News

Wednesday, March 11, 2009

The Feature Behind the "Remember my password" Check Box

WIN_SECURITY UPDATE_
A Penton Media Property
March 11, 2009


If you want to view this on the web go to:
http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622329-0-0-0-1-2-207

----------------------------------------
ADVERTISEMENT
Windows IT Pro

Take the Burden Out of Managing Exchange Security

To ensure the compliance and security of their Exchange environment, IT
administrators need to find an effective way to manage permissions.
Security Explorer for Exchange is a permissions management tool that
will allow you to search permissions at a granular level, clone
permissions from one account to another, enforce access controls,
manage permissions without accessing the Outlook client, and administer
Exchange and Active Directory permissions from the same interface.

Don't let Exchange permission management be a pain, try Security
Explorer for Exchange.

http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622330-0-0-0-1-2-207
----------------------------------------


----------------------------------------
ADVERTISEMENT
St. Bernard Software

Get a Free WIPEOUT T-shirt and a Custom Surfboard

Dude, where's your Surf control? Catch the next wave in Web Filtering
with iPrism. Sign up for
a Web Demo today and get a free WIPEOUT T-shirt. Plus, you may be
elgible for a free Surfboard!

http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622331-0-0-0-1-2-207
----------------------------------------
SECURITY SOLUTIONS

--
The Feature Behind the "Remember my password" Check Box

by Damir Dizdarevic

Windows Vista, Windows XP, Windows Server 2008, and Windows Server 2003
have a built-in feature that automatically manages the usernames and
passwords needed to access resources that require credentials other than
the user's logon credentials. This feature is called Stored User Names
and Passwords. With the Stored User Names and Passwords feature, users
don't have to remember multiple passwords, which means they'll be less
likely to use weak passwords. Read the full article for more information
about the Stored User Names and Passwords
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622332-0-0-0-1-2-207) feature.


SECURITY NEWS AND FEATURES

--
Microsoft Issues Eight March Security Fixes

Microsoft on Tuesday released three security bulletins and fixed eight
security vulnerabilities as part of its regularly timed monthly security
fix schedule. Read the full article for details about Microsoft's latest
security fixes (http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622333-0-0-0-1-2-207.

--
Wireshark 1.0.6

If you're using Wireshark and haven't upgraded to version 1.0.6, then
you ought to do so. The new version fixes several vulnerabilities. Read
the full article for more information about Wireshark
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622334-0-0-0-1-2-207.

--
35 Percent of Infected PCs had up-to-date AV Software

PandaLabs released a rather staggering figure: 35 percent of the 67
million computers infected with malware in 2008 were running up-to-date
anti-malware software. Read the full article for more information about
PandaLabs' security statistics
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622335-0-0-0-1-2-207.


GIVE AND TAKE

--
FAQ: Enabling BitLocker from the Command Line

by John Savill

Q. How do I enable BitLocker from the command line?

Read the full FAQ to learn more about enabling BitLocker from the
command line (http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622336-0-0-0-1-2-207.

--
FROM THE SECURITY FORUMS

Do you have a security problem or question? Ask your peers and our
experts for help at the Windows IT Pro security forum
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622337-0-0-0-1-2-207) or
the Security Pro VIP security forum
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622338-0-0-0-1-2-207.

--
SHARE YOUR SECURITY TIPS AND GET $100

Share your security-related tips, comments, or problems and solutions.
Email your contributions to r2r@windowsitpro.com
(mailto:r2r@windowsitpro.com). If we print your submission, you'll get
$100. We edit submissions for style, grammar, and length.


RESOURCES AND EVENTS

Hit the Ground Running with SQL Server for Non-DB Specialists!

Join SQL MVP Allan Hirt on March 26 and April 30, 2009, for 6
fundamental SQL Server lessons
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622339-0-0-0-1-2-207) tailored to pros new to
SQL Server, plus live Q&A sessions--all on your own computer! For only
$99 each day, you'll learn how to plan, deploy, and administer SQL
Server. The discussion includes aspects of SQL Server 2000, SQL Server
2005, and SQL Server 2008. Seats are limited to allow for lots of live
Q&A at the end. Register today!

