Authentication, Access Control & Encryption

Last Updated on 10 May 2017, Total: 191 Articles and Tutorials

  1. Digital Signatures

    In this article I will clarify what a digital signature is and will demonstrate ways of using this technology to validate the identity of a user. The internet is filled with fraudulent villains that can take you or your organization to the cleaners, without you even knowing about it till it’s too late... Read More

  2. Securing Remote Access Connections

    Today many companies are enjoying the cost savings inherent in allowing some employees to work from home, while those employees benefit from the convenience of telecommuting. In addition, executives, salespeople and others need to connect to the company network when they go on the road, and/or need to access network resources in the evenings or on the weekends from home... Read More

  3. Passwords: the Weak Link in Network Security

    In this article, we will discuss how passwords work, why and how passwords are vulnerable, how to create more secure passwords, how to create effective password policies, and some alternatives to password-only authentication for high security environments... Read More

  4. Where Does EFS Fit into your Security Plan?

    The ability to encrypt data – both data in transit (using IPSec) and data stored on the disk (using the Encrypting File System) without a need for third party software is one of the biggest advantages of Windows 2000 and XP/2003 over earlier Microsoft operating systems. Unfortunately, many Windows users don’t take advantage of these new security features or, if... Read More

  5. Understanding the Role of the PKI

    The Public Key Infrastructure is a concept that is discussed frequently in the IT security world, but is not always well understood. Most of us know that the PKI is used for authentication and has something to do with public key pairs, but many only vaguely understand how the components of a PKI work together and the differences between private... Read More

  6. SSH: Using Secure Shell for Windows

    In this article, we will look at Windows based Security tools that have always been heavily used on Unix based systems, and not used as often on Windows based systems... Read More

  7. SSH

    When I started using the Internet during my University days, an intelligent friend of mine told me that SSH is a client application needed to build up a secure connection with the University’s server. I took his word for it, but later my curiosity prompted me to ask a question “Why?”... Read More

  8. Secure Socket Layer

    Security of data in transit over the Internet becomes increasingly necessary because of steadily growing data volume and importance. Nowadays, every user of a public network sends various types of data, from email to credit card details daily, and he would therefore like them to be protected when in transit over a public network. To this end, a practical SSL... Read More

  9. How to Block Dangerous Instant Messengers Using ISA Server

    I get a lot of questions about how can ISA Server be used to block dangerous applications. What is a dangerous application?... Read More

  10. Windows XP: Access control via Security

    Windows XP Professional offers (in addition to the User Access control in Network Sharing) also the possibility to control access to file via Security:... Read More

  11. Enforcing Network Login via POLEDIT

    This procedure is more detailed than actually required, because I use it also as an example on usage of the "System Policy Editor" ( POLEDIT ) on the local Registry and on downloading a profile from the Network server... Read More