Chapter 14. Implementing Network Security
In This Chapter
- Deactivating the Sharing Wizard
- Setting Sharing Permissions on Shared Folders
- Setting Security Permissions on Shared Folders
- Hiding Your Shared Folders
- Disabling the Hidden Administrative Shares
- Removing Stored Remote Desktop Credentials
- Preventing Users from Logging On at Certain Times
- Hiding the Usernames in the Logon Screen
- Running the Baseline Security Analyzer on Your Network
- From Here
If you have just one computer and you’re the only person who uses it, your setup is inherently secure. True, if your computer contains sensitive or personal data, you probably still want to password-protect your account just in case, say, your computer gets stolen. Other than that, you need not ...
Get Networking with Microsoft® Windows Vista™: Your Guide to Easy and Secure Windows Vista Networking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.