xwing_fighter, I'll try that. My major concern with any of the storage products I have been using was Diskeeper running on a Set & Forget...
Hi Pete, With a DVD burner you don't need that many CD's. With dual layer becoming affordable the number of DVD's will also be limited....
I had the same idea using v1.5, but couldn't disable it. After reading the comments about sunserver on TASK LIST PROGRAMS — S I finally gave up.
See revised post 30-dec-2005 I've posted to this topic because the System Restore Alternatives? only covers System Restore. While trying to...
I'm currently testing on a clean test system. After I've selected a set of programs I'll continue testing on a production machine. This also...
I guess it depends to what policies - like Sarbanes-Oxley - Google has to comply.
I'm currently evaluating various antispyware programs and tried to find some independent test results. For every antispyware program you can find...
I've implemented the Astaro on our company network since since two - three years. Since then upgraded from 4.x to 5.x and planning to upgrade to...
Hoglund also published a book called "Exploiting Software : How to Break Code" The book is written by the same person who initially published...
We've experienced the same behaviour on our w2k terminal servers. See http://archives.neohapsis.com/archives/ntbugtraq/2003-q1/0170.html and...
I've used Stinger often for corporate users that didn't have any or an up-to-date AV on their home systems. Stinger was an adequate and free tool...
The "Sleeper Agent" model of attack technology revolves around the core ingredient of any infiltration model from the assassin to the intelligence...
There always have been AV vulnerabilities. Most notoriously in decompressing engines. I don't see a widespread exploit of these vulnerabilities...
I and Jimmy from former Becky's Forum predicted the rise of Windows rootkits in 2001 or 2002 ;D
I'm using a VIA VT6410 controller, but without S-ATA drives. Why do you want to use MS-DOS based tools? I'm evaluating Drive Snapshot, which...
I don't keep statistics, but the most popular extensions - besides .exe - I've seen are .com, .pif and .scr
To lock a harddisk you can try WriteProt. To encrypt TrueCrypt. Both are free or Open Source.
The Adobe® Reader® 7.0.2 update addresses several known issues in Adobe Reader 7.0.1 software. This multilingual update can be applied to any...
Do you mean they become too convenient?
"DELL OEM XP Processional has a default hidden administrator account. Use of this account will allow anyone with physical access to the computer...
I don't believe in strong passwords, especially for my users. As soon as they are forced to use strong passwords, they can't remember them and...
We have compared VMware Workstation and GSX with MS Virtual Server. We have chosen VMware Workstation, because GSX is more expensive and Virtual...
Thanks for posting. I'm working on a project to harden Windows XP SP2 using a scripted unattend installation and the more resources on LUA the...
I've been running this for three years with DrWeb AV and alternative browser, until I moved and had to install a wireless router (with WPA)....
Full story Source: ISN
Separate names with a comma.