Search This Blog

Wednesday, April 23, 2014

WindowSecurity.com - Web Browser Security Revisited (Part 7)

WindowSecurity.com - Web Browser Security Revisited (Part 7)

Hi Security World,





Just Published
-----------------------------------------------------------------
Web Browser Security Revisited (Part 7) (on 23 April 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/web-browser-security-revisited-part7.html
For the past 6 articles, we’ve been talking about the current state of web browser security, both in general and as it applies to different popular browsers. We’ve covered specifics for the â€Ĺ“Big Three,â€� Internet Explorer, Chrome and Firefox. In this, Part 7, we’re going to wrap it up with the other two browsers that have statistically significant market shares: Apple Safari and Opera.



Recent Articles & Tutorials
-----------------------------------------------------------------
Readers' Choice Awards Yearly Round Up 2013 (on 17 April 2014 by The Editor)
http://www.windowsecurity.com/news/readers-choice-awards-yearly-round-up-2013.html
The winning solutions for the 2013 Readers' Choice awards.

How to Achieve an Effective Patch Management System (on 16 April 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/how-achieve-effective-patch-management-system.html
In this article the author looks at ways to achieve an effective Patch Management System.

Web Browser Security Revisited (Part 6) (on 9 April 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/web-browser-security-revisited-part6.html
In this article we'll look at some tips on how to best secure Mozilla Firefox.

Video: Auditing vs Advanced Auditing Configurations - Part 1 (on 2 April 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/windows_os_security/video-auditing-vs-advanced-auditing-configurations-part-1.html
Microsoft has added new auditing options to Windows Server 2008 R2/Windows 7 computers and above. The new auditing controls more granular areas of your computer, reducing the overall security log entries so you can audit more of what you want and less of what you don’t need. In this first part video we will look at the configurations of each audit policy to know where we can configure them.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2014. All rights reserved.

No comments: