Mark Burnett


Mark Burnett ( is an independent consultant specializing in Windows security. He is a Security MVP and the author of several books, including Perfect Passwords and Hacking the Code (Syngress). Visit Mark’s blog at

Securing Hyper-V
Hyper-V introduces some unique security risks that you should address to prevent the host machine and guest OSs from being compromised.
Microsoft DNS vs. BIND
A comparison of the merits of Microsoft DNS and BIND for security.
Secure Your DNS Servers 1
DNS has been around forever, so it can be easy to forget how vital a properly configured DNS server is for stopping DoS and other attacks. A few steps can secure your DNS implementation, whether you use Microsoft DNS or BIND.
Tips for Securing WordPress
A hacked blog can be a PR nightmare. Stop it from happening to you by taking some precautions: Use SSL for administration, and set correct permissions.
15 Tips for VMware Security
Protect your virtual machine host and guests by isolating them from the rest of your network and each other.
NTFS Secrets
Seven nuggets of information about how the Windows file system actually works in practice will save you time and frustration when working with file permissions.
Bounce Unwanted Files Out of Your Folders
A new file screening tool in the Windows 2003 R2 File Server Resource Manager toolset lets you block certain files or file types from entering a folder or notify an administrator about the files and take some action.
Windows Firewall Auditing
Regularly auditing the firewall configuration settings for the systems you manage keeps accumulated misconfigurations from compromising your protection. A useful script lets you easily audit your systems’ firewall configurations.
DNS Annoyances
Get a handle on DNS annoyances--small but irritating problems that can affect the performance of your network--and use DNS to its full potential.
More DNS Tips
Besides just plain DNS annoyances, we have some great tips for working with DNS.
Hardening Service Applications
Harden third-party software and reduce your security risk—create a user account for your software application to run on and grant it only the privileges necessary to do its job.
How I Secured One Company's Network
Here's one way to secure a network while maintaining usability—using virtual machines, a virtual network, and Log Parser, and preinstalling common ActiveX components.
DNS Threats
Learn about the most common threats that plague typical DNS infrastructures.
Segregate Your DNS Servers 1
The key to effective DNS design in the enterprise is to segregate DNS servers into distinct roles. Here's how to set it up.
A Real-World Network Makeover
Thinking of a complete network makeover? This article walks you through the process at a wireless ISP called UtahWISP.
John Savill's Microsoft Stack Master Class

Join John Savill for the ALL NEW Microsoft Stack Master Class!

Get 30 hours of detailed instruction covering the complete Microsoft solution stack. Invest a few hours each week and become THE Microsoft expert in your organization.

Thursdays, October 8th to December 17th

John will cover topics including:

* Key Features of Active Directory for every version of Server OS, including Windows Server 2012 R2 and Windows Server 2016
* Key elements of Microsoft System Center 2012 and System Center 2012 R2 PLUS major changes in the 2016 wave
* Deploying, Migrating to, and Managing Hyper-V in Your Organization
* Implementing a Private Cloud
* Using PowerShell to Automate Common tasks
* Key Windows 10 changes including the new Start menu, Cortana, Microsoft Edge, and more
* And much more!


Enroll by October 1st and SAVE $245!



Windows Forums

The Windows IT Pro forums are moving to! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×