Windows OS Security

Last Updated on 8 June 2016, Total: 133 Articles and Tutorials

  1. Hidden Backdoors, Trojan Horses and Rootkit Tools in a Windows Environment

    Not every case of a successful intrusion is “crowned” with a replaced Web site on the server, data theft or damage. Often electronic intruders do not wish to create a spectacle but prefer to avoid fame by hiding their presence on compromised systems, sometimes leaving certain unexpected things. They use sophisticated techniques to install specific “malware” (backdoors) to let them... Read More

  2. Securing Windows 2000 Active Directory (Part 3) - Backup and Restoration

    In this article I will focus on the active directory process. As part of securing your active directory you need to ensure that as a contingency plan you are able to restore your active directory in event of disaster... Read More

  3. Securing Windows 2000 Active Directory (Part 2)

    Protecting active directory’s integrity is paramount. This is the second article in the two part series that focuses on active directory security. Active directory is the windows 2000 information repository that needs to be kept very secure. Active directory has vital service dependencies such as DNS which changes the scope of what needs to remain secure. I will focus on... Read More

  4. Securing Windows 2000 Active Directory (Part 1)

    Protecting active directory’s integrity is paramount. This article will focus on active directory security and will be written in two parts. Active directory is the windows 2000 information repository that needs to be kept very secure. Active directory has vital service dependencies such as DNS which changes the scope of what needs to remain secure. I will focus on actions... Read More

  5. Analysis of Buffer Overflow Attacks

    What causes the buffer overflow condition? Broadly speaking, buffer overflow occurs anytime the program writes more information into the buffer than the space it has allocated in the memory. This allows an attacker to overwrite data that controls the program execution path and hijack the control of the program to execute the attacker’s code instead the process code. For those... Read More

  6. Windows XP: Your Definitive Lockdown Guide

    In this article we will look at Windows XP Professional and what you need to do to be secure. After reading this, you may be surprised about some of the items you may have taken for granted! Let's take a look…... Read More

  7. New Internet Explorer 6.0 Security Features with the .NET Server default browser

    Windows .NET Server comes standard with Internet Explorer Version 6. You should be aware of the many security advantages you have with the new browser. This article, Robert Shimonski will show you what you can expect... Read More

  8. Windows .NET Server locks down “Everyone”

    Well, I thought I would never see the day that Microsoft actually followed up with industry on reversing their infamous “everything open” mentality with their Operating systems when first installed. Before .NET Server, everything was open to everyone by default. In this article let’s look at the major difference in default security settings with the Everyone Group... Read More

  9. Useful security tools/utilities for System administrators

    I have collected a number of useful tools for keeping a network secure. Note that this list is in no way exhaustive. Some of the tools are difficult to find, so you can download them right of this page. Please do not send any email asking support for these tools. For questions, please use the forums. PLEASE NOTE, I am... Read More

  10. The Netbus trojan

    This article gives background information on the various Netbus trojan versions, what they can do and how you can remove them from your system. It also allows you to download the program in order to analyse what it does... Read More

  11. Securing the Operating System and the Interface

    ISA Server is all about security. ISA is about securing network access into and out of the internal network. But after you’ve done all of your configuring, how do you know that you’ve done an adequate job of securing the internal network and the system that ISA Server is running on?... Read More

  12. Windows XP Professional Edition: Local Security Policies

    Windows XP Professional Edition allows full User Management and Security. The permissions assigned to the Usergroups (assigned in User Management to users) are defined in the Local Security Policies:... Read More

  13. Security concerns on Internet connections (Dialup-Connection to the Internet)

    Please be aware of a serious security issue, in case your system is connected to a local network and is also configured to use Dialup-networking for connection to the Internet... Read More