Security

Microsoft Security Bulletins

by Daniel Petri

Where you can either register to automatically receive Security Bulletins, or select the product and Service Pack you are running to view the security bulletins that are available for your system - or both. In any case, this is a passive service that will help you see what you should have, not what you already… Read More

How does EFS Work?

with 2 Comments by Daniel Petri

How does EFS work? EFS uses an encryption attribute to designate files for EFS protection. When a file's encryption attribute is on, EFS stores the file as encrypted cipher text. When an authorized user opens an encrypted file in an application, EFS decrypts the file in the background and provides a plaintext copy to the… Read More

The Importance of Web Application Scanning

by Daniel Petri

The Importance of Web Application Scanning White paper – November ‘05 Organizations need a Web application scanning solution that can scan for security loopholes in Web-based applications to prevent would-be hackers from gaining unauthorized access to corporate applications and data. Web applications are proving to be the weakest link in overall corporate security, even though… Read More

Petri Newsletter Sign-up
Tech Tuesday

Subscribe to Tech Tuesday, the latest insights from Petri.com for IT Pros.

    See All Petri Newsletters

    What is Windows Auditing?

    with 2 Comments by Daniel Petri

    Security is an ever increasing concern in almost every area of society today and computers are no exception. A detailed computer security plan should not only include policies and procedures to ensure that proper access rights are configured for all users, it must also include methods for verifying that these rights are effectively deployed throughout… Read More

    GFI LANguard Network Security Scanner – more info

    by Daniel Petri

    GFI LANguard Network Security Scanner - more info Identify & remotely install missing patches on your network with GFI LANguard Network Security Scanner. Free version available for download! Automatically detect security vulnerabilities on your network GFI LANguard Network Security Scanner (N.S.S.) checks your network for all potential methods that a hacker might use to attack… Read More

    Install Windows Server 2003 CA

    with 6 Comments by Daniel Petri

    How can I install the Certificate Authority (CA) service in Windows Server 2003? Windows Server 2003 can be used as a Certificate Authority (also known as CA) to provide extended security by offering support for Digital Certificates. Digital Certificates can be granted to users based upon their roles and group membership. For example, a regular… Read More

    What’s System File Checker?

    by Daniel Petri

    What is the System File Checker (SFC) command on a Windows 2000/XP/2003 computer? The System File Checker tool gives an administrator the ability to scan all of the protected files to verify their versions. The System File Checker tool also checks and repopulates the %SystemRoot%\System32\Dllcache folder. If the Dllcache folder becomes damaged or unusable, you… Read More

    ISA 2004 Training Labs

    by Daniel Petri

    ISA Server 2004 Training Labs A review of Train Signal’s ISA Server 2004 Training. See more details at Train Signal's website. I was reasonably familiar with Microsoft Proxy 2.0 and I had installed ISA 2000 once about 3 years ago, although due to it’s location it was only used as a Caching Server. So, what could be… Read More

    Download ISA Server SP1

    by Daniel Petri

    Where can I download ISA Server 2000 Service Pack 1? Internet Security and Acceleration (ISA) Server 2000 fixes are distributed in service packs. Installing the latest service pack keeps your installation of ISA Server 2000 current. Service packs include updates and fixes that are conveniently bundled for easy downloading. Service packs are cumulative; each new… Read More

    More about Public Key Infrastructure (PKI)

    by Daniel Petri

    This article is a non-direct continuation of the "What is a Public Key Infrastructure (PKI)?" found on the Petri IT Knowledgebase. Public-Key Cryptography and One-Way Functions As written in previous articles, Public-Key cryptography (as opposed to symmetric key cryptography) relies on one-way functions, which are functions that are easy to calculate but hard to invert… Read More