[ale] FW: W2Knews: SP3 Refusniks

Matthew Brown matthew.brown at cordata.net
Mon Aug 26 10:20:56 EDT 2002



Notice 
the SP3 refusniks link.  More interesting reading on 
EULA's.
 
 
Best regards,
Matthew Brown, President
CorData, Inc.
O: (770) 795-0089
F: (404) 806-4855
E: <A 
href="mailto:matthew.brown at cordata.net">matthew.brown at cordata.net

<FONT face=Tahoma 
size=2>-----Original Message-----From: W2Knews 
[mailto:do_not_reply at w2knews.com] Sent: Monday, August 26, 2002 10:17 
AMTo: matthew.brown at cordata.netSubject: W2Knews: SP3 
Refusniks

  
  
    <IMG 
      src="http://www.w2knews.com/graphics/w2knews.jpg" align=left NOSEND="1"> 
      <FONT face="arial, verdana, sans-serif" color=#ffffff 
      size=5>Sunbelt W2Knews™ 
      Electronic Newsletter<FONT 
      face="arial, verdana, sans-serif" color=#ffffff size=1>The secret of those 
      "who always seem to know" - Over 500,000 Readers!Mon, Aug 26, 2002 
      (Vol. 7, #58 - Issue #389) 
  
    Feel free to forward 
      this newsletter to interested colleagues.To read online or subscribe, 
      go to <A 
      href="http://www.w2knews.com/?id=389">http://www.w2knews.com/?id=389Subscription 
      for <A 
      href="http://www.W2Knews.com/login.cfm?id=4448990435826275">matthew.brown at cordata.net. 
      Click to manage your profile or (gasp!) unsubscribe <IMG height=0 
      src="http://www.w2knews.com/tr/tr.cfm?mid=4448990435826275&wid=389" 
      width=0 border=0 NOSEND="1"> 
  
    SP3 Refusniks 
      
  
    <IMG height=10 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <IMG 
      height=16 src="http://www.w2knews.com/graphics/tinyw2k.gif" width=53 
      align=right NOSEND="1"> <FONT face="arial, verdana, sans-serif" 
      color=#ff0000 size=4>  This issue of W2Knews™ 
      contains:
  
    <IMG height=3 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    
      
        EDITORS CORNER 
        
          Trade Show Blunders Continued
          Remarks About X10 Cameras 
        TECH BRIEFING 
        
          Protect Against Web Application Brute Force Attacks 
        NT/2000 RELATED NEWS 
        
          SP3's Unexpected Automatic Updates Behavior
          More SP3 Bugs Surface
          SP3 Refusniks
          International Information Security Standard 
        NT/2000 THIRD PARTY NEWS 
        
          How To Stay Connected On A DHCP XP Pro Laptop - Redux
          What Do YOU Think The IT Future Is Going To Bring? 
        W2Knews 'FAVE' LINKS 
        
          This Week's Links We Like. Tips, Hints And Fun Stuff 
        BOOK OF THE WEEK 
        
          Securing Windows NT/2000: From Policies to Firewalls 
      
  
    <IMG height=10 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <IMG 
      height=16 src="http://www.w2knews.com/graphics/tinyw2k.gif" width=53 
      align=right NOSEND="1"> <FONT face="arial, verdana, sans-serif" 
      color=#ff0000 size=4>  SPONSOR: Altiris
  
    <IMG height=3 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826S1-Altiris&mid=4448990435826275" 
      target=_top><IMG src="http://www.w2knews.com/ads/altiris_logo.gif" 
      align=right border=0 NOSEND="1"> <FONT 
      face="arial, verdana, sans-serif" size=2>Calling it a migration is 
      ironic since you don't actually have to move.Altiris provides a 
      flexible, web-based technology that allows you tomigrate your LAN, 
      WAN, mobile, and remote users to XP without everleaving your desk. 
      Client Mgmt Suite is the only single-vendor, end-to-end technology 
      that supports all six steps of a successful Windowsmigration. Download 
      your free 30-day trial of Client Mgmt Suite today.Visit <A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826S1-Altiris&mid=4448990435826275" 
      target=_top>Altiris for more information. 
  
