At times strange things happen with user local profiles on both Windows Servers and client systems such as, when a user local profile unexpectedly turns to a backup status and freezes in that state. When you check the profile status through the Control Panel you will see that it is flagged as backup after you log on with a temporary profile.
Project Shield is an initiative launched by Google Ideas to use Google’s own Distributed Denial of Service (DDoS) attack mitigation technology to protect free infrastructure online. The service allows other websites to serve their content through Google’s infrastructure without having to move their hosting location.
Read more here – http://projectshield.withgoogle.com/
The security guidance published by the UK government’s National Technical Authority for Information Assurance (CESG), is applicable to devices running Enterprise versions of Windows 7 and Windows 8, acting as client operating systems, which include BitLocker Drive Encryption, AppLocker and Windows VPN features. The UK government’s National Technical Authority for Information Assurance (CESG) advises organisations on how to protect their information and information systems against today’s threats.
The Windows 8 Secure Boot process alerts a user when an attempt to subvert the security controls has taken place. It is important that users know how to identify and respond to this alert.
A survey by Andy Grant investigated the practices of major app developers with regard to data storage on Windows Phone 7. As more people use mobile devices for sensitive tasks such as, online banking and password storage, the data stored on the device increases in value. With each new mobile platform there are more opportunities for a mobile application developer to store data in an insecure manner.
This publication provides recommendations for improving an organization’s malware incident prevention measures and handling for Desktops and Laptops. It also gives extensive recommendations for enhancing an organization’s existing incident response capability so that it is better prepared to handle malware incidents, particularly widespread ones.
Download the complete guide from here – http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf
5 important tips about Windows 8 networking that will make your life easier as a Windows 8 user.
There is an alternative to perform vulnerability assessments to SCADA devices less risky and with good result information. You can use nmap scripting engine to add vulnerability scanning functionality.
In case your computer gets infected with the ubiquitous ransomware that pretends to be some form of action by the Department of Justice, Department of Homeland Security, or the FBI and that states child pornography was detected on your computer, then make sure that you have a copy of this removal guide at hand! The Your computer has been locked Ransomware is a computer infection that prevents you from accessing your Windows desktop, files, or applications until you pay a $300 ransom to the malware developers.
Get the full guide from here – http://www.bleepingcomputer.com/virus-removal/remove-your-computer-has-been-locked-ransomware
A free Windows utility from NirSoft allows you to capture and display DNS traffic on your system. The utility called DNSQuerySniffer is capable of displaying the Host Name, Port Number, Query ID, Request Type (A, AAAA, NS, MX, and so on), Request Time, Response Time, Duration, Response Code, Number of records, and the content of the returned DNS records.
Microsoft released a fix that mitigates all Java web-attack vectors through Internet Explorer. This fix covers current and past versions of Java, and all supported versions of Internet Explorer (32-bit or 64-bit). However, it does not interfere with Java’s update mechanism.