Network Security

  • Challenges of Managing Data Security: Causes and Effects of Data System Failures

    This is the final article in the series on data security incident management. This focuses on how to manage data security systems and the causes and effects of data systems or network system failures in a company.
    By Tom Olzak, CISSP July 4, 2011 

  • LogonSessions and PsLoggedOn to Oversee and Manage System Access

    Sometimes a script or other application providing automatic management oversight over end-user devices or servers needs session and logon data. Two free utilities provide the functionality necessary to achieve these outcomes in a Microsoft Windows environment...
    By Tom Olzak, CISSP July 4, 2011 

  • Manage, Monitor, and Kill Windows Processes with Process Explorer

    Microsoft's task manager is fine for high-level looks at running processes. However, we often require a deeper look into process resource use, dependencies, registry entries, executable paths, etc. Process Explorer, a free Sysinternals download, provides...
    By Tom Olzak, CISSP July 4, 2011 


  • Validate System Access with AccessChk

    AccessChk is a free utility, which allows you to quickly assess access to folders, files, processes, or services on Windows workstations or servers.
    By Tom Olzak, CISSP July 4, 2011 

  • Map System Configs with PsInfo

    PsInfo is a free, downloadable utiliy which enables both local and remote Windows platform configuration retrieval.
    By Tom Olzak, CISSP July 4, 2011 

  • Enumerate Windows File and Folder Access with AccessEnum

    AccessEnum is a member of the free Sysinternals security utilities suite. It allows system administrators to list individual accounts with READ, WRITE, and DENY permission to files, folders, and registry entries. It can also report on security changes...
    By Tom Olzak, CISSP July 4, 2011 


  • Use SigCheck to Validate System Files

    Knowing the system files and other application components on your computer are genuine is an important part of troubleshooting anomalous behavior or cleaning critical systems. It can also come in handy when determining who to blame when your computer...
    By Tom Olzak, CISSP July 4, 2011 

  • Reducing the Damage Caused by Network Security Threats and Identifying Attackers

    In the previous articles in this series, we looked at preparing for incidents and how to detect and analyze them when they happen. In this article, we examine how to contain a network security threat agent, minimizing the impact to a business.
    By Tom Olzak, CISSP July 4, 2011 

  • PSExec: Free Security Testing and System Management Tool

    PSExec is a free Sysinternals utility. With it, system administrators can manage remote desktops via scripts or command line. Security analysts can use it to test system vulnerabilities.
    By Tom Olzak, CISSP July 4, 2011 

  • Creating a Business Continuity Plan: 5 Steps

    Business continuity planning is essential to make sure you stay in business! There are five phases to business continuity assurance: analyze your business, assess risks, develop a strategy and plan, test the plan, and manage the results. We'll...
    By Tom Olzak, CISSP July 4, 2011 
showing 21-30 of 154    < Previous  |  page: 1 2 3 4 5 ...  |  Next >