=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SEARCHWIN2000.COM | Security Tip
November 13, 2001

Essential tools and advice for the security-focused administrator. 
More Tips: http://searchwin2000.techtarget.com/tips/
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

IN THIS ISSUE | Table of Contents

1. SECURITY TIPS 
   - Security Tip: Tracking comings and goings
   - Security Tip: Require Windows 9x logon
   - Security Tip: Organizing group accounts

2. IMPORTANT ANNOUNCEMENTS AND LINKS
   - Win a PenCam 64MB Mini Digital Camera!
   - This week in Bill Boswell's Admin Corner: File System Security
   - Security patch management - what our expert had to say

____________________________________________________________________
************SPONSORED BY: VeriSign - The Value of Trust*************

Secure your servers with 128-bit SSL encryption! Grab your copy of
VeriSign's FREE Guide, "Securing Your Web site for Business," and
you'll learn everything you need to know about using 128-bit SSL to
encrypt your e-commerce transactions, secure your corporate intranets
and authenticate your Web sites. 128-bit SSL is serious security for
your online business. Get it now! 
http://www.verisign.com/cgi-bin/go.cgi?a=n094456080057000

____________________________________________________________________

TRACKING COMINGS AND GOINGS | by Adesh Rampat

If there is a security problem at your company, Windows can help.
This tip explains how you can use Windows to track the arrival and
departure (well, the network logon) for employees. So if something
funny is happening to the network, or equipment is developing legs,
you can see who was on the network (and, therefore, likely in the
office) when the untoward events happened.

>> CLICK for the Full Tip...
http://www.searchWin2000.com/tip/1,289483,sid1_gci781295,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
REQUIRE WINDOWS 9X LOGON | by Jeff Cruson

Even though Windows 9x/Me may present you with a prompt to enter a
username and password, you likely know that this can be easily
bypassed. If the machine belongs to a network with a Windows NT/2000
domain, you can force Windows 9x to require proper authentication
with the network in order to logon with a simple registry tweak.

>> CLICK for the Full Tip... 
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci780385,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
ORGANIZING GROUP ACCOUNTS | by Adesh Rampat

The following steps can be taken to keep someone who no longer
belongs to a group account from accessing protected information.

>> CLICK for the Full Tip...   
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci755450,00.html

__________________________________________________________________
IMPORTANT MESSAGES AND LINKS:

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
WIN A MINI DIGITAL CAMERA! | Tip of the Month Contest

November's tip of the month contest is here! This month's super-cool
prize is a PenCam 64MB Mini Digital Camera! Submit your
Windows-related tip today for your chance to win!
http://searchwin2000.techtarget.com/tipsHallOfFame/0,289489,sid1_prz764589_cts764586,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
BILL BOSWELL'S ADMIN CORNER | File System Security

Users have legitimate expectations of privacy and personal control
when it comes to putting their files on our servers rather than
tucking them away on their local drives. In a new feature starting
this Wednesday, site expert Bill Boswell will offer ideas on
effective ways to use NTFS permissions, the Encrypting File system
and third-party tools to manage and control access to user data. 

Join Bill for a discussion of privacy and personal control issues and
share your own experiences and techniques in our Administrator
Forum...
http://searchwin2000.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected]!viewtype=&skip=&expand=

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SECURITY PATCH MANAGEMENT | Discussion Day Wrap-up

Last week, expert Chris Andrews fielded dozens of your toughest
security patch management questions in our Security Forum. Find out
what Andrews had to say about verifying patch status, the virus
versus worm debate and more.
http://searchwindowsmanageability.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected]!viewtype=&skip=&expand=

___________________________________________________________________
********************* SEARCHWIN2000 CONTACTS **********************

 TIP MAILBOX, (mailto:[EMAIL PROTECTED])
   >> Send us feedback on tips and ideas for new tip content.
____________________________________________________________________

 MARILYN COHODAS, Site Editor (mailto:[EMAIL PROTECTED])
   >> Send us your original articles and best practices.
____________________________________________________________________

 CHRISTINE POLEWARCZYK, Assistant Editor
 (mailto:[EMAIL PROTECTED])
   >> Send your white papers and Best Web Links.
____________________________________________________________________

 PEGGY ROUSE, Assistant Editor (mailto:[EMAIL PROTECTED])
   >> Send feedback on Ask the Experts and discussion forums.
____________________________________________________________________

 ED PARRY, News Editor (mailto:[EMAIL PROTECTED])
   >> Send in your product announcements and poll ideas.
____________________________________________________________________

 MIKE KELLY (mailto:[EMAIL PROTECTED])
   >> Sponsor this or any other TechTarget newsletter.
____________________________________________________________________


____________________________________________________________________
*********************  ABOUT THIS NEWSLETTER   *********************

Created by TechTarget (http://www.techtarget.com)
TechTarget - The Most Targeted IT Media
Copyright 2001, All Rights Reserved.



If you no longer wish to receive this newsletter simply reply to 
this message with "REMOVE" in the subject line.  Or, visit 
http://searchWin2000.techtarget.com/register 
and adjust your subscriptions accordingly. 

If you choose to unsubscribe using our automated processing, you 
must send the "REMOVE" request from the email account to which 
this newsletter was delivered.  Please allow 24 hours for your 
"REMOVE" request to be processed.

Reply via email to