Advert

Planning a Security Update Infrastructure

Last edited by . Total of no comments in the discussion.

Security Update Overview A software update is a file(s) that needs to be applied to a computer running a Windows operating system to correct an existing issue or problem, or to add enhancements and additional features. An update is also referred to as a patch. An update can only be applied to specific software which is installed already. All Microsoft updates are implemented in the form of an executable file that has an .exe extension, and each update is set to back up all files that they replace. A security Read More

Share on:

How to Remove the Administrative Mode in Vista

Last edited by . Total of no comments in the discussion.

The new MS Vista operating system is trying to be much tougher on viruses, trojan horses and other forms of malware. However, to implement this tough approach, Vista employs UAC (User Account Control) as the default setting. Vista UAC while is a great tool and resource for many to have on their computer, it does get on some peoples nerves. For experienced or power users, it can be down-right annoying, the reason being that any function that can limit security requires an administrator-level user level. Moreover, one must click through Read More

Share on:

Shared Folder Permissions

Last edited by . Total of 11 comments in the discussion.

Shared folder permissions are used to restrict access to a folder or file that is shared over a network. Folder sharing is normally used to grant remote users access to files and folders over a network. Web sharing grants remote users access to files from the Web if Internet Information Services (IIS) is installed. Members of the Administrators or Power Users group can share folders on a Windows member server. Users have to be members of the Administrators or Server Operators group to share folders on a domain’s domain controller. Read More

Share on:

Implementing IAS

Last edited by . Total of no comments in the discussion.

Internet Authentication Service (IAS) Overview In most organizations that have multiple network access servers, the centralization of authentication and accounting of connections being established at a centralized server is the better approach than each network access server performing authentication and accounting services. The Remote Authentication Dial-In User Service (RADIUS) protocol is the recognized protocol for providing a centralized authentication, accounting, authentication and authorization for remote network access. RADIUS is a internet Engineering Task Force (IETF) standard. Essentially, the RADIUS protocol can be used to control access for dial-up networks, VPNs Read More

Share on:

How to Recover a Lost Windows Password

Last edited by . Total of 9 comments in the discussion.

There are several ways to recover a lost windows password. Hidden administrator account method, Windows installation disk, and third party software are some of the methods you can try. Hidden Administrator Account Method If using a custom user account, Windows automatically creates an “Administrator” account that is hidden from the user selection log in screen. There are two options for logging into an administrator account: The first option is to start up the machine in the welcome or log in screen and pull up the classic log in screen. Press Read More

Share on:

How to Audit Windows NT/2000/XP Passwords

Last edited by . Total of no comments in the discussion.

Microsoft Windows NT/2000/XP passwords are encrypted as 32-bit one-way hashes using the MD4 messages digest algorithm. This is similar to the way that Unix stores passwords, although the hashing algorithm is different. For compatibility with legacy Microsoft LAN Manager software, Windows NT/2000/XP also stores the passwords redundantly as a 56-bit DES (Data Encryption Standard) hash. This 56-bit hash is created by splitting the password into two 7-character uppercase strings, and then converting each to a 56-bit DES key which both then encrypt the string “KGS!@#$%” and concatenating the results. This Read More

Share on:

How to Enable the Windows Vista Administrator Account

Last edited by . Total of 7 comments in the discussion.

In Windows Vista, there is a difference between accounts with “computer administrator” privileges and the Administrator account. In the Administrator account, the User Account Control is disabled. Also, the Administrator account is present, but hidden and disabled by default. Please be aware that Vista Beta 2 has a bug that may cause big problems, if a password is created for the Administrator account in Computer Management. Enabling the Windows Vista Administrator Account Here are two methods that will teach the user how to enable the Windows Vista Administrator Account. Method Read More

Share on:

Auditing Security Events

Last edited by . Total of 1 comment in the discussion.

An Overview of Auditing Auditing enables you to determine which activities are occurring on your system. Through auditing, you can track access to objects, files and folders; as well as any modifications made to the objects, files and folders. Auditing therefore enables you to collect information associated with resource access and usage on your system by allowing you to audit system logon, file access, object access, as well as any configuration changes. An audit trail can be defined as a list of audit entries which portray the life span of Read More

Share on:

Authentication Types

Last edited by . Total of 1 comment in the discussion.

What is Authentication Authentication is the process whereby the system identifies legitimate users from unauthorized users. It is the process in which a user identifies his/her self to the system. How effective an authentication process is, is determined by the authentication protocols and mechanisms being used. Windows Server 2003 provides a few different authentication types which can be used to verify the identities of network users, including: Kerberos authentication protocol NT LAN Manager (NTLM) authentication protocol Secure Sockets Layer/Transport Security Layer (SSL/TLS) Digest authentication Smart cards Virtual Private Networking (VPN) Read More

Share on:

How to Change Your Windows Password

Last edited by . Total of 3 comments in the discussion.

Whether you want to change the password on your own computer at home, office computer, or a computer that’s networked with other users, you can easily customize your Windows settings to protect specific files and folders from others either viewing or editing them. Creating or changing the windows password is very simple. It should be noted that changing your password on Windows will differ, depending on whether you are on a stand alone computer or a computer that is connected to a network domain (workgroup). Change your Windows password on Read More

Share on: