Welcome Guest!
Create Account | Login
Locator+ Code:

Search:
FTPOnline Channels Conferences Resources Hot Topics Partner Sites Magazines About FTP RSS 2.0 Feed

Security and the Custom Client
A customized client solution is growing more popular for enterprises as the pressure mounts to increase the security of applications and client data. See why. [Read More]
Best Practices for Java Security
The Java Security Landscape

  Windows IT
 

Windows Server 2003 Maintenance Made Easy
Following a management and maintenance regimen reduces admin and business expenses while increasing reliability, stability, and security. [Read More]


Securing IIS
Modify the default installation parameters of IIS to provide a more secure configuration. [Read More]


Patching Windows Security
Get the scoop on Microsoft's releases and updates that will tighten security on the latest Windows operating systems. [Read More]


Secure Your Active Directory
Take advantage of Windows Server 2003 features to ensure your Active Directory can't be subject to denial-of-service attacks. [Read More]


5 Layers of Defense
Use a defense-in-depth strategy such as the Castle Defense System to provide a layered structure to IT security. [Read More]


Beyond the Firewall
With the proliferation of malicious attacks aimed at applications, network protection at the physical layer may no longer be enough. [Read More]


Manage Security Patches
Take control of the delivery and distribution of security patches within your network. [Read More]


Secure Your Intranet
Lock down the sites, subsites, content, and Web parts that make your intranet such a powerful tool, without destroying its usefulness. [Read More]


Defending Against
Layer 8

System administrators must educate themselves and their users about social engineering practices to prevent attacks. [Read More]


Getting Started With PKI
Here's how to decide if you need Public Key Infrastructure, plus a guide to installing PKI on your servers. [Read More]

  SQL Server
 

Use the Best Security for SQL Server
Learn tips for administering SQL Server securely. [Read More]

  Exchange
 

Protect Users From Phishing Scams
Thwart Non-Delivery Receipt messages and use the Recipient Update Service to ensure new accounts appear on your global address list. [Read More]

  Wireless
 

Securing Your Handhelds
Palliate security risks with these policies, procedures, and mechanisms. [Read More]


Lock Down Your Handheld Devices
It's time to consider handhelds as real computers and manage them accordingly. [Read More]
  Video Connection
 


Watch the Video
BEA's Paul Patrick explores the growing use of service-oriented security infrastructures to leverage existing investments and support dynamic changes in enterprise environments.

  Java
 

Mapping Security to SOA
What security hurdles can you overcome when using XML to develop against a services layer? See a whiteboard diagram of security requirements mappings in an SOA. [Read More]


10 Java Security Rules
Here are 10 best practices to help you begin your strategy to ensure your Java code is secure.
Make Methods Private
Don't Rely on Package-Level Access
Avoid Using Inner Classes


Adaptive Security With Virtual Services
Implement transparent, on-the-fly reconfiguration of insecure software to give architectures adaptability support. [Read More]


All That JAAS
Pluggable authentication and authorization services provide many key security benefits for Java applications. [Read More]


Prevent Web Application Hijacking
Combat your Web applications' vulnerability to security and policy breaches. [Read More]


Managing for Security
Set up a lifecycle for security to make your enterprise proactive in protecting applications and data. [Read More]


XML and Web Services: Are We Secure Yet?
Web services have become more secure than ever, thanks to standards. [Read More]


Architecting Security for Web Services
Web services present unique security issues. When rolling out XML security, make architectural decisions sooner rather than later. [Read More]

  Interviews
 

Getting the Big Picture on Security
Paul Patrick, BEA systems' chief security architect, describes crucial security issues for the Java platform in an exclusive interview. [Read More]
ADVERTISEMENT

  Special Reports
 

Security
Security is a top priority in any IT shop, but do you have all your bases covered? Put these essentials into practice when you formulate or update your security strategy.
Plan Your Defense Strategy
Serious Perimeter Security
Manage Patches & Updates

  .NET Development
 


Build Secure Services With Indigo
Check out seven hours' worth of video content on Microsoft's key communications architecture, including sessions showing you how to build secure, interoperable services. [Watch the Videos]


Determine Which CAS Permissions You Need
Learn which Code Access Security permissions your apps need to run correctly. [Read More]


Secure Your Directory-Enabled Apps
Use Active Directory Application Mode and Windows Authorization Manager to add security to your applications easily. [Read More]



The LaunchInSandBox utility lets you run an executable in a sandboxed, partially trusted environment with a limited set of CAS permissions.

  Opinions
 

Choose the Right Security Technologies
Ensuring maximum asset availability requires multiple layers of security working in concert. [Read More]


Finding a Home for Application Security
Firewalls and antivirus software aren't enough. You need to deploy application-layer security devices. [Read More]

  Reviews
 

Secure Your ASP.NET Sites
Peter Blum's Visual Input Security brings security to ASP.NET Web apps, with tools to protect against the most insidious attacks du jour. [Read More]


Keep Patches Up-To-Date
Ecora Patch Manager 2.0 enables you to keep critical patches for Microsoft products up-to-date. [Read More]


Secure Your .NET Apps
The .NET Developer's Guide to Windows Security helps put you on your way to developing secure applications in .NET. [Read More]





 

Get the best technical information for IT professionals and developers—free—from FTPOnline's Insight newsletters.

Subscribe Now! (If you are already a subscriber, enter your email address to update your preferences.)

Enter your email address







Java Pro | Visual Studio Magazine | Windows Server System Magazine
.NET Magazine | Enterprise Architect | XML & Web Services Magazine
| | Discussions | Newsletters | FTP Home