Locking down NT networks

Burns, Christine
October 1998
Network World;10/19/98, Vol. 15 Issue 42, p30
Trade Publication
Reports on the strategies Microsoft Windows NT customers used to plug the security holes in the computer network software. Use of third-party developer software; Instituting consistent corporate policies regarding network administration rights; Use of intrusion detection tools to monitor all networked computers.


Related Articles

  • Understanding Spyware: Risk and Response. Ames, Wes // IT Professional;Sep/Oct2004, Vol. 6 Issue 5, p25 

    Spyware is a relatively new phenomenon, affecting more than 50 percent of Windows operating systems failures, as reported by users to Microsoft. It can sneak onto computer systems, monitor them, capture user data and transmit it to third parties. It is the aim of this article to discuss how...

  • Calculating Costs of a DEFENSE SYSTEM.  // Baseline;Apr2006, Issue 57, p45 

    The article presents information on a computer system defense system project against bot attacks. The project will provide protection from the garbage traffic bursts that Denial of Service (DoS) creators use to take Web sites out of service. It will take a critical look at networks' security...

  • WINDOWS ON SECURITY: THE NEXT GENERATION. Lewis, Peter // Fortune International (Europe);7/12/2004, Vol. 150 Issue 1, p24 

    Evaluates the new features in a free Windows upgrade, Windows XP SP2 from Microsoft.com. How the upgrade will give computers much-needed protection from viruses, worms and other nuisances; Outlook for release of the upgrade in August 2004; Overview of features, including a new Security Center...

  • Windows XP's Big F!X. Thurrott, Paul // PCWorld;Sep2004, Vol. 22 Issue 9, p123 

    This article features the Service Pack 2 (SP2) for Windows XP computer security software from Microsoft. The software allegedly makes Wireless-Fidelity and Bluetooth networks easier to navigate, adds new features to Tablet and Media Center personal computers, and updates the multimedia...

  • HONEYPOTS WREAK SWEET REVENGE AGAINST CYBER INTRUDERS. Schwartau, Winn // Network World;12/04/2000, Vol. 17 Issue 49, p63 

    Discusses the addition of a dedicated deception server with the sole purpose of handling attacks from disgruntled employees and other malicious users with legitimate network access. Logging at deception points or central servers; Chance to monitor activities more closely, examine attack...

  • Locking out the bad guys. Baker, Dean // Oregon Business Magazine;July97, Vol. 20 Issue 7, p67 

    Provides information on the use of encryption writing by Janaka Jayawardena, director of Portland State University's computer science and electrical engineering department for computer security. Comments from Jayawardena; Information on computer hacker, Kevin Mitnick. INSET: Hackler singled...

  • Minimize vulnerabilities.  // Administrative Professional Today;Jun2014, Vol. 40 Issue 6, p5 

    The article offers step-by-step instructions for modifying administrator rights in company computers.

  • Windows 98 remote access.  // PC Week;06/15/98, Vol. 15 Issue 24, p144 

    Presents a step by step description of accessing Windows 98 from a remote location. The Dial-Up Networking wizard; Creating a modem based connection; Entering the Internet service provider's phone number; Creating a second dial-up connection; Entering the host's Internet Protocol (IP) address...

  • Confused yet about NT passwords? Try the 7-14 rule; those numbers work better than most. McClure, Stuart; Scambray, Joel // InfoWorld;11/22/99, Vol. 21 Issue 47, p40 

    Provides information on how to restrict Windows NT passwords. Steps to follow in restricting passwords; How a seven character password can match eight in complexity; How the Lan-Manager algorithm works.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics