Roger Grimes

Roger
Grimes

Roger A. Grimes is a security consultant. He is a CPA, a CISSP, a CEH, a CHFI, a TICSA, and an MCSE: Security.

Articles
Laying a Malware Trap
If you want to catch that latest virus that's going around (to learn more about it), here are four methods you can use: port listeners, tarpits, honeypots, and virtual machines.
Taking It to the Worm
: A counterattack script was used by some administrators to try to stop the onslaught of the MSBlaster worm.
Keeping Your Business Safe from Attack: Passwords and Permissions
Keeping Your Business Safe From Attack: Passwords and Permissions is a prescriptive guide on implementing security best practices in a Windows network environment. The eBook details password and permission security at the host level.
Prevent Password Cracking
Attackers are out to get your passwords using the latest password cracking technology and tools. Here are 10 things you can do to prevent password cracking.
Types of Password Attacks 1
Learn how to protect your Windows logon passwords from password cracking. Check out the commonly used types of password attacks and use them to audit your password security.
Navigating the File System Permission Jungle 4
Windows' object-access control mechanism is so granular that it can be hard to work with. Here's a guide for cutting through the complexity and properly securing folders and files.
10 Steps to Lock Down Desktops 3
Contrary to popular opinion, Windows is a secure OS. The rub? You have to make it secure, rather than rely on the default settings.
Using EFS with Offline Files 1
Microsoft has merged the Encrypting Files System and Offline Files features to secure your offline files.
Take a Closer Look at EFS 2
Contrary to popular opinion, EFS is a reliable, easy-to-use, and secure encryption solution. Here are the basics of this oft-maligned solution.
Hardening IIS 6.0 5
Follow Microsoft guidelines to establish a secure Web server on a Windows 2003 and IIS 6.0 platform.
Per-User Auditing - 28 Jun 2005
New in Windows Server 2003 SP1 and Windows XP SP2, you can fine-tune event logging by including or excluding a particular security principal from audit categories.
Scrutinizing Windows Authentication 2
Do you give much thought to how Windows authentication works? You should. Here's a look at the basics, including an examination of the related protocols.
Scourge of the Spambots
Learn what spambots are, how they pose a threat to your environment, and how you can combat them.
Port-Enumeration Tools
In your efforts to track spambots, you need to use port enumeration. Here are some resources for further learning.
6 Network Protocol Analyzers 13
If you manage a network, you need a protocol analyzer to tell you what protocols and data are traveling over your network connections. We review 6 strong contenders among software-based network protocol analyzers.
NEW: John Savill's Microsoft Stack Master Class

Get 30 hours of detailed instruction covering the complete Microsoft solution stack. Invest a few hours each week and become THE Microsoft expert in your organization.

Thursdays, October 2nd to December 11th

John Savill will cover topics including:

* Deploying, Managing, and Maintaining Windows
* Key Features of Active Directory from Windows 2000 to Windows Server 2012
* Key elements of System Center 2012 and System Center 2012 R2
* Deploying, Migrating to and Managing Hyper-V in Your Organization
* Implementing a Private Cloud
* Using PowerShell to Automate Common Tasks

Enroll by September 25th and SAVE $245!
 

Upcoming Conferences

Register now to get the best rates available!

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×