=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SEARCHWIN2000.COM | Security Tip
May 21, 2002

Essential tools and advice for the security-focused administrator.  
More tips: http://searchwin2000.techtarget.com/tips/

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSORS:

-FREE 30 Day Security Toolset  
http://searchWin2000.com/r/0,,3478,00.htm?TNTSoftware
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

IN THIS ISSUE | Table of Contents

1. SECURITY TIPS 
   - Control code execution 
   - Countermeasures for key logging
   - NC medical center beefs up user management

2. IMPORTANT ANNOUNCEMENTS AND LINKS
   - Infosec Know-IT-All Trivia: Test your security knowledge
   - New Feature: The .NET Info Center
   - Online Event: Staying secure during an NT to 2000 migration
   - Tip of the Month Contest: Samsung DVD-S221 DVD/MP3 Player

____________________________________________________________________
******************* SPONSORED BY: TNT Software  ********************

...15 min. later he was in the Principal's office. 

A high school network administrator installed ELM Log Manager(tm) 3.0
on classroom servers to evaluate system performance.  The next day,
it paged him when a student was trying to break into the system.
Within 15 minutes, the would-be hacker was in the Principal's office
waiting for his parents to arrive. For a 30 day evaluation copy
visit: http://searchWin2000.com/r/0,,3478,00.htm?TNTSoftware
____________________________________________________________________

CONTROL CODE EXECUTION | by Tom Lancaster

As an administrator of a Windows network, you know your users are
morally obligated to open every attachment that is e-mailed to them. 
They're also determined to download and install simple programs such
as screen-savers, peer-to-peer downloading systems and more that are
increasingly filled with spyware, adware and hidden distributed
computing programs. For an added layer of protection, you should
consider controlling execution at the file-system layer.

>> CLICK for the full tip...
http://www.searchWin2000.com/tip/1,289483,sid1_gci824475,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
COUNTERMEASURES FOR KEYLOGGING | by James Michael Stewart

There are some frightening developments in the arena of information
gathering, such as keystroke-capturing devices. A keystroke-capturing
device is a small hardware device that is attached to a computer
system without the knowledge of the intended victim. Usually they are
attached between the computer case and the keyboard connector, and
are so small that most of us would not even notice their presence. 

>> CLICK for the full tip...
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci818681,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NC MEDICAL CENTER BEEFS UP USER MANAGEMENT | by Meredith B. Derby  

Users kept dropping off data security analyst Kamie Bullins' radar.
Her Windows NT system tools couldn't track the hospital's 10,000 user
accounts and over 7,000 global groups. So began Bullins' search for a
a management tool that would facilitate user tracking, assist in the
Win2k migration and offer strong privacy and security functions. 

>> CLICK for the full tip...
http://searchwindowsmanageability.techtarget.com/tip/1,289483,sid33_gci824158,00.html

___________________________________________________________________
IMPORTANT MESSAGES AND LINKS:

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TEST YOUR SECURITY KNOWLEDGE | Infosec Know-IT-All Trivia

How much do you know about creating, implementing and enforcing
security policies? Put your knowledge to the test with this set of
trivia questions. There's also a variety of resources to verify your
answers and help you learn more about managing information security
policies. 

>> CLICK for the full quiz...
http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci822877,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
THE .NET INFO CENTER | New Feature

Introducing the .NET Info Center featuring news, resources and expert
advice on all things .NET. As an IT professional you know that .NET
is on your radar screen. At the .NET Info Center you will be able to
stay on top of all the latest news, tips and have direct access to
experts in the field. Also, you will have access to information
direct from Microsoft.

>>CLICK to check it out...
http://searchvb.techtarget.com/vsnetHome

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
STAYING SECURING DURING AN NT TO 2000 MIGRATION | Online Event

Who:   Paul Hinsberg, author, consultant and technical trainer
When:  May 30, 2002 at 01:00 PM EDT (17:00 GMT)

Active Directory may be vying for all your attention during your NT
to Win2k migration, but don't let security fall off the radar. As you
transition your servers from NT4 to Win2k, make sure you're not
leaving any security holes in your system infrastructure. 

>>CLICK to pre-register...
http://searchwin2000.techtarget.com/onlineEvents/0,289675,sid1,00.html
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
WIN A SAMSUNG DVD-S221 DVD/MP3 PLAYER | Tip of the Month Contest

Win a Samsung DVD-S221 DVD/MP3 player. How? Send us your
Windows-related tips. Check out the prize and submit your tip here:
http://searchwin2000.techtarget.com/tipsHallOfFame/0,289489,sid1_prz764589_cts764586,00.html

___________________________________________________________________
********************* SEARCHWIN2000 CONTACTS **********************

 TIP MAILBOX, (mailto:[EMAIL PROTECTED])
   >> Send feedback on tips and ideas for new tip content.
____________________________________________________________________
 
 MARILYN COHODAS, Site Editor (mailto:[EMAIL PROTECTED])
   >> Send me your original articles and best practices.
____________________________________________________________________

 CHRISTINE POLEWARCZYK, Assistant Editor
 (mailto:[EMAIL PROTECTED])
   >> Send me your ideas for online event and discussion day topics.
____________________________________________________________________

 DAVID PYE, Assistant Editor (mailto:[EMAIL PROTECTED])
   >> Send me your tips, white papers and favorite Web sites.
____________________________________________________________________

 DAVID GABEL, Executive Tech Editor (mailto:[EMAIL PROTECTED])
   >> Send me your technical tips and tip ideas.
____________________________________________________________________

 MARGIE SEMILOF, Senior News Writer (mailto:[EMAIL PROTECTED])
   >> Send me your news and story ideas.
____________________________________________________________________

 MIKE KELLY (mailto:[EMAIL PROTECTED])
   >> Sponsor this or any other TechTarget newsletter.
____________________________________________________________________

____________________________________________________________________
********************* ABOUT THIS NEWSLETTER ************************

Created by TechTarget (http://www.techtarget.com)
TechTarget - The Most Targeted IT Media
Copyright 2002, All Rights Reserved.


Unsubscribe from 'Windows Security Tips'
 - Simply Reply to this Email with REMOVE within the Body or Subject
>  or
 - Go to: http://searchWin2000.techtarget.com/register
 - Log in to edit your profile.
 - Click on the link to Edit email subscriptions.
 - Uncheck the box next to the newsletter you wish 
   to unsubscribe from.
 - When finished, click "Save Changes to My Profile."


Reply via email to