Security Resources

Online resources for whole disk and full volume encryption

Microsoft System Integrity Team blog: Protecting BitLocker from cold boot and direct memory access attacks Ed Felten’s research team uncovered the cold boot attack, which can be used to recover encrypted information from RAM in the clear. This is Microsoft’s explanation of how to protect BitLocker users from the threat as an administrator, by enforcing PINs or USB tokens.http://blogs.msdn.com/si_team/archive/2008/02/25/protecting-bitLocker-from-cold-attacks-and-other-threats.aspxConfiguring AD to backup BitLocker recovery keyshttp://go.microsoft.com/fwlink/?LinkId=67438BitLocker keys should be backed up so that they can be recovered in the event of a lost key or damaged storage media. This article explains how it’s done. read more
Security Resources

PDF Security Resources

Adobe Security Update: www.adobe.com/support/security/advisories/apsa08-01.html Adobe Reader Remote Heap Memory Corruption: www.piotrbania.com/all/adv/adobe-acrobat-adv.txt read more

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

You want the PCs you support to have the right time for more reasons than keeping the users happy; for one thing, if every PC has a slightly different time, finding which version of a file was updated most recently gets much more complicated. Get your head around the Windows Time Service at http://technet.microsoft.com/en-us/library/cc773013.aspx, get the commands for making a PC get its time from the domain at http://technet.microsoft.com/en-us/library/cc758905.aspx and if you want a an alternative time server use uk.pool.ntp.org to get the time from a random time server in the NTP Pool Project (read about the project at http://www.pool.ntp.org/use.html) read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS