programming4us
programming4us
SECURITY
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 >  |  Displaying page 2 of 12, items 41 to 80 of 444.
Web Security : Automating with LibWWWPerl - Uploading Malicious File Contents, Uploading Files with Malicious Names
You want to test how your application handles files with malicious content. The content might be malicious because of its size, because it is not the required type, or because it actually causes the application to crash when it is processed.
Windows Server 2008 and Windows Vista : Controlling GPOs with Scripts and Automation - VBScript Scripting , Windows PowerShell
Windows PowerShell is one of the hottest topics and technologies for management of Windows today. This new technology was created from the ground up for Microsoft operating systems and it is proving to be a powerful, easy-to-follow, and widely used solution for Windows command-line automation.
Windows Server 2008 and Windows Vista : GPO Security (part 2)
This script grants the specified permission for the security principal specified to all GPOs in the SOM of the site, domain, or organizational unit targeted. Complete control is allowed with this script and switches; the Replace, None, and Recursive options allow you to tailor your permission and scope of the permission.
Windows Server 2008 and Windows Vista : GPO Security (part 1)
The Replace switch is very useful—it can remove the existing permissions and replace them with new permissions. If you specify a permission for a security group that already exists on the permission list for the GPO, the higher of the two permissions will be placed on the security group.
Windows Server 2008 and Windows Vista : Advanced Group Policy Management Delegation - Approving, Reviewing
Only users who have been granted the Approver permission will be able to perform some of the more advanced actions in AGPM. The ability to create a new GPO and the ability to deploy a GPO to the production environment are both examples of tasks that require the Approver permission, such as approving a pending GPO.
Windows Server 2008 and Windows Vista : Advanced Group Policy Management Delegation - Full Control, Editing
When a user is granted full control over all GPOs in the domain or an individual GPO that has been controlled in AGPM, that user can control every aspect of the GPO. This includes editing, viewing, and approving changes and deployment of the GPO into production.
Windows Server 2008 and Windows Vista : Group Policy Management Console Delegation - Modeling GPOs, RSoP of GPOs
The delegation to model the GPOs is useful for all IT staff members, including the Help desk, desktop management, and even personnel management.
Windows Server 2008 and Windows Vista : Group Policy Management Console Delegation - Managing GPOs, Editing GPOs
The management of GPOs is not referred to as Management in the GPMC; rather, it is referred to as Edit Settings, Delete, Modify Security, as shown in the details pane in Figure 1. This level of delegation is very powerful—a user granted this delegation can do anything to the GPO, except create it and link it to a node.
Windows Server 2008 and Windows Vista : Group Policy Management Console Delegation - Linking GPOs
Linking GPOs to nodes in Active Directory is not a domain centric task. This is because GPOs can be linked to more than the domain node, which you most likely already know. GPOs can also be linked to Active Directory sites and organizational units. With this array of options, scoping of the delegation for linking GPOs is important.
Windows Server 2008 and Windows Vista : Group Policy Management Console Delegation - Creating GPOs
The ability to create a GPO is controlled at the domain level. This makes sense, because all GPOs are domain centric and specific. The actual configuration of who can create a GPO is not implemented at the domain node in the GPMC, although it is a domain scope that is being considered.
Windows Server 2008 and Windows Vista : Security Delegation for Administration of GPOs - Default Security Environment
The default security configuration for administering Group Policy in Windows Server 2008 is similar to that in Microsoft Windows Server 2003. Of course, the changes from Microsoft Windows 2000 Server to Windows Server 2003 were substantial, because the GPMC was introduced with Windows Server 2003.
Programming WCF Services : Security - Intranet Application Scenario (part 7) - Identity Management, Callbacks
In the intranet scenario, after successful authentication, WCF will attach to the operation thread a principal identity of the type WindowsIdentity, which will have the value of its Name property set to the username (or Windows account) provided by the client.
Programming WCF Services : Security - Intranet Application Scenario (part 6) - Authorization
While authentication deals with verifying that the client is indeed who the client claims to be, most applications also need to verify that the client (or more precisely, the identity it presents) has permission to perform the operation.
Programming WCF Services : Security - Intranet Application Scenario (part 5) - Impersonation - Impersonating all operations, Restricting impersonation
Authorization and authentication protect the service from being accessed by unauthorized, unauthenticated, potentially malicious clients.
Programming WCF Services : Security - Intranet Application Scenario (part 4) - Impersonation - Manual impersonation , Declarative impersonation
ImpersonationOption.Allowed instructs WCF to automatically impersonate the caller whenever Windows authentication is used, but it has no effect with other authentication mechanisms. When WCF auto-impersonates, it will also auto-revert to the previous service identity once the method returns.
Programming WCF Services : Security - Intranet Application Scenario (part 3) - Identities, The Security Call Context
All Windows processes run with an authenticated security identity, and the process hosting a WCF service is no different. The identity is actually a Windows account whose security token is attached to the process (and to every thread in the process).
Programming WCF Services : Security - Intranet Application Scenario (part 2) - Constraining Message Protection, Authentication
When the service receives the call, WCF will authenticate the caller on the service side. If the client’s credentials represent a valid Windows account, the caller will be allowed to access the requested operation on the service.
Programming WCF Services : Security - Intranet Application Scenario (part 1) - Securing the Intranet Bindings
For the intranet scenario, you should use the intranet bindings: namely, NetTcpBinding, NetNamedPipeBinding, and NetMsmqBinding. You can rely on Transport mode for transfer security because the calls are invariably point-to-point.
Programming WCF Services : Security - Identity Management, Overall Policy, Scenario-Driven Approach
Each of the items in the list may have a dozen or more security-related properties. Obviously, there are an overwhelming number of possible combinations and permutations.
Programming WCF Services : Security - Transfer Security
When configuring any of the HTTP bindings for Transport security, WCF verifies at the service load time that the corresponding address on the endpoint uses HTTPS rather than mere HTTP.
Hidden Security Tools You Must Use
Avast Free Antivirus 2013 (www. snipca.com/8934) is highly efficient but it comes with heaps of junk. Opt out of the Google extras during a standard Avast installation by un-ticking them. Use Custom Install, Next, Custom to deselect all unwanted components.
How To Find And Follow The Best Backup And Password Strategies (Part 3)
First connect your Time Machine drive. Then start up your Mac from the Mountain Lion recovery partition by pressing (and holding) z-R at startup. This action launches Recovery Mode, a portion of your drive that Mountain Lion treats as a separate volume. It includes a few essential utilities for restoring files in case of a problem.
How To Find And Follow The Best Backup And Password Strategies (Part 2)
If you’re already backing up your Mac – perhaps by following the steps in the previous section – pat yourself on the back. Having any sort of backup is better than having none, and it dramatically increases your chances of recovering from data loss.
How To Find And Follow The Best Backup And Password Strategies (Part 1)
It doesn’t have to be. You can set up some backup plans once, in about 10 minutes, and then forget about them as they run here to eternity. If, on the other hand, you’re paranoid about data security, it isn’t much harder to set up a backup system that’s practically bullet-proof, with multiple layers of redundancy that will make it possible to restore not only your Mac but also one or two tiers of your backups when disaster strikes.
Too Many Passwords? Let’s Simplify & Secure Your Digital Life
In the past couple of years, attacks on Gawker.com and LinkedIn resulted in hackers gaining access to millions of passwords. The incidents have heightened awareness for the importance of using strong passwords, as these and other websites have advised users to change their passwords to something different (at least) or something difficult-to-guess and even potentially unique (even better).
The Other Half Of The Security Equation (Part 2)
Some experts argue every data center should have man traps installed. Others argue they’re effective if staffed and used properly but are not necessary for every data center. Regardless, a man trap offers a low-tech method of authorizing those entering the facility, as it uses two doors separating a contained space.
The Other Half Of The Security Equation (Part 1)
Throwing technology at the problem isn’t enough, though. As Jenna Maertz, research analyst with Info-Tech Research Group (www.infotech.com), says, “Technology fails. Embrace this mantra when designing your security strategy. You can have the newest and shiniest technology in place, and a security breach can still occur.
Ultimate Security Suites Showdown (Part 4)
The security software market is highly competitive, and it showed in our test results, where no suite detected less than 97.8 percent of recent known malware samples, or blocked less than 94.4 percent of new malware in our real-world attack-blocking tests. False positives were also largely a non-issue. But if you look closely, you can find some difference among the suites.