    <IMG height=10 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <IMG 
      height=16 src="http://www.w2knews.com/graphics/tinyw2k.gif" width=53 
      align=right NOSEND="1"> <FONT face="arial, verdana, sans-serif" 
      color=#ff0000 size=4>  EDITORS CORNER
  
    <IMG height=3 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    
      Trade Show Blunders Continued
      Have a look at what some one else wrote about Microsoft's Europe shows, 
      quite entertaining. "Making blunders like this by HP is by no means 
      restricted to HP. Microsoft in their great wisdom have moved the European 
      MEC (now called MS IT Forum) from its location of the past two years in 
      Nice, South France to "sunny" Copenhagen in late November. (Three years 
      ago it was in Hamburg, North Germany but at least it was late September so 
      the weather wasn't that bad). Add that location (at that cold and 
      miserable time) to the fact that the attendance fee has added to it Danish 
      taxes (at 25% - France and Germany were somewhat less) and that Danish 
      hotels are not that cheap (to say the least) and you have perhaps the 
      reason why in addition to the 300 Euro (roughly the same in dollars) early 
      bird registration reduction they are also offering an alternative 600 Euro 
      reduction to anyone *from the same company* as someone who attended this 
      year's European Tech-Ed. 
      Obviously MS has its own share of rocket scientists who didn't realise 
      that a cold and miserable and expensive Copenhagen doesn't have quite the 
      pull of a warm, sunny and relatively cheap Nice. Especially for people who 
      are based even further North than Copenhagen and have all the "benefits" 
      of cold and miserable weather already at that time of year". (Editor's 
      note: The gentleman in question lives in Helsinki, Finland)[grin] 
      Remarks About X10 Cameras
      Lots of newsgroup comments make it clear that if you are near to an 
      802.11b wireless ethernet, the X10 cameras won't work. Both systems use 
      the unlicensed 2.4 Ghz spectrum, and the spread spectrum ethernet will 
      interfere with the camera signals. Second, you do not want to point these 
      things to sensitive things. You can dream up examples yourself. There are 
      people driving around with laptops and X10 receivers hoping to pick up 
      signals of nannycams and other in-house views. There is no legislation 
      against this yet, so take care. 
      "Definition Of The Week": MEME. (pron. 'meem') A contagious idea that 
      replicates like a virus, passed on from mind to mind. Memes function the 
      same way genes and viruses do, propagating through communication networks 
      and face-to-face contact between people. The root of the word "memetics," 
      a field of study which postulates that the meme is the basic unit of 
      cultural evolution. Examples of memes include melodies, icons, fashion 
      statements and phrases. 
      Warm regards,Stu(email me with feedback: <A 
      href="mailto:feedback at w2knews.com?subject=W2Knews Issue  #389">feedback at w2knews.com) 
      
  
    <IMG height=10 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <IMG 
      height=16 src="http://www.w2knews.com/graphics/tinyw2k.gif" width=53 
      align=right NOSEND="1"> <FONT face="arial, verdana, sans-serif" 
      color=#ff0000 size=4>  SPONSOR: Content 
  Inspector
  
    <IMG height=3 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826S2-Content_Inspector&mid=4448990435826275" 
      target=_top><IMG src="http://www.w2knews.com/ads/intellireach_logo.gif" 
      align=right border=0 NOSEND="1"> <FONT 
      face="arial, verdana, sans-serif" size=2>Is Your Organization Secure 
      from Email Threats?New viruses, confidential information leaks, 
      inappropriate email content,s~pam , court ordered discovery of email 
      records. Is your organizationprepared for all of these potential 
      security issues? If not, then youremail system, your users, and your 
      organization are at risk. Download afull trial copy of Content 
      Inspector, the easy-to-use, non-invasiveExchange content security 
      product that protects your entire Exchangesystem and organization 
      against the most damaging email threats.Visit <A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826S2-Content_Inspector&mid=4448990435826275" 
      target=_top>Content Inspector for more information. 
  
