---------------------------------------------------------------------
SearchWin2000.com's Security Tip
---------------------------------------------------------------------
TODAY'S SECURITY TIP: Selecting a boot partition security
=====================================================================
SPONSORED BY: Rainbow
=====================================================================
Do you know who your users are sharing their password information
with? Eliminate password sharing and strengthen VPN access with the
iKey USBauthentication token. Cost effective, portable and easy to
deploy with Check Point(tm) VPN-1 SecuRemote(tm) and
SecureClient(tm). To register for a FREE demo and learn how Rainbow
Technologies iKey can eliminate password sharing, visit us at:
http://www.rainbow.com/cpss
=====================================================================
"Selecting a boot partition security"
By Adesh Rampat
When you set up a boot partition on a network server, chances are you
may use NTFS, as opposed to FAT, for the following major reasons:
- Security
- Assigning Disk Quotas
- Encryption features
- Transaction logging
But even though it seems counter-intuitive, when you install either
Windows NT or Win2k, consider partitioning the hard drive into two
separate partitions, making the boot partition FAT and the reminder
NTFS.
This may seem to be a risky procedure, since FAT partitions contain
no measure of security. The reason for using FAT as the boot
partition, though, is that in the event of a boot failure, it is much
easier to apply recovery procedures to a FAT partition than an NTFS
partition.
Because the FAT partition offers the least security you can get, it
must contain only the operating system. In no circumstance should the
FAT partition contain any applications or data pertaining to the
organization's operations. This information should be stored on the
NTFS partition.
Whether you're using FAT or NTFS partitions, you should have the
server in a secure environment, protecting it from unauthorized
personnel at all times.
---------------------------------------------------------------------
Adesh Rampat is a member of the Association of Internet
Professionals, the Institute for Network Professionals and the
International Webmasters Association. He has also lectured
extensively on a variety of topics.
=====================================================================
SPONSORED BY: SurfControl
=====================================================================
WARNING: Networks bottleneck & costs climb as workers squander hours
on-line casual surfing, listening to the radio via the Internet,
downloading MP3s, video & other bandwidth hogs. Install SurfControl
on your network & in 20 min you'll know exactly WHO is doing WHAT,
WHEN & WHERE on the Internet. SurfControl monitors, records & manages
all TCP/IP protocols. You've got responsibility for the network,
download an easy way to manage it. Try SurfControl FREE for 30 days.
http://www.surfcontrol.com/promo/TTDN0430
=====================================================================
=====================================================================
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TIP OF THE MONTH CONTEST!
Introducing searchWin2000's Tip Exchange - a place for you and your
peers to read and submit technical tips!
The Administrator tip category is really hot! We've already received
over 40 user-submitted tips! Check them out today and be sure to
vote on them, because tip ratings count toward winning the ultimate
prize -- a Sony Vaio Music Clip 64MB MP3 Player! Submit your own tip
while you're there, and you'll be eligible to win, too.
http://searchwin2000.techtarget.com/tipsIndex/0,289482,sid1_tax5e3,00.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
=====================================================================
FEATURED BOOK
=====================================================================
"Windows 2000 Security Handbook"
Author: Tom Sheldon and Phil Cox
Publisher: McGraw-Hill
Published: Dec. 2000
Deploy and administer bullet-proof Windows 2000 security policies.
This book explains how to safeguard intranet, Internet, and
e-commerce transactions with IPSec, defend against hacking, spoofing,
sniffing, and DDS attacks, and secure your network with firewalls,
proxy servers, and VPNs.
http://www.digitalguru.com/dgstore/product.asp?isbn=0072124334&ac_id=73
---------------------------------------------------------------------
TAKE OUR NEW SURVEY
---------------------------------------------------------------------
Don't miss out on your chance to be part of an extensive survey being
conducted by searchWin2000 and a handful of other techtarget.com
sites. Here's your chance to weigh in on what platform or platforms
your company uses to run mission-critical applications.
Also, tell us what your ideal network would be and what you would do
if you could make all of the technology decisions for your company.
Just click on the link below to take the survey now.
http://www.insightexpress.com/ix/showSurvey.asp?id=26642&accessCode=5477574934&noemail=true
=====================================================================
To Remove your email address from the distribution list for this
specific newsletter "Reply" to this message with REMOVE in the
subject line. You will receive an email confirming that you have been
removed. To Remove yourself from additional distribution lists or to
update your preferences, go to the searchWin2000.com registration
page at:
http://searchWin2000.techtarget.com/register