Book description
Configure and manage your PC network-and help combat privacy and security threats-from the inside out! This book packs hundreds of timesaving solutions, troubleshooting tips, and workarounds, all in concise, fast-answer format.
Table of contents
-
Microsoft® Windows XP Networking and Security Inside Out
- Acknowledgments
- We'd Like to Hear from You!
- About the CD
- Conventions and Features Used in This Book
-
1. Windows Networking and Security Essentials
- 1. Windows Networking and Security 101
- 2. Computer Security: Are You at Risk?
-
3. Windows Security Tools and Techniques
- What Are User Accounts?
- Controlling the Logon and Authentication Process
- Ensuring the Security of Files
-
Securing Your Computer: A Checklist
- 1. Install and Configure a Firewall
- 2. Install All Windows Security Updates
- 3. Install and Configure Antivirus Software
- 4. Eliminate or Disable Unused Accounts
- 5. Set Strong Passwords for All User Accounts
- 6. Tighten Logon Security for All Users
- 7. Use NTFS for All Drives
- 8. Review NTFS Permissions on All Data Directories
- 9. Review All Network Shares
- 10. Use Your Screen Saver as a Security Device
- 11. Create a Backup
- Advanced Security Options
- 4. Managing User Accounts and Passwords
-
5. Securing a Shared Computer
- Using NTFS Permissions for Access Control
- Locking Up Personal Documents
- Sharing Documents Securely on a Multiuser Computer
- Restricting Access to Programs
- Restricting Access to the Registry
- Managing Removable Storage Devices and Printers
- 6. Preventing Data Loss
- 7. Keeping Your System Secure
-
2. Smart, Secure Networking
-
8. Setting Up a Secure Home or Small Business Network
- Choosing a Network Type
- Setting Up Your Network Hardware
- Configuring Your Network
- Managing Network Connections
- Securing Network Connections
- Sharing Information Across Your Network
- 9. Sharing an Internet Connection
- 10. Wireless Networking
-
11. Working with a Corporate Network
- Introducing Windows-Based Domains
- Joining a Domain
- Working on a Domain-Based Computer
- Connecting Remotely to a Corporate Network
-
8. Setting Up a Secure Home or Small Business Network
-
3. Protecting Your Personal Computer
-
12. Making Internet Explorer More Secure
- When Web Pages Go Bad
- Following Safe Browsing Practices
- Using Security Zones
- Managing Browser Add-Ons
- Managing ActiveX Controls
- Managing Java Applets
- 13. Blocking Spyware, Adware, and Other Unwanted Software
- 14. Stopping Viruses, Worms, and Trojan Horses
-
15. Securing E-Mail and Instant Messages
-
Protecting Yourself from Hazardous Attachments
-
Attachment and Automation Security in Outlook
- Determining Whether You Have the Security Update
- How the Security Update Handles File Attachments
- How the Security Update Handles Microsoft Office Documents
- The Outlook Object Model and the Security Update
- Adding the Security Update to Your System
- Customizing the Security Update in Outlook 2002 and Outlook 2003
- Workarounds for the Security Update
- Attachment Security Without the E-Mail Security Update
- Attachment Security in Outlook Express
-
Attachment and Automation Security in Outlook
- Protecting Yourself from Rogue HTML
- Using Web-Based E-Mail Securely
- Protecting E-Mail from Prying Eyes
- Using Instant Messaging Safely
-
Protecting Yourself from Hazardous Attachments
- 16. Blocking Spam
- 17. Securing Your Computer by Using a Firewall
-
18. Protecting Your Privacy
- Protecting Your Identity
- Avoiding Losses from "Phishing" Attacks
- Ensuring Your Children's Safety and Privacy
- Managing Cookies
- Watching for Web Bugs
- Browsing Anonymously
-
Covering Your Tracks
- Eliminating Your Internet Explorer History
- Erasing Your Internet Explorer AutoComplete History
- Turning Off Inline AutoComplete in Internet Explorer
- Clearing Your Recent Documents List
- Eliminating Recent Document History on Exit
- Eliminating Applications' Most-Recently-Used Lists and the Recent Documents Menu
- Using Third-Party Cleaners
-
12. Making Internet Explorer More Secure
-
4. Extreme Security
- 19. Securing Ports and Protocols
-
20. Installing and Using Digital Certificates
- What Are Digital Certificates?
- Obtaining a Personal Certificate
- Managing Your Certificates
- 21. Encrypting Files and Folders
- 22. Managing Security Through Group Policy and Security Templates
- 23. Monitoring Security Events
-
5. Appendix
-
A. The Ten Immutable Laws of Security
- Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore.
- Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore.
- Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.
- Law #4: If you allow a bad guy to upload programs to your Web site, it's not your Web site anymore.
- Law #5: Weak passwords trump strong security.
- Law #6: A computer is only as secure as the administrator is trustworthy.
- Law #7: Encrypted data is only as secure as the decryption key.
- Law #8: An out-of-date virus scanner is only marginally better than no virus scanner at all.
- Law #9: Absolute anonymity isn't practical, in real life or on the Web.
- Law #10: Technology is not a panacea.
-
A. The Ten Immutable Laws of Security
- Index
Product information
- Title: Microsoft® Windows® XP Networking and Security Inside Out: Also Covers Windows 2000
- Author(s):
- Release date: September 2005
- Publisher(s): Microsoft Press
- ISBN: 9780735620421
You might also like
book
Microsoft® Windows® Internals: Microsoft Windows Server™ 2003, Windows XP, and Windows 2000, 4th Edition
The premier guide to the Windows kernel now covers Windows Server 2003, Windows XP, and Windows …
book
Microsoft® Windows® 2000 Security Handbook
Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing …
book
Windows Server® 2008 Security Resource Kit
Visit the catalog page for Microsoft® Windows Server 2008™ Security Resource KitVisit the errata page for …
book
Self-Paced Training Kit (Exam 70-640): Configuring Windows Server® 2008 Active Directory® (2nd Edition)
EXAM PREP GUIDE Fully updated for Windows Server 2008 R2! Ace your preparation for the skills …