Search This Blog

Thursday, September 01, 2011

WindowSecurity.com - Monthly Article Update

WindowSecurity.com - Monthly Article Update

Hi Security World,

New articles added to WindowSecurity.com last month:

Title: Operating System Fingerprinting with Packets (Part 1)
Author: Chris Sanders
Link: http://www.WindowSecurity.com/articles/Operating-System-Fingerprinting-Packets-Part1.html
Summary: In this article series I will describe active and passive OS fingerprinting, the concepts that make them plausible, and go through some examples of how to do this in a manual and automated fashion.

Title: Symantec Altiris Client Management Suite - Voted WindowSecurity.com Readers' Choice Award Winner - Patch Management
Author: The Editor
Link: http://www.WindowSecurity.com/news/WindowSecurity-Readers-Choice-Award-Patch-Management-Symantec-Altiris-Client-Management-Suite-Jul11.html
Summary: Symantec Altiris Client Management Suite was selected the winner in the Patch Management category of the WindowSecurity.com Readers' Choice Awards. WinINSTALL and GFI LANguard were runner-up and second runner-up respectively.

Title: Hunt Down and Kill Malware with Sysinternals Tools (Part 2) - Autoruns
Author: Deb Shinder
Link: http://www.WindowSecurity.com/articles/Hunt-Down-Kill-Malware-Sysinternals-Tools-Part2.html
Summary: In this Part 2, I will talk about how you can use Autoruns tool to find malware that boots at startup.

Title: Video: Leveraging the Windows Server Security Database
Author: Derek Melber
Link: http://www.WindowSecurity.com/articles/Video-Leveraging-Windows-Server-Security-Database.html
Summary: This video demonstrates how Windows Server 2008 Security Database could be used in server configuration.

Title: The future of computer and mobile security
Author: Ricky M. Magalhaes
Link: http://www.WindowSecurity.com/articles/The-future-computer-mobile-security.html
Summary: This article will take you through the mobile device management journey and how the holy grail of central device management is quickly being reinvented to ensure that your data, device and resources are safe.

Title: Security Considerations for the Private Cloud \IaaS (Part 1)
Author: Deb Shinder
Link: http://www.WindowSecurity.com/articles/Security-Considerations-Private-Cloud-IaaS-Part1.html
Summary: In this article, we will examine the different types of cloud service models and delivery models.

Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsecurity.com

Copyright © WindowSecurity.com 2011. All rights reserved.

No comments: