=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SEARCHWIN2000.COM | Security Administration Tip Nov. 26, 2002
Essential tools and advice for the security-focused administrator. More tips: http://searchwin2000.techtarget.com/tips/ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSORS: - Secure all your Web servers now -- with a proven 5-part strategy http://searchWin2000.com/r/0,,7893,00.htm?freeguide =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IN THIS ISSUE | Table of Contents 1. SECURITY TIPS - Set up the screen saver - Try a desktop firewall - Fingerprint scanners can be fooled - Two-factor authentication grows up 2. IMPORTANT ANNOUNCEMENTS AND LINKS - Ask Roberta Bragg: Secure broadband Web access through our LAN - Exclusive Article: Experts' map to MS management training - Admin Know-IT-all Quiz #12: Twain and suffering - Tip Contest: Down to the wire -- rate November's top tips! ____________________________________________________________________ Sponsored by: VeriSign - The Value of Trust Secure all your Web servers now - with a proven 5-part strategy. The FREE Server Security Guide shows you how: - DEPLOY THE LATEST ENCRYPTION and authentication techniques - DELIVER TRANSPARENT PROTECTION with the strongest security without disrupting users. And more. >> Get your FREE Guide now: http://searchWin2000.com/r/0,,7893,00.htm?freeguide ____________________________________________________________________ SET UP THE SCREEN SAVER | by Adesh Rampat When users of a Windows NT computer leave their workstations, they should lock them (CTRL-ALT-DELETE), or log off whenever they are going to be away for a prolonged period of time. We all know that, but almost no one does it. The solution is an automatic procedure that kicks in once the computer is idle. One such process, that does not require user input and can be automatically activated, is the screen saver. >> CLICK for the full tip... http://www.searchWin2000.com/tip/1,289483,sid1_gci865483,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TRY A DESKTOP FIREWALL | by Tom Lancaster Desktop firewall products have been popular for a year or two now and are often employed for the obvious reason that millions of people are connecting their PCs to "always on" cable and DSL modems. The focus has been on preventing unwanted traffic from entering your PC, but most desktop firewall software is equally adept at blocking unwanted traffic from leaving your PC as well. >> CLICK for the full tip... http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci863904,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FINGERPRINT SCANNERS CAN BE FOOLED | by James Michael Stewart Biometrics are rapidly becoming a popular means for adding security factors to user authentication. However, many biometric scanning systems are not as foolproof and reliable as you might think. You've seen movies demonstrate numerous means by which fingerprint scanners can be bypassed, from latex gloves with fake imprints to fingerprint-projecting LCD panels -- not to mention using someone's chopped-off finger as a portable verification key. These fantastic measures are not far from reality. >> CLICK for the full tip... http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci833601,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TWO-FACTOR AUTHENTICATION GROWS UP | by Benjamin Vigil Two-factor authentication remains one of the most secure ways to extend access to remote employees. Simply put, the two factors are something the user knows -- a password -- and either something they have -- a token, a mobile phone or even their own PC -- or something they are -- biometrics. Deciding to invest in this technology has a lot to do with how secure you need your network to be and whether remote employees understand this and consent to a retinal scan every time they log on. Of course, the use of two-factor authentication doesn't need to be that extreme or that expensive. >> CLICK for the full tip... http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci862800,00.html ___________________________________________________________________ IMPORTANT MESSAGES AND LINKS: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SECURE BROADBAND WEB ACCESS THROUGH OUR LAN? | Ask Roberta Bragg Dear Roberta: We have a network of approximately 100 users. Internet service is there for all staff via our LAN, which can be slow and painful -- for IT staff in particular. This has motivated us to get broadband Internet access for only the IT group (staff of 10). Using a firewall is an option, but we do not want to spend a lot of money on this. We were thinking of having a separate subnet, a dedicated PC for the broadband with a hub, which would distribute to the IT staff who will have two NICs in their PCs. Is this secure enough or can you suggest a better solution? >> CLICK here for Roberta Bragg's expert answer... http://searchwin2000.techtarget.com/ateQuestionNResponse/0,289625,sid1_cid501474_tax285120,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= EXPERTS' MAP