Securing windows computers

Xem 1-20 trên 108 kết quả Securing windows computers
  • Your Guide to Easy and Secure Windows Vista Networking is a complete beginner’s guide to creating, configuring, administering, and using a small network using Windows Vista computers. Inside you’ll find comprehensive coverage of networking hardware, including Ethernet (wired) hardware (from NICs to cables to switches to routers) and wireless Hardware--from wireless NICs to access points to range extenders

    pdf50p ken333 14-06-2012 46 5   Download

  • The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats.

    pdf333p ken333 14-06-2012 310 84   Download

  • Attackers can infect your computer with malicious software, or malware, in many different ways. They can take advantage of unsafe user practices and flaws in your computer’s programs (flaws including vulnerabilities and unsecured services and features) and use social engineering (in which an attacker convinces someone to perform an action such as opening a malicious email attachment or following a malicious link). Once your computer is infected, intruders can use the malware to access your computer without your knowledge to perform unwanted actions.

    pdf11p khongmuonnghe 04-01-2013 24 3   Download

  • A firewall is a device that controls the flow of information between your computer and the internet, similar to a router. Most modern operating systems include a software firewall. In addition to the operating system’s firewall, the majority of home routers have a firewall built in. Refer to your user’s guide for instructions on how to enable your firewall. Once your firewall is enabled, consult the user’s guide to learn how to configure the security settings and set a strong password to protect it against unwanted changes. ...

    pdf5p khongmuonnghe 04-01-2013 23 3   Download

  • In this section we are going to cover some of the key aspects that need to be addressed in order to have a secure web server using IIS. It is important to note that a system is only as secure as its weakest link and therefore any web server must be built on a secure and hardened Windows 2000 system. Securing Windows 2000 is not covered in this section but has been covered in a previous module. So before you install IIS make sure that you spend the time to properly harden your base operating system. Once you have a secure operating system configured, you...

    pdf30p huyhoang 07-08-2009 252 79   Download

  • MCSE Core Required Exams in a Nutshell MCSE Core Elective Exams in a Nutshell MCSA on Windows Server 2003 Core Exams in a Nutshell Security Warrior Network Security Assessment Internet Core Protocols: The Definitive Guide TCP/IP Network Administration 802.11 Wireless Networks: The Definitive Guide PC Hardware in a Nutshell Linux in a Nutshell Windows Vista in a Nutshell Unix in a Nutshell’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries.

    pdf813p luvpuca 01-04-2011 128 51   Download

  • Microsoft’s new Microsoft Certified Systems Engineer (MCSE) track for Windows 2000 is the premier certification for computer industry professionals. Covering the core technologies around which Microsoft’s future will be built, the new MCSE certification is a powerful credential for career advancement. This book has been developed, in cooperation with Microsoft Corporation, to give you the critical skills and knowledge you need to prepare for one of the elective requirements of the new MCSE certification program for Windows 2000 Security.

    pdf854p thuxuan 07-08-2009 150 44   Download

  • Article wrtten by Derek Melber briefly discuss some crucial pointers regarding Win Password

    pdf6p gamondeluxe 25-05-2009 304 31   Download

  • Tham khảo sách 'security operations guide for windows 2000 server', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf192p mylinh 12-08-2009 149 25   Download

  • Threats and Mitigation Conventional Cryptography and Kerberos Public Key Cryptography and SSL Windows Security 101: Basics Windows Security 102: Impersonation and Delegation Code Access Security Part 1, Policy Code Access Security Part 2, Enforcement Securing Web Applications Securing Web Services Securing System.Runtime.Remoting Securing COM+ Dumb Code: avoid writing code with silly security holes

    pdf368p goldit 09-10-2010 81 19   Download

  • Ever feel as though Windows XP was running YOU, instead of the other way around? Maybe it's time to show Windows who's boss. Make it run YOUR way. Get rid of the stuff that doesn't help you do what you want to do. Soup up security so you're better protected against spyware and other nasties. Find things faster with more efficient searches. Woody Leonhard shows you exactly how to do it in Windows XP Hacks & Mods For Dummies.

    pdf387p possibletb 29-11-2012 47 19   Download

  • Hello, and welcome to Windows NT Security Step-by-step, a survival guide for Windows NT security. This presentation is based on the material from the SANS Institute Windows NT Security Step-by-step Guide, which offers a consensus document by security professionals from 87 large organizations. It helps show you what you need to do to have a secure Windows NT implementation.

