Access "How to avoid Windows XP Service Pack 2 problems"
This article is part of the May 2004 issue of Are you secure? Adam Putnam says, "Prove it!"
Imagine walking into work tomorrow to find that none of your mission-critical applications is working. A new virus or worm, perhaps? Nope. Something much simpler: Windows XP Service Pack 2. Microsoft promises many security benefits with this service pack, scheduled for general release this summer. While these changes may keep the hackers and worms at bay, they also make me feel a little uneasy. Think interoperability--or lack thereof. Best practices call for regression and interoperability testing on your enterprise desktops and legacy applications before any program goes live. But, there's no need to wait until the last minute. Running a few preliminary tests with the SP2 beta will give you a heads up on many of the issues you'll encounter during deployment, and will give you some time to resolve or plan for them. Microsoft's changes will affect nearly every browser-based and custom application in your enterprise. Any app that uses unauthenticated or anonymous connections through RPC and DCOM is disallowed by default, which will stop worms like MS Blaster ... Access >>>
Premium Content for Free.
Should new information security laws include auditing requirements?
by Erik Sherman
Get your security act together or Adam Putnam will do it for you. Federal information security laws and regulations could be the next thing infosec management has to worry about. Here you will learn about pending security laws requring security auditing requirements in this feature.
Exploring additional technologies to support antivirus scanning
by George A. Chidi Jr.
Security managers are looking beyond conventional AV to ensure business continuity and improve disaster recovery times.
Using email spam filtering techniques to get rid of spam
by Amber Plante
Filters stem the flow of junk email, but spam remains a big distraction. Learn how to use spam filtering techniques to get rid of spam.
- Should new information security laws include auditing requirements? by Erik Sherman
Secure data transmission with wireless access controllers
by Jon Edney
Sending data over the airwaves is risky. Wireless access controllers assure secure data transmission and reception.
Why and how the CISO job description is changing
by Gary Lynch
Reinvent your job or watch it disappear.
- Secure data transmission with wireless access controllers by Jon Edney
Government cybersecurity: What is being done to fight cybercrime?
by Lawrence M. Walsh
Learn what can be done to fight cybercrime against privately owned networks.
Industry needs less ethical computer hacking, more risk management strategies
by Jay Heiser, Contributor
Enterprises need less ethical computer hacking and a better risk management strategy.
How to avoid Windows XP Service Pack 2 problems
by Victor R. Garza
Testing XP SP2 beta today will pay off in the long run and help admins to avoid any Windows XP Service Pack 2 problems.
Enhancing secure coding practices to secure your machine
by Pete Lindstrom, Contributor
Learn preventative measures to help improve secure coding practices and protect and secure your machine from the latest threats.
Laws of security: 10 security best practices
by Andrew Briney
Learn the laws of security and 10 security best practices.
- Government cybersecurity: What is being done to fight cybercrime? by Lawrence M. Walsh
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.