Mark Burnett

Mark Burnett (mburnett@xato.net) is an independent consultant specializing in Windows security. He is a Security MVP and the author of several books, including Perfect Passwords and Hacking the Code (Syngress). Visit Mark’s blog at xato.net.

Articles by Mark Burnett
Securing Hyper-V
Hyper-V introduces some unique security risks that you should address to prevent the host machine and guest OSs from being compromised.
Microsoft DNS vs. BIND
A comparison of the merits of Microsoft DNS and BIND for security.
Secure Your DNS Servers 1
DNS has been around forever, so it can be easy to forget how vital a properly configured DNS server is for stopping DoS and other attacks. A few steps can secure your DNS implementation, whether you use Microsoft DNS or BIND.
Tips for Securing WordPress
A hacked blog can be a PR nightmare. Stop it from happening to you by taking some precautions: Use SSL for administration, and set correct permissions.
15 Tips for VMware Security
Protect your virtual machine host and guests by isolating them from the rest of your network and each other.
NTFS Secrets
Seven nuggets of information about how the Windows file system actually works in practice will save you time and frustration when working with file permissions.
Bounce Unwanted Files Out of Your Folders
A new file screening tool in the Windows 2003 R2 File Server Resource Manager toolset lets you block certain files or file types from entering a folder or notify an administrator about the files and take some action.
Windows Firewall Auditing
Regularly auditing the firewall configuration settings for the systems you manage keeps accumulated misconfigurations from compromising your protection. A useful script lets you easily audit your systems’ firewall configurations.
DNS Annoyances
Get a handle on DNS annoyances--small but irritating problems that can affect the performance of your network--and use DNS to its full potential.
More DNS Tips
Besides just plain DNS annoyances, we have some great tips for working with DNS.
Hardening Service Applications
Harden third-party software and reduce your security risk—create a user account for your software application to run on and grant it only the privileges necessary to do its job.
How I Secured One Company's Network
Here's one way to secure a network while maintaining usability—using virtual machines, a virtual network, and Log Parser, and preinstalling common ActiveX components.
DNS Threats
Learn about the most common threats that plague typical DNS infrastructures.
Segregate Your DNS Servers 1
The key to effective DNS design in the enterprise is to segregate DNS servers into distinct roles. Here's how to set it up.
A Real-World Network Makeover
Thinking of a complete network makeover? This article walks you through the process at a wireless ISP called UtahWISP.
NEW: Microsoft Hyper-V Master Class with John Savill

A new Master Class with John Savill! Get 12 hours of detailed instruction covering all the key aspects of a Hyper-V based virtualization environment.

During this training attendees will learn how to:

-- Architect a Hyper-V based virtualization solution.
-- Migrate from physical and other virtualization environments.
-- Implement a private cloud solution.

Thursdays, April 17th through May 8th
 

Upcoming Training

Microsoft’s Mobility Options in Exchange, Configuration Manager, and Windows Intune

Wednesday, April 23rd @ 11am, 1pm, 3pm ET

Join Peter Daalmans for three technical sessions that will teach you what Mobile Device Management options Microsoft currently provides in Exchange Server 2013, Windows Intune, and System Center 2012 R2 Configuration Manager. Learn how these solutions can be used together to get a grip on your daily growing mobile workforce.

Enroll by April 16th and SAVE 15%
View All Online Training

IT/Dev Connections

Register now to get the best rates available!

Current Issue

April 2014 - The architectural components related to Hyper-V networking in System Center Virtual Machine Manager 2012 R2 can be confusing. Walk through all the VMM networking architectural components and how to use them.

CURRENT ISSUE / ARCHIVE / SUBSCRIBE

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×