (Part 1) |
As a consumer, the natural reaction is to look at these reports with a fistful of salt and a sack of skepticism after all, AV vendors have a vested interest in promoting a need for security software, but are we really as vulnerable as they say? It all depends on your computing habits, but make no mistake, the web is a dangerous place to roam. |
|