    <IMG height=10 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <IMG 
      height=16 src="http://www.w2knews.com/graphics/tinyw2k.gif" width=53 
      align=right NOSEND="1"> <FONT face="arial, verdana, sans-serif" 
      color=#ff0000 size=4>  TECH BRIEFING
  
    <IMG height=3 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    
      Protect Against Web Application Brute Force 
      Attacks
      Here's an article from the eEye Digital Security team inspired by one 
      of the technical sessions at the Black Hat conference in Las Vegas. The 
      Black Hat conference a few weeks ago featured several sessions on web 
      application attack techniques. One of the more interesting techniques 
      discussed was the practice of brute forcing another person's session ID 
      based on analysis of the URL. 
      Based on a URL, one can detect certain patterns in the creation scheme 
      and then guess what other likely session IDs are being used. Based on that 
      information it is possible, within some web applications, to retrieve 
      information from other users. 
      This becomes a serious concern for home-grown web applications housing 
      sensitive financial, medical, and legal information. We have already 
      received reports of users from an unnamed medical site accidentally being 
      able to pull up another patient's records. This particular incident was 
      not an intentional misdirection, but with a little manipulation it is 
      quite possible that every patient record could have been compromised from 
      anywhere on the Internet. 
      The good news is that detecting this type of attack is fairly easy. The 
      attack method is similar in nature to a port scan of a computer, which 
      attempts to try every door until it finds one it can access, since a brute 
      force attack of session IDs uses the same logic. For example, the 
      following are valid session IDs within a URL – referred to as a URL space: 
      (stretched to prevent firewalls and filters killing this newsletter before 
      it reaches you) 
      c g i - b i n /session.c g i?sessargs=ae555YFrBTdYExs=c g i - b i n 
      /session.c g i?sessargs=ae555GjXifhgYExs=c g i - b i n /session.c g 
      i?sessargs=ae555EdasddkYExs=c g i - b i n //session.c g 
      i?sessargs=ae555JeasklskYExs=c g i - b i n /session.c g 
      i?sessargs=ae555GalslkekYExs= 
      From the above data, an attacker would attempt to brute force a key. 
      When administrators understand the logic of the brute force URL space 
      hack, the best method of detection is to set up booby-trapped IDs which 
      will trigger an alarm. Most web applications have functions that will 
      generate these IDs, and creating booby-trapped IDs is simply a matter of 
      creating an exception list inside of the app. 
      This exception list would contain IDs that would never generate data 
      and upon attempted use, and that would alert the administrator that 
      someone is attempting to brute force a web application. Another way to 
      simply prevent a brute force attack from occurring, if you use IIS as your 
      web server, is by using an IIS application firewall (such as eEye's 
      SecureIIS) which has an automated alerting mechanism for this type of 
      attack built in. 
      Similar to the methodology used by an attacker, administrators would 
      analyze what the patterns are and create an algorithm to guess the unknown 
      parts within the URL space (referred to as "fuzzing"). As admins, guessing 
      isn't necessary since in this scenario the code generation algorithms are 
      at our disposal. Looking at the session arguments listed above (sessargs), 
      we can see that the attacker will most likely fuzz inside the "=ae555" and 
      "YExs=" boundaries. 
      Fuzzers are meticulous -- they usually try every possible combination 
      within reason. This works to an administrator's advantage since we can be 
      fairly certain that obvious IDs will be used such as: 
      c g i - b i n /session.c g i?sessargs=ae555AAAAAAYExs=c g i - b i n 
      /session.c g i?sessargs=ae555BBBBBBYExs=c g i - b i n /session.c g 
      i?sessargs=ae555CCCCCCYExs=c g i - b i n /session.c g 
      i?sessargs=ae555DDDDDDYExs= 
      Adding these obviously illicit session IDs to a keyword list within the 
      application firewall and to an exception list within the web application 
      code itself will allow administrators to monitor how many attempts are 
      being made and also to drop those malicious requests before they can steal 
      any vital information through the web application. 
      Thus, with a bit of investigation about how your web apps expose data 
      in URLs, and a few customized changes to sidestep any possible fuzzers, 
      your web application content can be more secured from unauthorized users. 
      Full Eval of SecureIIS here:<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826TB-SecureIIS&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826TB-SecureIIS 
      
