In some companies, you can find that access to the C-drive of a Windows computer has been blocked. How do they do this?
You can easily do this by creating an entry in your domain policy. The path to the policy is User Configuration\Administrative Templates\Windows Components\Windows Explorer
In that location, two policy-settings are available:
This page contains a collection of publicly available secure software development guides. Each guide has its own approach to introducting security in the software development lifecycle.
An Audit policy determines the security events to report to administrators so that user or system activity in specified event categories is recorded. The administrator can monitor security-related activity, such as who accesses an object, when users log on to or log off from computers, or if changes are made to an Audit policy setting. For all of these reasons, Microsoft recommends that you form an Audit policy for an administrator to implement in your environment.
When many events logs are being generated, the possibility exists that events are being overwritten to quickly, which causes that important information would be lost. Increasing the maximum size of the Windows Event Logs might help to store events longer on each computer.
Having trouble finding the place where to enable auto-logon in Windows XP Professional? Since it's not so secure, it's well hidden. If you still want the functionality, do the following:
Click Start, Run and enter CONTROL USERPASSWORDS2
In the list of users, highlight the user account you want automatically logged on.
Uncheck Users must enter a Username and password.
Click Apply.
In the next dialog, enter the password for the account you selected in Step 2, if any
How to configure Apache so that requests for non-existing pages are redirected to the home page.
In some occasions, you don't want people to get 404 messages when they surf to pages or folders that don't exist on your web server (anymore). For example, when you have Basic Authentication, end users only get the pop-up that requests them to authenticate when they surf to an existing page or folder. The security impact of this is that when attackers perform a brute force scan on your file server, they can easily detect whether pages and folders exist or not: