Friday, July 01, 2011

WindowSecurity.com - Monthly Article Update

WindowSecurity.com - Monthly Article Update

Hi Security World,

New articles added to WindowSecurity.com last month:

Title: Security Considerations for Infrastructure as a Service Cloud Computing Model
Author: Deb Shinder
Link: http://www.WindowSecurity.com/articles/Security-Considerations-Infrastructure-Service-Cloud-Computing-Model.html
Summary: This article takes a look at the requirements for a cloud computing solution.

Title: Kaspersky Security for Mail Server - Voted WindowSecurity.com Readers' Choice Award Winner - Email Anti Virus
Author: The Editor
Link: http://www.WindowSecurity.com/news/WindowSecurity-Readers-Choice-Award-Email-Anti-Virus-Kaspersky-Security-for-Mail-Server-May11.html
Summary: Kaspersky Security for Mail Server was selected the winner in the Email Anti Virus category of the WindowSecurity.com Readers' Choice Awards. BitDefender Antivirus 2010 and GFI MailSecurity for Exchange/SMTP were runner-up and second runner-up respectively.

Title: Well-Known SIDs for Windows Server 2008 R2 Active Directory
Author: Derek Melber
Link: http://www.WindowSecurity.com/articles/Well-Known-SIDs-Windows-Server-2008-R2-Active-Directory.html
Summary: This article will discuss what a SID is. Then, it continues to discuss why some SIDs are well-known, and the concept and technology of SIDs.

Title: Hunt Down and Kill Malware with Sysinternals Tools (Part 1)
Author: Deb Shinder
Link: http://www.WindowSecurity.com/articles/Hunt-Down-Kill-Malware-Sysinternals-Tools-Part1.html
Summary: This article is part one of a two-part series on using Sysinternals tools to manually detect and clean malware from a Windows system.

Title: The Advanced Persistent Threat - What Is It and How Does It Affect Me?
Author: Derek Melber
Link: http://www.WindowSecurity.com/articles/Advanced-Persistent-Threat-What-How-Does-Affect-Me.html
Summary: In this article, we'll explore the concepts behind APT and introduce you to the different pieces of the puzzle – the actors, the threats and the techniques.

Title: Cloud computing, can we trust it and how can it be used whilst being secure
Author: Ricky M. Magalhaes
Link: http://www.WindowSecurity.com/articles/Cloud-computing-can-we-trust-how-can-be-used-whilst-being-secure.html
Summary: In order to make an informed decision on using cloud computing, one should look carefully at the advantages of using the cloud and the disadvantages, being the security risks it might entail. Do the risks outweigh the benefits or vice versa?

Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsecurity.com

Copyright © WindowSecurity.com 2011. All rights reserved.

No comments:

Post a Comment