  
    <IMG height=10 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <IMG 
      height=16 src="http://www.w2knews.com/graphics/tinyw2k.gif" width=53 
      align=right NOSEND="1"> <FONT face="arial, verdana, sans-serif" 
      color=#ff0000 size=4>  NT/2000 RELATED NEWS
  
    <IMG height=3 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    
      SP3's Unexpected Automatic Updates Behavior
      Perhaps some of you are installing Service Pack 3 for Windows 2000. If 
      so, I want to bring the following bug to your attention. While SP3 is 
      being seen as very solid, it does seem to break Windows Update on some 
      systems. If after installing SP3, the Windows Update program breaks with 
      the error code "0x800A138F", then you will need to execute the below 
      procedure to fix the problem. 
      RESOLUTION: 
      
        go to Start, then Run Type in "regsvr32 iuctl.d l l /u" to 
        unregister the program 
        Find iuctl.d l l and iuengine.d l l and delete all instances of them 
        Here is an article in WinNetMag with more on this issue:<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826RN-W2K_SP3&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826RN-W2K_SP3 
      More SP3 Bugs Surface
      Several people reported back to me they had run into problems with SP3. 
      This is of course inevitable, and the amount of bug reports is fairly low, 
      but there are a few pitfalls and beartraps some of you have run into. Here 
      are the examples. Lesson: proceed, but with caution! 
      "I've found a genuine bug with Windows 2000 SP3 in a Terminal 
      Services / Citrix Metaframe XP environment on Proliants. The problem was 
      experienced on 2 servers. Fortunately I chose to archive the updated files 
      so it was easy to roll it back to SP2. I removed SP3 from one server. The 
      following day, when under user load, the customer confirmed that it was 
      operating normally. The other server was still experiencing slowdowns, so 
      the customer removed SP3 from the 2nd server, and it was also back to 
      normal. The issue: When people log in and out using the Citrix ICA client 
      that have locally connected printers, the CPU seems to take a hit and 
      freeze the server for several seconds while the printers are being 
      auto-created, purged, and deleted. The problem could be reproduced. Good 
      old MS have started pointing the finger at Citrix already." 
      "Try to install Exceed (by Hummingbird) ver 6.2 or 7.1.1 on w2k 
      machine with sp3 and you will not get X terminal session. When applying 
      sp3 on a w2k machine with sp2 and Exceed already installed - it works. I 
      am waiting for Hummingbird's reply on that...still nothing. I have been 
      talking with them for 3 days since Exceed didn't work and we ran through 
      the trouble shooting a few times. Finally I noticed that it's the problem 
      as described. Yet it's interesting, since the Xerrors file on the SUN 
      machine makes it look like a name resolution problem. I double checked - 
      it's not the problem. Other pc-x software works like Starnet (Cygwin for 
      some reason did not work)." 
      SP3 Refusniks
      Some people object to the licensing terms in SP3. They are similar to 
      the ones of the new Media Player. MS reserves many rights. Read the 
      articles in the links below and you will see what they are referring to. 
      There is just one snag. Think about security. SP3 is crucial and would 
      leave them open for hacking. The tradeoff is not that difficult but 
      definitely means a "choice between two evils" Unless you hack SP3 of 
      course...[grin] More about that in the links below. 
      Item about Win2k SP3, the 'snooper' license, and the workaround<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826RN-License_Workaround&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826RN-License_Workaround 

      And here is an interesting article on how to defang SP3 all 
      together!<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826RN-Defang_SP3&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826RN-Defang_SP3 
      International Information Security Standard
      A W2Knews subscriber sent me this, you should check it out too. 
      "You might like to take a look at the BS7799 Information Security 
      Standard. I've just done the auditors course, and rather than being boring 
      it was as enlightening as heck, and really good to see someone has put all 
      the things you SHOULD be doing about security of your information into one 
      place. The standard is becoming international too, with Part I (the 
      guidelines) already Approved as ISO 17799, and Part 2 (The standard) under 
      review." 
  
