Prepare for the worst and have the Recovery Console installed prior to any serious setbacks.
- By Jeffery Hicks
- 02/07/2007
How Skype & Co. get 'round firewalls. Plus: PHP security, phishing facts and passwords in plain sight.
Using the GUI to scan your event logs can take some time. Find it faster with a Get-EventLog cmdlet.
- By Jeffery Hicks
- 01/31/2007
How to keep your Windows XP clock on time, even through the Internet Connection Firewall.
- By Zubair Alexander
- 01/30/2007
Adding a GUI to your scripting work with KiXforms, part 2.
Plus: secure e-transactions, baseless Russian hacker hysteria, more.
String along those Powershell expressions using this nifty trick.
- By Jeffery Hicks
- 01/24/2007
Here's a tool that lets you quickly audit a user's Firefox browsing history.
I have my own set of question from an online debate regarding how Windows Vista implements copy protection and digital rights management.
Another nifty command line management tool, the Group Policy Time Utility, from the GPO Guy.
- By Jeffery Hicks
- 01/17/2007
Also: NASA hacked, and a password discovery tool that might be </i>too<i> </i>good.
Apply policies throughout your network without requiring users to reboot or log off their systems.
- By Jeffery Hicks
- 01/10/2007
Also: How Argonne Labs got users to help clean up network security.
Here's how to check and enable permissions inheritance for user objects in AD.
Plus: participate in ICSA Labs' security surveys.
Slay the documentation dragon with a few of these nifty tricks.
- By Jeffery Hicks
- 01/03/2007
With this tool, you can easily scan a user's Internet Explorer browsing history.
Judith Hurwitz, Robin Bloor, Carol Baroudi and Marcia Kaufman explain Service Oriented Architecture in this book for "Dummies."
Strategies for managing disk space in a virtual environment.
- By Greg Shields
- 12/26/2006
Back up those objects faster than a speeding bullet.
- By Jeffery Hicks
- 12/26/2006