public marks

PUBLIC MARKS from ERSWeb with tag security

2010

How can I check the password of the IUSR and IWAM local accounts on a machine?

(via)
Windows IT Pro For Admins SuperSite For Tech Enthusiasts SQL Server Mag For DBAs DevProConnections For Developers SharePointPro Connections For IT & Dev Windows IT Pro, we're in IT with you About Advertise Subscribe Follow Us RSS Why Join My Account Register Sign In Search InstantDoc ID GO Browse By: Author | Issue * Home * news o Paul Thurrott's WinInfo News * blogs o Active Directory GPO and Identity o Active Directory Troubleshooting Tips and Tricks o Business Technology Perspectives o exchange and outlook o fearless security o hyperbole embellishment sys admin o IT Research Perspectives o Michael Otey o networking and hardware o Office and SharePoint o PowerShell with a Purpose o scripting o security o security matters o virtualization o Virtualization Pro Tips o Windows Automation o Windows OS and Deployment * FAQs o Exchange and Outlook Tips &Techniques o John Savill's FAQs o PowerShell FAQs o Virtualization FAQs o Windows Gatekeeper FAQs o FAQ Submittal Form * products & reviews o awards central o buyers guides o reviews * newsletters * Events o Conferences & Workshops o eLearning Seminars o Virtual Events o web seminars * community o Follow Us o Forums o User Group Central * resources o ebooks o essential guides o podcasts o tip guides o trials & downloads o videos & more o web seminars o white papers * international o europe * more o network monitoring management o hp virtualization o google apps cloud based infrastructure o MVP-system o Windows 7 o HP Intel Microsoft Unified Communications o VMware Desktop Virtualization with VMware View o Business services made simple + IT as a service made simple + IT as a Service Blog o doing windows 7 right o VMware Virtualizing Business-Critical Applications o VMware Virtualizing Exchange Polland Article o VMware Virtualizing Oracle Polland Article o VMware Virtualizing SAP Polland Article o Cloud Twitterview Paul Thurrott Sean Deuby Nov19 o Essentials Series Downloads * Subscribe Home » Passwords » How can I check the password of the IUSR and IWAM local accounts on a machine?

2009

Controversial Einstein systems to inspect U.S. government's Internet traffic - Network World

The largest U.S. carriers -- including AT&T, Qwest and Sprint -- are deploying special-purpose, intrusion-detection systems dubbed Einstein boxes in their networks as part of an 18-month-old effort to tighten security on federal networks.

Can you cut information security in hard times and survive? | ITworld

Forrester Research reports that 28 percent of companies that move to in-the-cloud managed security services do so to cut costs. Although e-mail and Web filtering are the most popular managed security services today, Forrester projects that more businesses will move to the cloud for vulnerability assessment and event monitoring as well.

Inside BBC's Chimera botnet | Zero Day | ZDNet.com

"Earlier this month, the controversial BBC purchase of a botnet and modifying the infected hosts in the name of “public interest” sparked a lot of debate on the pros and cons of their action. Condemned by certain security vendors, and naturally, at least from guerrilla PR perspective, applauded and encouraged as a awareness raising tactic by others, the discussion shifted from technical to moral and legal debate, leaving a single question unanswered - what is the name of the botnet that the BBC rented and what’s so special about it?

USA 2008 Briefings Speaker List

(via)
BH USA 2008 is now available for free download, and is in several formats, the first of which is a large, hi-resformat with video-sync speaker and presentation.

2008

dmiessler.com | study | tcpdump recipes

(via)
Tcpdump is the premier network analysis tool for information security and networking enthusiasts and/or professionals. In my own primer I cover tcpdump basics; if you're interested in becoming familiar with the application via an introduction, I suggest you check it out first. Here I'm simply going to give a number of recipes that you're likely to find useful during your day to day activities. They will range from common, general captures to complex filters designed to look for a number of unique traffic types.

Best Way To Find Iis Servers?

Beginners guide to DFind command syntax.

Overview to the Windows Server 2003 Security Guide

(via)
The Windows Server 2003 Security Guide provides specific recommendations about how to harden computers that run Microsoft® Windows Server™ 2003 with Service Pack 1 (SP1) in three distinct enterprise environments—one in which older operating systems such as Windows NT® 4.0 and Windows® 98 must be supported, one in which Windows 2000 is the earliest version of the Windows operating system in use, and one in which concern about security is so great that significant loss of client functionality and manageability is considered an acceptable tradeoff to achieve maximum security. These three environments are respectively referred to as the Legacy Client (LC), Enterprise Client (EC), and Specialized Security – Limited Functionality (SSLF) environments throughout this guide.

Aberdeen Group: Best Practices in Choosing and Consuming Managed Security Services

(via)
All Best-in-Class Companies use some managed security services and the number one reason organizations are pursing managed security services is to improve their security. Best-in-Class organizations report fewer security incidents, fewer malware infections, fewer incidents of data loss, greater reduction in fraud, fewer failed audits, and greater reduction in help desk costs associated with security events.

2007

Off-Network data greater risk than hackers

A study by Redemtech claims that "off-network security is the source of 75% of all data breaches". In other words the true enemy is not an outside hacker, but the careless employee within.

15 free security programs that work

by 1 other (via)
From firewalls to antivirus software to tools for combatting rootkits and spyware, here are some great downloads to protect your system against malicious attacks.

How To: Create a Custom Token

How to create a security token authentication scheme under WCF. Prior method in WSE3.0 is not compatible with the new foundation.

2006

brianwaustin's TAGS related to tag security

.net +   2000 +   active +   administration +   association +   black hat +   blog +   botnet +   business +   computer +   cool +   cybercrime +   daily +   database +   dfind +   digg +   distro +   firewall +   free +   google +   hacking +   hard +   internet +   it +   linux +   livecd +   microsoft +   NC +   network +   north_carolina +   office +   opensource +   patch +   phishing +   privacy +   programming +   reference +   series +   server +   service +   software +   ssl +   system +   tech +   technology +   this +   tips +   tools +   video +   voip +   vpn +   vulnerability +   war +   WCF +   web +   webservice +   wifi +   windows +   work +   wse +