    <IMG height=10 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <IMG 
      height=16 src="http://www.w2knews.com/graphics/tinyw2k.gif" width=53 
      align=right NOSEND="1"> <FONT face="arial, verdana, sans-serif" 
      color=#ff0000 size=4>  THIRD PARTY NEWS
  
    <IMG height=3 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    
      How To Stay Connected On A DHCP XP Pro Laptop - 
      Redux
      Quite a few of you came back to me with the remark there are easier 
      ways to do this. For instance, use the free option under<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826TP-No_IP&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826TP-No_IP 
      Apart from using it yourself when you are on the road, or want to 
      access systems from home to the office (where your DSL gateways may have a 
      dynamic IP address), there are many commercial users who use no-ip to 
      switch hosting servers etc. etc. Other examples are:<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826TP-DynDNS&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826TP-DynDNS<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826TP-Dynu&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826TP-Dynuand 
      something else which is called dns2go and is available from the good folks 
      at <A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826TP-DeerField&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826TP-DeerField. 
      Check it out. Some one wrote in they use it all over the place and have 
      had excellent success with it. But keep in mind that these "free" sites 
      suddenly might change to a "For Pay" model once they have locked you in. 
      This happened just last week with one of them. 
      What Do YOU Think The IT Future Is Going To 
      Bring?
      Sunbelt and SG Gowen are currently conducting an online study examining 
      current and future information technology trends. As a leader in the 
      information technology space, we are very interested in your thoughts and 
      opinions. 
      The survey should take no more than 10 minutes to complete. To thank 
      you for completing the survey, we will enter you into a drawing to win a 
      cash prize of $1,000. 
      Please take part in this research by clicking on the link below or 
      pasting it into your browser: 
      <A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826TP-Survey&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826TP-Survey 
      The data you submit will remain confidential and will not be released, 
      sold, or used in advertising. It will only be used to compile aggregate 
      statistics for a summary report. Neither you nor your company will be 
      identified in any way. Your input is important, so please respond now, or 
      no later than August 31, at 5pm. 
  
    <IMG height=10 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <IMG 
      height=16 src="http://www.w2knews.com/graphics/tinyw2k.gif" width=53 
      align=right NOSEND="1"> <FONT face="arial, verdana, sans-serif" 
      color=#ff0000 size=4>  FAVE LINKS
  
    <IMG height=3 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    
      This Week's Links We Like. Tips, Hints And Fun 
      Stuff.
      
      Online "museum" of many now dead computer brands. Oh Nostalgia!<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826FA-Computer_Brands&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826FA-Computer_Brands 

      Wanted to go to LinuxWorld but could not make it? eWeek has a good 
      roundup.<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826FA-LinuxWorld&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826FA-LinuxWorld 
      Told ya so, told ya so. In issue #368 I mentioned Big Pharma would be 
      the next "tobacco" of class action lawsuits because of their business 
      practices in the anti-depressant market. That includes Ritalin (while not 
      in that same class of drugs and more a close relative of cocaine) and here 
      are the lawsuits starting. Got "busy" kids? Better read this.<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826FA-BigPharma&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826FA-BigPharmaAnd 
      then watch this video:<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826FA-Ad_Video&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826FA-Ad_Video 
      Cool shareware for Outlook users. Does some good things:<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826FA-Outlook_Shareware&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826FA-Outlook_Shareware 