Virtualizing Servers

Live Web Seminar: Tuesday, March 31, 2009 (12:00 PM EDT)--Join us for an
introduction to Hewlett-Packard (HP) solutions using industry-standard
Intel Xeon processor-based ProLiant servers with Intel Virtualization
Technology designed for Windows Server 2008 Hyper-V virtualization
technology. Discover the benefits of deploying virtual machines on HP
ProLiant servers with Intel Xeon processors
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622340-0-0-0-1-2-207,
one of the best managed platforms in the industry. During the webcast,
we provide server scenarios to help you determine which HP servers with
Intel Virtualization Technology are right for your business
virtualization needs. Register for this live resource today!

Don't Miss Infosecurity Europe!

Infosecurity Europe is the number-one event where information security
professionals address the challenges of today while preparing for those
of tomorrow. Participate in the unrivalled free education program where
influential global experts stimulate debate and industry practitioners
share case study experiences. Over 300 international solution providers
showcase current and emerging technologies and deliver practical,
professional, and technical expertise. Infosecurity Europe
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622341-0-0-0-1-2-207, new venue Earls Court,
London, from April 28-30, 2009.


FEATURED WHITE PAPER

11 Myths About Exchange Backup & Recovery

Separate myth from reality with this white paper's presentation of 11
false ideas IT pros worry about with Exchange backup
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622342-0-0-0-1-2-207.
With the growing dependency on Exchange, there are many misconceptions
about how best to protect these mission-critical systems, but you can
overcome these myths with careful planning. Change your Exchange future;
download this white paper today!


ANNOUNCEMENTS

Top 10 Features to Look For in a Data Migration Solution

Effective and efficient data migration continues to be a necessity for
all companies as shrinking budgets and exploding data growth
increasingly force IT departments to do more with less. Download these
10 tips on what to look for in a data migration solution
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622343-0-0-0-1-2-207)
and find the best solution for your storage environment. Download this
pocket guide today!

Secure and Simplify Windows Server Migration with a Cost-Effective
Solution

There's more to server migration than just taking files and folders and
putting them on another server; administrators have to reestablish and
restore groups and settings on the new server too. Secure Copy
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622344-0-0-0-1-2-207)
transfers not only files and folders, but also file shares, file share
permissions, local users, local groups, NTFS permissions, and more!
Security is maintained throughout the entire transfer, so you can ensure
that your data arrives at its new server uncompromised and uncorrupted.
Try this awesome software free for 30 days!

Overcome 3 Major BI Optimization Barriers

Learn the most important factors to consider when optimizing your
business intelligence (BI) with this Essential Guide from IT powerhouses
Microsoft and Intel
(http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622345-0-0-0-1-2-207.
You'll find out how to move forward with BI optimization when your data
is dispersed across multiple source systems, the data quality in the
source systems is poor, and the relational databases are unsuccessful in
running your analytical queries. Download this must-have guide today!


CONTACT US
Security UDPATE is brought to you by the Windows IT Pro website's
Security page (URL below).
http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622346-0-0-0-1-2-207

You are subscribed to this newsletter as boy.blogger@gmail.com

Manage your Security UPDATE subscription at
http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622347-0-0-0-1-2-207.

To unsubscribe:
http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622348-0-0-0-1-2-207&list_id=803&email=boy.blogger@gmail.com&message_id=59574

Be sure to add Security_UPDATE@email.windowsitpro.com
to your spam filter's list of allowed senders.

To contact us:
About Security UPDATE content -- mailto:letters@windowsitpro.com
About technical questions -- http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622349-0-0-0-1-2-207
About your product news -- mailto:products@windowsitpro.com
About your subscription -- mailto:windowsitproupdate@windowsitpro.com
About sponsoring Security UPDATE -- mailto:salesopps@windowsitpro.com

View the Windows IT Pro privacy policy at
http://ct.email.windowsitpro.com/rd/cts?d=33-59574-803-202-62923-2622350-0-0-0-1-2-207

Windows IT Pro, a division of Penton Media, Inc.
221 East 29th Street, Loveland, CO 80538
Attention: Customer Service Department

Copyright 2009, Penton Media, Inc. All rights reserved.

No comments:

Blog Archive