This article presents the key risks with DirectAccess and how to audit them. Let’s begin by first understanding the DirectAccess technology Introduction of DirectAccess From the Wikipedia definition DirectAccess, also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet. Direct Access overcomes […]
Hey!! We are back again with some more wealth I will be taking you through Operating System security and Database Security concepts. This won’t be a checklist based on different standards. Rather I would be grabbing some bits and pieces from best practices and explaining in detail the Risk, requirement and standard required settings. It […]
Most Commented Posts
Shashank Gosavi on Windows Mobile Application Security – Part II Superb. Are you planning to release process for WP10? It ...
pietro on Windows Mobile Application Security – Part II sono stato contento di sbirciare dentro al mio nokia 925 ...
Most Liked Posts
[Twitter Widget Error] You need to authenticate your Twitter App first. Go to Highend Options > Social Links. Read the documentation to find out more.