      TechTarget have their own Fave Links. They call 'em discoveries and 
      they are all on one page:<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826FA-TechTarget&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826FA-TechTarget 
      Pretty much all the important websites on one (long) page. 
      Useful.<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826FA-HotSheet&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826FA-HotSheet 
      Wardriving? Naaah, the Aussies discover hackable wireless networks 
      with airplanes!<A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826FA-Plane_Wardriving&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826FA-Plane_Wardriving 
      
  
    <IMG height=10 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <IMG 
      height=16 src="http://www.w2knews.com/graphics/tinyw2k.gif" width=53 
      align=right NOSEND="1"> <FONT face="arial, verdana, sans-serif" 
      color=#ff0000 size=4>  BOOK OF THE WEEK
  
    <IMG height=3 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    
      Securing Windows NT/2000: From Policies to 
      Firewalls
      In today's business environment it is no longer safe to conduct any 
      business on the Internet without first protecting it. Small, medium, and 
      large corporations require a massive dose of security to protect 
      themselves and their digital assets from unwanted intruders. A managerial 
      guide and practical technical tutorial, this book provides viable security 
      solutions for your organization. 
      The book includes the steps required to define a corporate security 
      policy, how to implement that policy, and how to structure the project 
      plan. Tables, charts, and work templates provide a starting point to begin 
      assessing and implementing a solution that will fit the unique needs of 
      your organization. Part two provides the reader with practical hands-on 
      applications for the preparation, installation, and tuning of Windows 
      NT/2000 operating systems. Securing Windows NT/2000 provides step-by-step 
      instructions that guide you through performing a secure installation and 
      in preparing the system for secure operation on the Internet. Although a 
      multitude of firewall application software can be used in conjunction with 
      the sections detailing the securing of the operating system, Check Point 
      FireWall-1 /VPN-1 is used as it best demonstrates the effectiveness of 
      translating the corporate security policy into a practical reality. 
      <A 
      href="http://www.w2knews.com/rd/rd.cfm?id=020826BW-Securing_Windows&mid=4448990435826275" 
      target=_top>http://www.w2knews.com/rd/rd.cfm?id=020826BW-Securing_Windows 
      

  
  
    <IMG height=10 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <IMG 
      height=16 src="http://www.w2knews.com/graphics/tinyw2k.gif" width=53 
      align=right NOSEND="1"> <FONT face="arial, verdana, sans-serif" 
      color=#ff0000 size=4>  ABOUT W2KNEWS™
  
    <IMG height=3 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1">
  
    <IMG height=8 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1"><FONT face="arial, verdana, sans-serif" 
      size=3>What Our Lawyers Make Us Say 
  
    These documents are provided for informational 
      purposes only. The information contained in this document represents the 
      current view of Sunbelt Software Distribution on the issues discussed as 
      of the date of publication. Because Sunbelt must respond to changes in 
      market conditions, it should not be interpreted to be a commitment on the 
      part of Sunbelt and Sunbelt cannot guarantee the accuracy of any 
      information presented after the date of publication. 
      INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT 
      WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED 
      TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR 
      PURPOSE AND FREEDOM FROM INFRINGEMENT. 
      The user assumes the entire risk as to the accuracy and the use of this 
      document. This document may be copied and distributed subject to the 
      following conditions: 1) All text must be copied without modification and 
      all pages must be included; 2) All copies must contain Sunbelt's copyright 
      notice and any other notices provided therein; and 3) This document may 
      not be distributed for profit. All trademarks acknowledged. Copyright 
      Sunbelt Software Distribution, Inc. 1996-2002. 
  
    <IMG height=8 src="http://www.w2knews.com/graphics/dot-white.gif" 
      width=1 NOSEND="1"><FONT face="arial, verdana, sans-serif" 
      size=3>About Your Subscription to W2Knewsâ„¢ 
  
    This is a posting from 
      W2Knews. You are subscribed as matthew.brown at cordata.netTo manage your 
      profile, please click on the following customized link:<A 
      href="http://www.w2knews.com/login.cfm?id=4448990435826275">http://www.w2knews.com/login.cfm?id=4448990435826275 
      




More information about the Ale mailing list