    pdf37p huyhoang 07-08-2009 75 7   Download

  • One of the great sources of productivity and effectiveness in the community of computer professionals is the willingness of active practitioners to take time from their busy lives to share some of the lessons they have learned and the techniques they have perfected. Much of the sharing takes place through online news groups, through web postings, and through presentations at technical meetings, and those who are able to take the time to scan the newsgroups, surf the web, and attend the meetings often gain measurably from those interactions....

    pdf56p vuthuong 08-08-2009 59 6   Download

  • WHY SECURITY As computers becoming a part of our daily routine, we end up in leaving some of our sensitive information on our PC’s. These starts from Password’s, E-Mail Id’s, Credit card numbers, online banking details etc. Then there is another risk called viruses and spyware when you are online. There is only one fundamental difference between a virus and spyware, viruses are written for destruction and spywares for gain. When we speak about computer security what it means is that, how we can prevent intruders from entering our systems.

    pdf0p khangoc2399 21-09-2012 30 4   Download

  • A layer communicates with the equivalent layer in a different node. In order to get data to a peer layer, though, the layer at the transmitting node gives the data to the layer below it (on the same node), which adds a header containing additional information if necessary, and that layer in turn gives it to the layer below. As the packet is received by the destination node, each layer reads and strips off its own header, so that the packet received by layer n looks to that layer just like it did when it was sent down to layer n−1 for transmission. This seven-layer model...

    pdf85p cao_can 02-01-2013 22 4   Download

  • In collaboration with the Programme MicroSave Africa, Postbanks in Kenya and Tanzania designed and introduced flexible savings accounts with unrestricted withdrawals to accommodate small busi- ness people who want to transact regularly. However, the success of these products went beyond the original target group with many banks’ passbook owners shifting and subscribing. Over time the success of Bidii account and Domiciled Quick account also reached high value account holders Bidii Account and Quick Account are card based and computer operated.

    pdf6p machuavo 19-01-2013 15 3   Download

  • As mentioned, the DNS “phone book” looks like a hierarchical system. This is also reflected in how the actual database which holds the information is implemented. Instead of having a big database containing answers to all queries, DNS works by delegating the responsibility, or “authority”, for each hierarchical component (i.e., a subtree of the DNS hierarchical tree, also called a “zone”) to the servers that should be responsible for that component. These servers can further sub-delegate authority, resulting in a distributed database based on a tree topology....

    pdf43p cao_can 02-01-2013 28 2   Download

  • Chuẩn bị - Logon vào với Administrator, tạo user có tên là u1, đặt password là u1 - Logoff Administrator , Logon u1 - Logoff u1, Logon Administrator, Khởi động Vào menu Start, Program, Administrator Tools, Local Security Policy hoặc vào Start, Run, secpol.msc Cửa sổ trên giống một phần của cửa sổ Group Policy Object Editor (gpedit.msc) ở mục Computer Configuration ,Windows Settings, Security Settings cho nên ta có thể dùng gpedit.msc để xác định local Security Policy. ...

    pdf11p ht09dng 08-08-2010 425 141   Download

  • Tìm hiểu về DHCP Server Security (phần 1) Trong phần 1 này, chúng ta sẽ cùng nhau tìm hiểu về các mối hiểm họa đối với hệ thống DHCP server và tìm cách giảm thiểu tối đa các biện pháp an ninh phòng chống. Trong phần 2, chúng ta sẽ tiếp tục với các bước thực hiện và công cụ phổ biến dành cho những người quản trị, qua đó đảm bảo được tính bảo mật của hệ thống DHCP server của Windows 2000 và Windows Server 2003.

    pdf7p alone 20-07-2010 176 111   Download

  • Tìm hiểu về DHCP Server Security (phần 2) Trong phần 1, chúng ta đã điểm qua 1 vài tình huống điển hình thường gặp của DHCP server cùng vài phương pháp cơ bản để phòng tránh. Trong phần 2 này, chúng ta sẽ tiếp tục với những phương pháp hiệu quả và công cụ sử dụng để tăng cường tính bảo mật của DHCP server trong nền tảng Windows 2000 và Windows Server 2003.

    pdf9p alone 20-07-2010 154 92   Download

Đồng bộ tài khoản