Quantcast
Channel: Windows 7 Library
Browsing latest articles
Browse All 57 View Live

Prolong the idle time of an established network connection before the session...

By default, Windows 7 suspends an inactive network connection to a shared folder residing on a server after 15 minutes however; you can modify this setting through Group Policy settings. When a session...

View Article



Disabling Autoplay on Windows computers

The Autoplay feature may pose a security risk on computers running Windows operating systems. The feature enables computers to automatically open and run different types of media when they are inserted...

View Article

Improving text quality on your screen

The technology known as ClearType font on Windows systems makes text on displays easier to read. It is enabled by default on Windows 7 but to get the full benefit of ClearType you need a high-quality,...

View Article

What are the risks of connecting to a public wireless network?

Although, Public wireless hotspots or networks are very convenient, but they present many risks if not properly secured. Whenever possible, only connect to wireless networks that require a network...

View Article

What is a digital ID in an email message?

You use digital IDs to prove your identity and encrypt text when sending email messages. This permits your recipients to determine that the message was actually sent by you and keeps your conversation...

View Article


Java web-attacks mitigation solution

Microsoft released a fix that mitigates all Java web-attack vectors through Internet Explorer. This fix covers current and past versions of Java, and all supported versions of Internet Explorer (32-bit...

View Article

Free DNS Sniffer utility

A free Windows utility from NirSoft allows you to capture and display DNS traffic on your system. The utility called DNSQuerySniffer is capable of displaying the Host Name, Port Number, Query ID,...

View Article

Removal Guide for Ramsomware

In case your computer gets infected with the ubiquitous ransomware that pretends to be some form of action by the Department of Justice, Department of Homeland Security, or the FBI and that states...

View Article


Risks of Free Apps and Rooted Devices

McAfee June’s Consumer Mobile Trends Report explores some of the threats posed by free Apps where free Apps and rooted devices may abuse permissions to deliver profits to criminals. Under the...

View Article


Using nmap scripts to enhance vulnerability assessment results

There is an alternative to perform vulnerability assessments to SCADA devices less risky and with good result information. You can use nmap scripting engine to add vulnerability scanning functionality....

View Article

5 Essential Tips for Windows 8 Networking

5 important tips about Windows 8 networking that will make your life easier as a Windows 8 user. 1. Know Your Connection Status Windows 8 wireless connection status is new but is still pretty...

View Article

Malware Prevention and Handling Guide

This publication provides recommendations for improving an organization’s malware incident prevention measures and handling for Desktops and Laptops. It also gives extensive recommendations for...

View Article

Unveiling an Indian Cyberattack Infrastructure

The report below details a cyber attack infrastructure that appears to be Indian in origin. This infrastructure has been in operation for at least three years, more likely close to four years. The...

View Article


Windows Phone 7 Application Security Survey

A survey by Andy Grant investigated the practices of major app developers with regard to data storage on Windows Phone 7. As more people use mobile devices for sensitive tasks such as, online banking...

View Article

Security Guidelines for Windows 7 and Windows 8

The security guidance published by the UK government’s National Technical Authority for Information Assurance (CESG), is applicable to devices running Enterprise versions of Windows 7 and Windows 8,...

View Article


Google’s Project Shield

Project Shield is an initiative launched by Google Ideas to use Google’s own Distributed Denial of Service (DDoS) attack mitigation technology to protect free infrastructure online. The service allows...

View Article

Recovering a user local profile flagged as ‘backup’

At times strange things happen with user local profiles on both Windows Servers and client systems such as, when a user local profile unexpectedly turns to a backup status and freezes in that state....

View Article


Tails Operating System

Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no...

View Article

Penetration testing tool for domain controllers

Smbexec is a tool that you can use for penetration testing domain controllers; the program allows running post exploitation for domain accounts and expanding the access to targeted network. This gives...

View Article

Image may be NSFW.
Clik here to view.

Product Review: PDF Watermark Remover

PDF Watermark Remover: Removes Digital Images, Stamps, Graphics, Logo Watermarks are the digital signatures that approve that the document is the property of an organization, a person or any legal...

View Article
Browsing latest articles
Browse All 57 View Live




Latest Images