One approach to securing a system starts with the Trusted Computing Group’s (TCG) Trusted Platform Module (TPM) to boot the system. A TPM contains a secure microcontroller and storage normally found ...
Maintaining a secure Windows environment in the enterprise may seem a daunting task. Though there are many elements to consider — antivirus protection, intrusion detection and personal firewalls — ...
“Known user account management systems seek to alleviate these problems in several ways. For example, some such systems can automatically generate very strong passwords for each separate website or ...