TO MS MANAGEMENT TRAINING | Exclusive Article Where can IT pros get trained on Microsoft's new management tools? How much will this training cost? Our experts offer a guide to training resources and some words of wisdom about choosing the right training option. >> CLICK for the full article... http://searchwindowsmanageability.techtarget.com/originalContent/0,289142,sid33_gci865103,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TWAIN AND SUFFERING | Admin Know-IT-All Quiz #12 Test your knowledge with this week's quiz, then visit the list of related information you'll find on the answer page. Special thanks to user Adam Heinz-Herman for this week's suggestion. What does the acronym TWAIN, a familiar interface for all kinds of SCSI imaging devices, stand for? a. (T)elecommunications (W)ithout (A)n (I)P (N)ub b. (T)hinnet (W)avelength (A)ddress (I)LINK (N)ode c. (T)winaxial (W)CDMA (A)adapter (I)n (N)etwork d. (T)echnology (W)ithout (A)n (I)mportant (N)ame e. (T)ake (W)indows95 (A)nd (I)ncinerate (N)ow >> CLICK for the correct answer... http://www.searchWin2000.com/originalContent/0,289142,sid1_gci864410,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= DOWN TO THE WIRE -- RATE NOVEMBER'S TOP TIPS! | Tip Contest Fall and its foliage are rapidly drawing to a colorful finish, and so is November's user-submitted tip contest! We've got some serious contenders this month, so stop in and rate your favorites if you haven't already. A Xircom wireless Ethernet access point lies in the balance. Have a look at our leading competitors and elect your favorite candidates below! >> Replicate directories quickly with Bob Fuller: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci861404,00.html >> Read Mike Tibbs' tip on restricting Terminal Server users: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci861179,00.html >> Richard Perez provides a mobile e-mail archiving method: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci863741,00.html >> Will Martin Baker's security tip take top honors?: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci861107,00.html >> Carol Miller extols the many virtues of an audit trail tool: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci862924,00.html >> MMC consoles and Chris Williams go hand-in-hand: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci861388,00.html >> David Savoie helps out with a little NT4 recovery: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci862874,00.html >> NT remains anonymous with Paulo Seabra: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci864369,00.html >> Barbara Kadrie can help you resolve your DNS: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci864354,00.html Eyeball the prize, previous winners and then submit your own here: http://searchwin2000.techtarget.com/tipsHallOfFame/0,289489,sid1_prz764589_cts764586,00.html ___________________________________________________________________ ********************* SEARCHWIN2000 CONTACTS ********************** TIP MAILBOX, (mailto:[EMAIL PROTECTED]) >> Send feedback on tips and ideas for new tip content. ____________________________________________________________________ MARILYN COHODAS, Site Editor (mailto:[EMAIL PROTECTED]) >> Send me your original articles and best practices. ____________________________________________________________________ CHRISTINE POLEWARCZYK, Associate Editor (mailto:[EMAIL PROTECTED]) >> Send me your ideas for online event and discussion day topics. ____________________________________________________________________ DAVID PYE, Assistant Editor (mailto:[EMAIL PROTECTED]) >> Send me your tips, white papers and favorite Web sites. ____________________________________________________________________ DANA MCCURLEY, Assistant Editor (mailto:[EMAIL PROTECTED]) >> Send me your favorite Web sites and white papers. ____________________________________________________________________ MARGIE SEMILOF, Senior News Writer (mailto:[EMAIL PROTECTED]) >> Send me your news and story ideas. ____________________________________________________________________ DAVID GABEL, Executive Tech Editor (mailto:[EMAIL PROTECTED]) >> Send me your technical tips and tip ideas. ____________________________________________________________________ MIKE KELLY (mailto:[EMAIL PROTECTED]) >> Sponsor this or any other TechTarget newsletter. ____________________________________________________________________ ____________________________________________________________________ ********************* ABOUT THIS NEWSLETTER ************************ Published by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2002 TechTarget. All rights reserved. Unsubscribe from 'Windows Security Tips' - Simply Reply to this Email with REMOVE within the Body or Subject > or - Go to: http://searchWin2000.techtarget.com/register - Log in to edit your profile. - Click on the link to Edit email subscriptions. - Uncheck the box next to the newsletter you wish to unsubscribe from. - When finished, click "Save Changes to My Profile."
