Windows 8 – Secure Overwrite

By on May 23, 2012

In the ongoing battle of DOD 5220 and NIST SP800-88 and which secure overwrite procedure is the most suited to ensure no keyboard nor lab recovery of data stored on magnetic media; Microsoft has made further improvements to the Windows format utility to help make the choice that much easier. With Windows 7, Microsoft changed […]

Is this exe file malicious?

By on May 21, 2012

A really quick way to determine whether or not an executable is malicious is the location from which it is executing. While further investigation is always necessary, you can usually give a quick cursory glance to the file and determine that there is something malicious about it just by where it resides. Windows, like Unix […]

Basic best practices for Windows security

By on May 19, 2012

This blog post is intended for those whom are basic to moderately advanced (A+) users of Windows. I know some of you will sit here and say, “Windows!? How can you secure that!? Microsoft doesn’t know how to secure anything!” The reality of the situation is that since 2002, Microsoft has been at the forefront […]