Category: Security/Firewalls

Terminal Services Gateway vs. Terminal Services RemoteApp: What’s the diff? 0

Terminal Services Gateway vs. Terminal Services RemoteApp: What’s the diff?

Windows Server 2008 offers both Terminal Services Gateway (TS Gateway) and Terminal Services RemoteApp (TS RemoteApp) features. Although they both offer Remote Desktop Protocol (RDP) over HTTPS, the main difference between them is that...

Extranet hardening planning tool 0

Extranet hardening planning tool

I am working on securing the entire network for one of my clients. I ran into this article on TechNet that targets the specific area of extranet and how you can best secure it....

ISA Server’s external adapter can’t get an address from a DHCP server 0

ISA Server’s external adapter can’t get an address from a DHCP server

If you are trying to get your external NIC on the ISA Server obtain an IP address from a DHCP server and can’t, check out this KB article 841141 from Microsoft. This solution applies...

Windows Server 2008 Security Guide 0

Windows Server 2008 Security Guide

The Windows Server 2008 Security Guide is designed to further enhance the security of the servers in your organization by taking full advantage of the new and improved security technologies and features in Windows...

Is Microsoft’s “Password Checker” a reliable tool to test the strength of your password? 0

Is Microsoft’s “Password Checker” a reliable tool to test the strength of your password?

Microsoft offers a tool called Password Checker. The purpose of the tool is to test the strength of your password as you type. Is Password Checker a reliable tool to test the strength of...

Free cryptography book from Alfred Menezes 0

Free cryptography book from Alfred Menezes

If you are interested in cryptography, you might want to check out the Handbook of Applied Cryptography, by Menezes, van Oorschot, and Vanstone (CRC Press). This book is one of the recommended books for...

Encryption for Microsoft’s wireless keyboards hacked 0

Encryption for Microsoft’s wireless keyboards hacked

Swiss IT security company Dreamlab Technologies AG has shown that it is possible to capture and decrypt keystrokes, meaning that user names, passwords, bank details or confidential correspondence can be very easily eavesdropped. Although...

Firefox Exploit can Hack Gmail 0

Firefox Exploit can Hack Gmail

Mozilla has taken another security blow with the discovery that Google user accounts can be accessed through a dangerous Firefox exploit. The vulnerability, which is still in the wild some 10 days after its...

Peer-to-Peer File-Sharing and Copyright Infringement: Are You Vulnerable? 0

Peer-to-Peer File-Sharing and Copyright Infringement: Are You Vulnerable?

Here’s some useful information posted by the University of Washington regarding peer-to-peer file-sharing issues. 1. Peer-to-Peer File-Sharing: What is the risk? Every day, millions of computer users share files online. Whether it is music,...

Making Cisco VPN Client on Windows XP Work Behind a Router 0

Making Cisco VPN Client on Windows XP Work Behind a Router

I recently ran into this situation where I had to configure a Windows XP computer located on an internal network behind a Windows Server 2003 running Routing & Remote Access service to connect to...

Highly critical flaw found in Microsoft Excel 0

Highly critical flaw found in Microsoft Excel

Microsoft’s Excel application contains a vulnerability that could allow a remote attacker to gain access to a system. The flaw affects multiple versions of the spreadsheet software, including Excel 2000, 2002 and 2003, as...

How to Reset Master Password in Mozilla Firefox 0

How to Reset Master Password in Mozilla Firefox

Mozilla Firefox can protect your saved certificates and passwords with a master password. If you want to reset the master password, you can simply provide the current password and reset it to a new...

Restore Infected PCs with the Malware Removal Starter Kit 0

Restore Infected PCs with the Malware Removal Starter Kit

The Malware Removal Starter Kit, the newest Solution Accelerator from Microsoft, provides free, tested guidance to help you combat malware attacks and restore infected systems—so users can safely get back to work. The kit...

iPhone Hacked 0

iPhone Hacked

By the time excited consumers were unwrapping their brand new iPhones, hackers had already found ways to hack into the iPhone. While AT&T had a nightmarish time dealing with activation problems, hackers are claiming...

Security managers: beware the iPhone 0

Security managers: beware the iPhone

Over the past one or two years, security professionals have attempted to raise awareness of the dangers associated with connecting smartphones, PDAs, iPods, and other devices to business network-connected endpoints. Some vendors stepped up...

FBI: Over 1 Million Potential Victims of Botnet Cyber Crime 0

FBI: Over 1 Million Potential Victims of Botnet Cyber Crime

According to Federal Bureau of Investigation (FBI) press release last week, FBI has identified more than one million potential victims of botnet cyber crime. This was a result of “Operation Bot Roast” in which...

Application errors may be sent to Microsoft without notifying you 0

Application errors may be sent to Microsoft without notifying you

According to Microsoft “Some 2007 Office programs that run on Microsoft Windows XP Service Pack 2 (SP2) and on Microsoft Windows Server 2003 use Microsoft Application Error Reporting (DW 2.0) to report problems to...

Google’s Street View…or is it candid camera? 0

Google’s Street View…or is it candid camera?

Google, the search engine giant, is once again caught in another controversy. This time it’s a privacy issue that have people up in arms. Google recently started the new “Street View” feature, to go...

Spammer once sued by Microsoft is arrested in Seattle 0

Spammer once sued by Microsoft is arrested in Seattle

The Seattle Time reports: “A notorious spammer once sued by Microsoft was arrested in Seattle this morning, a week after a federal grand jury indicted him under seal for allegedly illegal — and prolific...

The “File Download – Security Warning” dialog box opens when you try to open Internet Explorer 7 0

The “File Download – Security Warning” dialog box opens when you try to open Internet Explorer 7

On May 10, I discussed a problem with opening Internet Explorer. Microsoft has posted a KB article that discusses the possible solution. Microsoft has confirmed that the problem is caused by the May 2007...

Free Anti-virus for Vista 0

Free Anti-virus for Vista

Looking for a free anti-virus for Windows Vista? Check out Avira AntiVir PersonalEdition Classic. It protects against viruses, worms, Trojans, dialers and phishing. It can also detect and delete root kits. There is also...

Comparing Vista’s Security with Competitors 0

Comparing Vista’s Security with Competitors

Microsoft has worked hard on securing Windows Vista because it has been criticized in the past for not properly securing its previous operating systems. Jeff Jones has published a Windows Vista 90 day vulnerability...

Problems With Smart Card Logon on Windows Vista 0

Problems With Smart Card Logon on Windows Vista

If you are having trouble with smart card logon/user certificate in Windows Vista/IE 7 client, check out Microsoft’s Knowledge Base article 922706. It states that: “The Windows Server 2003 Certificate Services Web enrollment functionality...

Internet under Attack 0

Internet under Attack

In one of the biggest attacks against the Internet since 2002, hackers yesterday overwhelmed at least three of the 13 root servers that manage global Internet traffic. The attack on UltraDNS, the company that...