Software Restriction Policies, Part One: One way to head worms and trojan malware off at the pass is to keep them from running at all. With Win Server 2003 Software Restriction Policy management, you can do just that, flexibly, with no additional software, and with little change to your carefully tuned Active Directory configuration.
Users want to recover altered or deleted files all the time, but they never seem to want what you give them. With Windows Server 2003's Volume Shadow Copy Service, backups start making a lot more sense for both you and your users.
Given the simplicity and value of setting up fault tolerance for your DHCP services, it's surprising how many network admins fail to do so. Drew Bird explores how a simple matter of planning your implementation and putting it into place can save you potential aggravation down the road.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?