Hi Sul, Good thinking. I will first focus on finishing this project using WFW and either MSE or NOD32. After it's finished I'll consider if I...
I'm running out of time to finish the project. This is why I limit myself using software that supports UAC.
Actually the principle is from Roger Grimes' Professional Windows Desktop and Server Hardening, which I consider to be one of the best books...
I installed them under the administrative user. Logged off. Logged in as standard user. The security applications GUI part were started through...
My goal is to separate standard user and administrative user. Standard user can perform daily tasks and the administrative user can install...
I'm currently working on a security configuration for W7X64 Pro using local group policies, UAC and standard user accounts. I had composed a...
Issues with Adobe Reader: no tab support unneeded plugins, that can only be disabled by physically moving them to another folder air add-on...
I've been disabling this service since it was introduced in Windows 2000 Professional. I'm migrating from Windows XP to 7, so after more than 10...
This is not about the challenge, but about matasano's response to the source code. Edit: I also disagree, that everything can be found on...
No need to panic: we can trivially detect NBP on any mainstream operating system.
User mode stealth kit with keylogger can log the admin password when you use tools like runas to escalate your privileges. This can be...
The Password Safe project is very active and supports U3. Still on my evaluation list.
Take a look at Automatically Slipstream Windows XP with SP2 and All Post-SP2 Security Hotfixes with a Single Command or HFSLIP. This will take...
Software DEP can be evaded. Don't know about hardware DEP. Products implementing ASLR look more promising: Wehntrust has some unfixed issues:...
I just started reading Windows Desktop and Server Hardening by Roger Grimes. He was joking to name this book "Everyone Else's Windows Security...
This is a recurring topic on the security-basics mailing list. Search the archives for references. There are different routes. I would skip the...
2BrightSparks offers a broad range of solutions . My advise is to read through the solutions and apply the one that best matches your issue.
If the VSS service is failing it should write an error message to the application or system log. Run the command "eventvwr.msc" and review the...
How do you know which one is trusted?
This is the reason why I'm considering VideoLAN - VLC media player as an alternative for media players that require codecs. VLC supports a large...
Gmail already uses extensive file extension filtering and virus scanning. Anything that manages to get through will be scanned by EMON or AMON....
I'm not using (W)SUS and I also have this regkey on XP. It contains some values about the chipset. They are not ms sql, but use a similar...
Microsoft has made it a habit to launch different SQL server versions. Many MS products use SQL server like engines. For example Active Directory,...
In the past Ive used Dr Solomon's Toolkit. It was one of the most realiable AV. It's only problem was that it slowed down the computer too much....
I just quote Total Commander to any question where it applies. Total Commander's Multi Rename Tool Total Commander supports "files.bbs" and...
Separate names with a comma.