----------------------------------------------------------- SearchWin2000.com's Security Tip ----------------------------------------------------------- TODAY'S SECURITY TIP: The NTFS volume and permissions ============================================================ Sponsored by VeriSign - NetIQ ============================================================ NETWORK SECURITY: FREE TRIAL from NetIQ Secure your network! Security Analyzer identifies the latest-known security vulnerabilities and provides extensive reports and guidance on how to address them. This award winning software supports more than 2,300 vulnerability tests and comprehensive security configuration reporting for Windows 9x, Windows NT, Windows 2000, UNIX and Linux. Download now: http://www.webtrends.com/redirect/NSSASWT070901.htm ============================================================ Tips Summary "The NTFS volume and permissions" By Adesh Rampat Whether implementing Windows 2000 peer to peer networking or applying additional security permissions to files/folders on a Standalone PC the NTFS volume is always the best approach to use for the implementation of additional security permissions. In most cases, the NTFS volume is already created on personal computers with Windows 2000 pre-installed. However, when upgrading from Windows 98 to Windows 2000 many users can easily bypass the option of converting FAT32 volumes to NTFS. Doing so may prevent you from applying security permissions to files and folders. The good news is that a FAT32 volume can be easily converted to a NTFS volume without reinstalling Windows 2000. The following procedure shows how this is done: At the command line type convert "drive_letter": /fs:ntfs For example convert c: /fs:ntfs When this is done the administrator can grant additional security permissions to a user. Apart from security permissions, the user can get additional benefits such as disk quotas for home folders stored on the drive. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics. ======================================================== Did you like this tip? If so (or if not), why not let us know? Send an email to us at mailto:[EMAIL PROTECTED] and sound off. ======================================================== Featured Book ======================================================== "Windows 2000 Security Handbook" Author: Tom Sheldon and Phil Cox Publisher: McGraw-Hill Published: Dec 2000 Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with firewalls, proxy servers, and VPNs. http://www.digitalguru.com/dgstore/product.asp?isbn=0072124334&ac_id=73 ==================================================================== PROGRAMMING EXPERT IN FORUM -------------------------------------------------------------------- If you have a programming or application question, don't miss John Robbins, searchWin2000 Programming and Application Development Expert, in the Administrator Discussion Forum this week at http://searchwin2000.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected]. ======================================================== If you would like to sponsor this or any TechTarget.com newsletter, please contact Mike Kelly at mailto:[EMAIL PROTECTED]. ======================================================== If you no longer wish to receive this newsletter simply reply to this message with "REMOVE" in the subject line. Or, visit http://searchWin2000.techtarget.com/register and adjust your subscriptions accordingly. If you choose to unsubscribe using our automated processing, you must send the "REMOVE" request from the email account to which this newsletter was delivered. Please allow 24 hours for your "REMOVE" request to be processed.
