Internet Explorer users are complacent, compliant, and by-the-books types of people. Mozilla Firefox users are rebels, trying to change the world. They also want things their way. Google Chrome users are Kool-Aid drinking conformists with fickle loyalty. Safari... don't get me started on Safari users! No, this post doesn't try to describe your personality based on what … [Read more...]
Windows Firewall Exceptions through Group Policy
Along with scripting Windows Firewall exceptions, you can also control them through a Group Policy Object. This would give you the broad reach of being able to affect an entire Organizational Unit (OU) without having to add a script or additional code to a login script. In order to create a firewall exception for an application, Create or Edit a Group Policy Object for an … [Read more...]
Remove Internet Explorer Enhanced Security Configuration
Very rarely is it a good idea to remove built-in security measures, but the Internet Explorer Enhanced Security provided with Server 2003 and Server 2008 is too annoying and interacts with the file system too much for my liking. This is particularly an annoyance if you use the Server OS's as a workstation. You'll end up getting warning messages like the following when you try … [Read more...]
Steganography
Steganography is a cool thing to be aware of, it's not life-changing but it's fun and interesting. Steganography broadly means hiding a message inside another object so nobody else even realizes that there is a hidden message, let alone one that they can't decipher. Particularly, for the purpose of this article, I am talking about hiding messages inside other digital objects … [Read more...]
Book Review: Rootkits – Subverting the Windows Kernel
Rootkits, authored by Greg Hoglund and James Butler, is a very technical reading for a very technical topic. Rootkits themselves (the technology) gained quite a bit of fame in 2005 when Sony was found to be embedding rootkit technology along with their CDs to prevent copying of music. This book goes well beyond the simple copyright protection and really delves into the … [Read more...]