Authentication, Access Control & Encryption

Last Updated on 10 May 2017, Total: 191 Articles and Tutorials

  1. A Microsoft PKI Quick Guide - Part 1: Planning

    How to design, install and troubleshoot a PKI (Public Key Infrastructure) based on Microsoft Certificate Services in Windows Server 2003... Read More

  2. A Microsoft PKI Quick Guide – Part 2: Design

    How to avoid common mistakes during the design phase... Read More

  3. A Microsoft PKI Quick Guide – Part 3: Installation

    How to install a PKI based on Microsoft Certificate Services in Windows Server 2003... Read More

  4. A Microsoft PKI quick guide – Part 4: Troubleshooting

    How to maintain and troubleshoot your PKI using some basic, but very valuable tools... Read More

  5. A best practice guide on how to configure BitLocker (Part 1)

    How to configure BitLocker and how to get BitLocker to rock in Windows Vista using best-practice methods... Read More

  6. A best practice guide on how to configure BitLocker (Part 2)

    A look at BitLocker from an Active Directory point of view and a look at BitLocker and TPM configuration using Group Policies and how to perform key recovery... Read More

  7. Access Controls: What is it and how can it be undermined?

    We have stoplights on city streets, and locks on the doors of our homes. What these things have in common is that they are access controls. The world of computer security is very much the same in that it employs various ways to limit access. In this article we will cover several ones and discuss their usage... Read More

  8. Accessing Active Directory Information with LDP

    In this article, the author will expose some security issues related to LDAP and Active Directory, using a free Microsoft tool called LDP.exe... Read More

  9. Anonymous Connections

    Is your network safe from intruders? With all of the different methods that intruders use to weasel their way into your network and servers, you can’t be sure. Hackers will use trojan horses, backdoors, compromised user accounts, and the front door. That is right, the front door! Ok, maybe a side door, but unless your Windows environment is protected, an... Read More

  10. Applying Certificates to a WSUS Server

    Many administrators tend to ignore the recommendation that WSUS be configured to use SSL encryption if the WSUS server is only servicing clients within the perimeter network. However, if SSL encryption is not used, a hacker could potentially steal the WSUS server’s identity and use the spoofed server to send malicious versions of patches to your clients. If you don’t... Read More