Columns


Scripting to the Core

In the next series of columns, we'll cover some core scripting techniques. First up: concatenation.

Backup Daemon Vulnerabilities

Patches are released for flaws in Veritas backup daemons, Florida banks are phished, the new Sun Grid is attacked by bots, and the Feds lose computers.

When the Firewall Burns

Some troubleshooting tips I learned while working with the seemingly simple Windows Firewall

Why Phishing Sites Work

According to a recent study, user education may indeed be the only solution.

From Verifying to Vandalizing

Is Driver Verifier preventing your system from booting? Here's how to shut it off.

U.S. Looks at Tougher Hashing Algorithms

Plus Sendmail vulnerability, Visa warning, security issues down under and more.

RFID Viruses Imminent?

Researchers warn of possible RFID viruses, but Russ says phooey. Also: invisible Web sites, search engines and subpoenas, and Ernst & Young loses a laptop full of sensitive info on IBM workers.

Examine Your Security Risks

Take this Microsoft survey to assess your organization's security.

Troubleshooting Tools for Everyone's Budget

With some free troubleshooting tools, you definitely get much more than you pay for.

Roll Call

A handy script that can list each computer and list its latest service pack.

Windows Security: Thinking Beyond the Day-to-Day Hype

Why you shouldn't be worrying about many of the recently reported Microsoft vulnerabilities. Really.

Locating HTTP 500 Errors

Run this script to find all the HTTP 500 errors on your Web site.

Virtual PC MAC Address Malfunction

Here's how to prevent duplicate Virtual PCs from using the same MAC address.

Review: PC INSPECTOR smart recovery

Recover files with this highly recommended freeware tool.

Skype Security Hype?

Findings show that the popular VoIP service is full of security problems -- some of which are intentional.

Would You Install a Windows Patch From This Man?

Security fixes you obtain from the official source or a third party should still undergo the same scrutiny as any software you'd roll out to the troops.

Data Execution Prevention

WinXP SP2 stops unauthorized code, like malware, from running off system memory.

Virtual Network Sniffing Summary

Here’s how to monitor and capture data on virtual networks.

IE Does What You Script

Reader asks for script to open IE and dump page contents into a text file. Don obliges.

Legal Implications of Google Desktop

An online file storing feature for users, though secure, could get Google stuck in other people's legal quagmires.

Most   Popular