Security

Secure IPSec Policy Agent

with 1 Comment by Daniel Petri

How can I prevent other users from disabling the IPSEC Policy Agent service? In previous articles I've showed you how to protect your computer with the IPSEC mechanism (see Block Ping Traffic with IPSec, Block Web Browsing but Allow Intranet Traffic with IPSec and Block Web Browsing with IPSec). These articles describe how an administrator… Read More

Shavlik HFNetChk Pro/LT

by Daniel Petri

Featuring Shalvik's exclusive PatchPush, HFNetChkPro is the easiest way to manage security patches on your network, keeping your network safe. You no longer need to walk to each computer to install patches, or track security patches by hand. HFNetChkPro does this job for you, providing significant time savings in dealing with the large number of… Read More

How to Post to Newsgroups Without Getting spammed?

by Daniel Petri

How should I post messages to newsgroups without getting spam and viruses? Featured Product: Free AntiSpam for Exchange! DNS Blacklist checking & more - GFI MailEssentials. A fully functional 30-day trial is available for download. Newsgroups allow you to "post" messages (called a "posting"), respond to others' posts, and even download files they've left there… Read More

Petri Newsletter Sign-up
Tech Tuesday

Subscribe to Tech Tuesday, the latest insights from Petri.com for IT Pros.

    See All Petri Newsletters

    What are IPSEC Policies?

    with 1 Comment by Daniel Petri

    What are IPSEC Policies and how do I work with them? If you’ve studied Windows 2000 security much, then you know that one of the biggest security features that’s included in Windows 2000 is the IPSec protocol. IPSec is a protocol that’s designed to protect individual TCP/IP packets traveling across your network by using public… Read More

    Cleaning your Computer from Malware with the Microsoft Malware Removal Starter Kit

    with 1 Comment by Daniel Petri

    Every day, viruses, spyware, and other malware are triggered by employees, potential adversaries and/or malicious users. Some are sent to you by e-mail, others attempt to invade your computer after surfing to malicious websites or running macros that contain viruses. As an IT professional focused on security, the first step toward containing the spread of… Read More

    What’s a Trojan Horse?

    with 1 Comment by Daniel Petri

    What is a Trojan Horse and what threat does it pose? Since "Trojan Horses" (or Backdoors) have been in the news just recently, the term probably sounds familiar to you. But perhaps you’re not quite sure what a Trojan Horse is and what damage it is capable of doing to your system. Trojan Horses, of… Read More

    Microsoft Security Bulletins

    by Daniel Petri

    Where you can either register to automatically receive Security Bulletins, or select the product and Service Pack you are running to view the security bulletins that are available for your system - or both. In any case, this is a passive service that will help you see what you should have, not what you already… Read More

    How does EFS Work?

    with 2 Comments by Daniel Petri

    How does EFS work? EFS uses an encryption attribute to designate files for EFS protection. When a file's encryption attribute is on, EFS stores the file as encrypted cipher text. When an authorized user opens an encrypted file in an application, EFS decrypts the file in the background and provides a plaintext copy to the… Read More