Ultimate Security Suites Showdown (Part 3) : Bitderfender Internet Security 2013, Kaspersky Internet Security 2013
Bitdefender Internet Security 2013 ($66 for one year and three PCs) may just be everything that you’d want in a security suite. This program, which earned the highest rating in both our real-world attack test and our system cleanup test, has a user-friendly interface that will appeal to both regular and advanced users
Ultimate Security Suites Showdown (Part 2) : Norton Internet Security, Trend Micro Titanium Internet Security 2013
Symantec’s 2013 edition of Norton Internet Security ($73.5 for one year and three PCs) is a solid performer with a polished, touch-optimized user interface. This security suite didn’t totally dominate its competitors, but it did completely block, detect and disable all malware in our rear-world tests, and it performed well enough overall to snag second place in our round-up.
Ultimate Security Suites Showdown (Part 1) : F-Secure Internet Security 2013
F-Secure Internet Security 2013 ($58.5 for one year and three PCs) came in first in several of our malware-detection, -blocking and removal tests. It successfully blocked attacks, detected and disabled infections, and proved adept at cleaning up all traces of malware.
Are Your Passwords Safe? (Part 4)
When you create a password, you might choose to store it in a password manager, write it down, or commit it to memory. Sometimes, however, things go wrong: You find yourself without access to your password manager, you lose the paper on which you recorded you passwords, you forget a password you thought you had memorized, or you remember it wrong too many times and get locked out of the account.
Are Your Passwords Safe? (Part 3)
Ever since Mac OS 8.6, the Mac has managed passwords with Keychain, Apple’s password-management system. The Keychain Access application (/Applications/Utilities) is the front-end to that system. It stores a wide range of items including passwords for email, websites, servers, network shares, Wi-Fi networks, and encrypted disk images.
Are Your Passwords Safe? (Part 2)
Once you know which passwords you need to memorize, your next job is to choose passwords that are strong enough to defeat automated hacking attempts yet memorable enough that you can produce them instantly and for bonus points, they should be convenient to type.
Are Your Passwords Safe? (Part 1)
If you haven’t examined your approach to making and using passwords recently, now is a good time to rethink your assumptions. Here are a few important facts about passwords you may not have realized and what they mean for you.
10 Contenders For The 'Ultimate Protector' Crown (Part 5) : Microsoft Security Essentials 4.1, AVG Antivirus Free 2013
Move along, Windows 8 users, there’s nothing for you to see here. Windows 8 already has its own built-in antivirus solution called Windows Defender, which acts more like MSE than like Windows Defender on older versions of Windows, Microsoft claims.
10 Contenders For The 'Ultimate Protector' Crown (Part 4) : Norton Internet Security, Avast Free Antivirus Version 7
For some, a paid security suite is a luxury that just doesn’t fit within the budget. Luckily, there are programs like Avast you can enlist as your PC’s personal bodyguard for nothing in return.
10 Contenders For The 'Ultimate Protector' Crown (Part 3) : Eset Smart Security 6, Kaspersky Internet Security 2013, Zonealarm Internet Security 2013
ESET Smart Security 6’s dashboard is largely unchanged from versions 4 and 5 in appearance. It consists of a main window with a handful of navigational prompts in the left-hand pane including Home, Computer scan, Update, Setup, Tools, Help and support, and Training.
10 Contenders For The 'Ultimate Protector' Crown (Part 2) : Bitdefender Total Security 2013, Trend Micro Maximum Security, Mcafee Internet Security 2013
This year's build is redesigned with a touch-friendly tiled interface that’s obviously geared toward Windows 8 users, though it functions just fine with a mouse and keyboard and on Windows. All the main functions sit front and center, and it doesn’t take much effort to dig beneath the surface to where the advanced controls are located.
10 Contenders For The 'Ultimate Protector' Crown (Part 1)
As a consumer, the natural reaction is to look at these reports with a fistful of salt and a sack of skepticism after all, AV vendors have a vested interest in promoting a need for security software, but are we really as vulnerable as they say? It all depends on your computing habits, but make no mistake, the web is a dangerous place to roam.
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
programming4us
 
 
programming4us