WindowSecurity.com - Monthly Article Update
Hi Security World,
New articles added to WindowSecurity.com last month:
Title: Managed E-Mail Security Services: Is it the right solution for your network?
Author: Deb Shinder
Summary: Email communications are essential to getting the job done in today’s business world, but many companies are overwhelmed by spam, the security risks of e-mail borne viruses and worms and liability implications of e-mail containing pornography or other undesirable content. It’s getting harder and harder for network administrators to keep it all under control.
Link: http://www.WindowSecurity.com/articles/Managed-E-Mail-Security-Services-right-solution-network.html
Title: Packet analysis tools and methodology (Part 4)
Author: Don Parker
Summary: In the last part of this article series we will take a look at the alarms generated by myself. This binary log will include several attacks, and some general surfing. We now need to take a look, and separate the chaff from the wheat.
Link: http://www.WindowSecurity.com/articles/Packet-analysis-tools-methodology-Part4.html
Title: Windows Vista and Principle of Least Privilege
Author: Derek Melber
Summary: It is not surprising that Microsoft is getting on the bandwagon for implementing the Principle of Least Privilege for their next operating system named Windows Vista. This article will investigate some of the current issues with least privilege and investigate the reality of what Microsoft is proposing with Windows Vista.
Link: http://www.WindowSecurity.com/articles/Windows-Vista-Principle-Least-Privilege.html
Title: Packet analysis tools and methodology (Part 3)
Author: Don Parker
Summary: It has arguably gotten easier to exploit computers now due to the abundance of attack tools out there today. One of the most powerful ones is the Metasploit Framework. We will take a look at it in this article.
Link: http://www.WindowSecurity.com/articles/Packet-analysis-tools-methodology-Part3.html
Title: Being Big Brother: Monitoring employees’ network activity
Author: Deb Shinder
Summary: Big brother is watching. In today’s security-conscious world, it has become a fact of life. George Orwell coined the term to refer to government intrusion into the private lives of citizens, but the meaning has expanded to include any authority figure. The law recognizes that there are circumstances in which monitoring of others’ activities is permissible or even desirable. In general, employers have a lot of leeway in monitoring what their employees do while on company premises and using company equipment.
Link: http://www.WindowSecurity.com/articles/Being-Big-Brother-Monitoring-employees-network-activity.html
Title: Packet analysis tools and methodology (Part 2)
Author: Don Parker
Summary: In part two of this article series we will learn how to build a powerful analysis suite. Tools covered will be Snort, Snortsnarf, widump, and winpcap. You will also need to install a PERL interpreter, which shall be shown.
Link: http://www.WindowSecurity.com/articles/Packet-analysis-tools-methodology-Part2.html
Title: Controlling Windows Services and Service Accounts
Author: Derek Melber
Summary: When you install any Windows computer it will immediately be running multiple services. These services provide core operating system and tool functionality to the computer. In addition to these core services, you might also be running more services due to installed applications. There are a slew of Microsoft products, as well as other third party products, that install services on your computer. Examples includes Exchange, SQL, SMS, backup programs, and enterprise management applications. Since many attackers can exploit services that are running, you will want to protect the services that must run and disable all services that are not required. We will talk about the management of services to protect your computers.
Link: http://www.WindowSecurity.com/articles/Controlling-Windows-Services-Service-Accounts.html
Title: How to Use Microsoft’s Shared Computer Toolkit
Author: Deb Shinder
Summary: The Shared Computer Toolkit for Windows was designed to help administrators better manage and secure public computers, such as those in kiosks, libraries, Internet cafes, schools, etc. But the toolkit is useful for any situation in which multiple persons use the same computer, including family computing and small business offices where several employees must use the same machine. This article shows you how to get and use the toolkit, which is in beta testing at the time of this writing.
Link: http://www.WindowSecurity.com/articles/Microsoft-Shared-Computer-Toolkit.html
Title: Pushing Out Security Settings that are Configured in the Registry
Author: Derek Melber
Summary: Each passing day proves that security of the corporate infrastructure and the computers that live in them is extremely important. There are spyware applications, virus checkers, Group Policy extensions, network scanners and more that are installed to check, verify and protect our computers. In the long run, even the most sophisticated protection mechanism can’t protect a computer that is not configured properly to protect itself. For these computers you typically need to manually configure Registry settings that will increase the baseline security of that computer. This article will discuss how to most efficiently configure Registry settings to help improve security on all computers on the network.
Link: http://www.WindowSecurity.com/articles/Pushing-Out-Security-Settings-Configured-Registry.html
Visit the Subscription Management (http://newsletter.isoftmarketing.com/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsecurity.com
Copyright © WindowSecurity.com 2005. All rights reserved.
No comments:
Post a Comment