Good offense is best defense against Back Orifice

Heiser, Jay
August 1999
Network World;08/09/99, Vol. 16 Issue 32, p39
Trade Publication
Offers advice to network administrators about defending against Back Orifice 2000. Creation of backdoors on Windows computers; User awareness as best defense.


Related Articles

  • How Windows Server 2012 Eases the Pain of Kerberos Constrained Delegation, Part 2. Stephens, Mike // Windows IT Pro;Apr2013, Vol. 19 Issue 4, p24 

    The article discussed the work of resource-based Kerberos Constrained Delegation (KCD) in providing message flow and more technical depth with Windows Server 2012. It explains client to front-end authentication from the client request for local Key Distribution Center (KDC) to target service...

  • A Bullish Outlook for Longhorn Security. Rist, Oliver // InfoWorld;3/26/2007, Vol. 29 Issue 13, p18 

    The article looks at the security features of Microsoft's Longhorn server operating system (OS). According to the author, the security features of Longhorn remained promising when it was on its prebeta 3. The firewall of the OS will combine firewall and Internet Protocol Security management....

  • Microsoft to Pull Windows Server 2003 Support Next Year. Hernandez, Pedro // eWeek;7/17/2014, p6 

    The article reports that computer company Microsoft Corp. will end support for the server operating system Windows Server 2003 on July 14, 2015. Topics discussed include 37 updates issued by Microsoft for Windows Server 2003 in 2013, the company's warning to data center operators about the...

  • Using Windows Server 2012 Hyper-V Replica. Savill, John // Windows IT Pro;Apr2013, Vol. 19 Issue 4, p32 

    The article discusses the use of Hyper-V Replica technology for expanding disaster-recovery in Windows Server 2012 through asynchronous replication of virtual machine (VM) to another Hyper-V host. It explains the configuration of a replica Hyper-V server, the storage area network (SAN)-level...

  • SECURITY GOES ON THE OFFENSIVE. Vizard, Michael // Baseline;Dec2006 Supplement, p33 

    The author discusses the proactive security models and their benefits for the organizations. The author refers to Microsoft's Vista, its latest operating system, with improved features of anti-malware and encryption tools. The author also provides information on a new security processor called...

  • A Window on Admin Right Dangers. Kenyon, Paul // Software World;Jan2012, Vol. 43 Issue 1, p8 

    The article offers tips on how to secure the admin rights of Windows 7 operating system. The author mentions that despite many companies that used Windows 7, they are exposed to security problems, thus Microsoft created Windows 8. He states that the security improvements in Windows 8 are not...

  • Micronet adds CD writer for PCs.  // Seybold Report on Desktop Publishing;5/8/95, Vol. 9 Issue 9, p9 

    Reports on Micronet Technology's introduction of Master CD Pro, a CD-ROM recording system for MS-DOS computers that couples a quadruple-speed CD writer with Corel's CD Creator recording software. Product features; System of operation; Retail price.

  • 32-bit applications set to roll, but many will lag behind Windows 95. Crane, Elizabeth // InfoWorld;8/21/95, Vol. 17 Issue 34, p60 

    Features various 32-bit computer software supporting the Windows 95 operating system. Includes Arcland Inc.'s FlowModel; Autodesk Inc.'s AutoCAD LT2; Claris Corp.'s ClarisWorks 4.0.

  • Disk partitions and Win95 gems. Holtzman, Jeff // Popular Electronics;Jun96, Vol. 13 Issue 6, p60 

    Features several computer software compatible with the Windows 95 computer operating system. DOS Explore; Windows Commander; Hot Corners; WinBrowse; Aeco Zip Explorer; Power Toys; Trayicon; ACTS; WinGrep.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics