What is the Windows registry ?
I have always wondered on how the windows registry worked. The reason is that the Windows Registry is telling programs that it's registered or now, and the setting on your windows shell, personally information and security. The Windows Registry have been in windows since the beginning of windows 3.x I don't now about windows 286 but I guess that the Registry were there too....
Thursday, June 06, 2002
XP Professional Security Features: An Introduction
I’m not sure if it was the uplifting backbeat of Madonna’s “Ray of Light” or the promise of the best security options yet in a Microsoft operating system that made the difference, but the overall development and marketing efforts of XP have paid off. With over 32 millions copies sold since it was released last October, Microsoft’s newest line of operating system products has caught the attention of both home and business users.
While XP Home has many new security features available for the home network, this article will focus on XP Professional (hereafter simply referred to as XP) and its use in the corporate LAN. This is not intended to be exhaustive dissertation of all the new features in XP; rather, the purpose is to highlight some of the new security features found in the product, and to provide those still considering an upgrade to XP with some insight into how doing so can help them administer their network. So let’s jump right in.
I’m not sure if it was the uplifting backbeat of Madonna’s “Ray of Light” or the promise of the best security options yet in a Microsoft operating system that made the difference, but the overall development and marketing efforts of XP have paid off. With over 32 millions copies sold since it was released last October, Microsoft’s newest line of operating system products has caught the attention of both home and business users.
While XP Home has many new security features available for the home network, this article will focus on XP Professional (hereafter simply referred to as XP) and its use in the corporate LAN. This is not intended to be exhaustive dissertation of all the new features in XP; rather, the purpose is to highlight some of the new security features found in the product, and to provide those still considering an upgrade to XP with some insight into how doing so can help them administer their network. So let’s jump right in.
Managing information security
Attacks on corporate information systems by hackers, viruses, worms and the occasional disgruntled employee are increasing dramatically--and costing companies a fortune. Last year, U.S. businesses reported 53,000 system break-ins--a 150 percent increase over 2000. Indeed, the true number of security breaches is likely to have been much higher because concerns about negative publicity mean that almost two-thirds of all incidents actually go unreported.
Attacks on corporate information systems by hackers, viruses, worms and the occasional disgruntled employee are increasing dramatically--and costing companies a fortune. Last year, U.S. businesses reported 53,000 system break-ins--a 150 percent increase over 2000. Indeed, the true number of security breaches is likely to have been much higher because concerns about negative publicity mean that almost two-thirds of all incidents actually go unreported.
Hacking and Security Strategies
A summary of all methods of attacking hosts on the internet, sorted by difficulty level. Short introduction to all known kinds of Internet attacks and an evaluation by difficulty.
A summary of all methods of attacking hosts on the internet, sorted by difficulty level. Short introduction to all known kinds of Internet attacks and an evaluation by difficulty.
Sniffer FAQ
This Sniffer FAQ will hopefully give administrators a clear understanding of sniffing problems and hopefully possible solutions to follow up with. Sniffers is one of the main causes of mass break-ins on the Internet today.
This Sniffer FAQ will hopefully give administrators a clear understanding of sniffing problems and hopefully possible solutions to follow up with. Sniffers is one of the main causes of mass break-ins on the Internet today.
FAQ and Guide to Cracking
Disclaimer:
This is a theoretical instruction to cracking and for informational purposes. It should be seen as an introduction to the methods and strategies used by crackers rather than a howto. The author is not suggesting to perform illegal actions and cannot be held liable for any actions of other individuals who perform any of the actions discussed in this paper and possible resulting damage.
Introduction:
I am going to describe the methods and strategies used to access various UNIX hosts among the internet unauthorizedly. This guide will not teach you how to hack, neither do you have to be a hacker to use the techniques described here. Hacking means finding your own way to do it, and finding new approaches to accomplishing something. I am only going to supply you with one possible approach to cracking.
Disclaimer:
This is a theoretical instruction to cracking and for informational purposes. It should be seen as an introduction to the methods and strategies used by crackers rather than a howto. The author is not suggesting to perform illegal actions and cannot be held liable for any actions of other individuals who perform any of the actions discussed in this paper and possible resulting damage.
Introduction:
I am going to describe the methods and strategies used to access various UNIX hosts among the internet unauthorizedly. This guide will not teach you how to hack, neither do you have to be a hacker to use the techniques described here. Hacking means finding your own way to do it, and finding new approaches to accomplishing something. I am only going to supply you with one possible approach to cracking.
Sensible Data Storage (in Windows)
This guide shows you where some popular programs store their data and how can you protect your privacy by deleting or modifying them. Also, these information can be useful if you want to back up your data.
This guide shows you where some popular programs store their data and how can you protect your privacy by deleting or modifying them. Also, these information can be useful if you want to back up your data.
EgoSurfer
EgoSurfer is a powerful tool that combine a few personal data you provide about yourself or someone else to look for information about it on the Internet through main search engines and directories.
EgoSurfer is a powerful tool that combine a few personal data you provide about yourself or someone else to look for information about it on the Internet through main search engines and directories.
BrowsInfo
This page shows all the information is possible to collect about the Browser, the System, the Document (and the User himself...) during an Internet session.
This page shows all the information is possible to collect about the Browser, the System, the Document (and the User himself...) during an Internet session.
Cloaking Your Movements in Cyberspace
MONITORED AND TRACKED. You might believe that no one cares about the harmless chatter in your messages. Yet whenever you browse the Web, it's likely that hundreds of marketers are tracking your every move using cookies -- tiny programs that hook onto your browser and track your surfing habits, reporting them back to the originating site.
MONITORED AND TRACKED. You might believe that no one cares about the harmless chatter in your messages. Yet whenever you browse the Web, it's likely that hundreds of marketers are tracking your every move using cookies -- tiny programs that hook onto your browser and track your surfing habits, reporting them back to the originating site.
The Visual, Step by Step netbios hack
This tutorial is intended for novice or intermediate computer users looking to exploit Microsoft printer and file sharing, also known as netbios (network basic input/output system). This tutorial will cover the steps in exploiting netbios if your using windows 9x or windows 2000/XP. To keep the interest of the reader and dumb people who cant understand text, screen shots will also be shown for every step in the procedure. Each step will show procedures in windows 9x and windows 2000. The assumption that you know basic DOS commands and the function of IP addresses and file sharing is recommended. You will not need any extra tools, they are all provided with a default windows installation.
This tutorial is intended for novice or intermediate computer users looking to exploit Microsoft printer and file sharing, also known as netbios (network basic input/output system). This tutorial will cover the steps in exploiting netbios if your using windows 9x or windows 2000/XP. To keep the interest of the reader and dumb people who cant understand text, screen shots will also be shown for every step in the procedure. Each step will show procedures in windows 9x and windows 2000. The assumption that you know basic DOS commands and the function of IP addresses and file sharing is recommended. You will not need any extra tools, they are all provided with a default windows installation.
Security through obsolescence
Here's an interesting way to secure an Internet-connected computer against intruders: Make sure the operating system and software it runs are so old that current hacking tools won't work on it. This was suggested by Brian Aker, one of the programmers who works on Linux.com, NewsForge, Slashdot, and other OSDN sites; he runs several servers of his own that host a number of small non-profit sites in the Seattle area. "I have one box still running a version of Solaris that's so old none of the script kiddies can figure it out," Brian says. "They tend to focus on the latest and greatest, and don't have the slightest idea how to handle my old Sun box."
Here's an interesting way to secure an Internet-connected computer against intruders: Make sure the operating system and software it runs are so old that current hacking tools won't work on it. This was suggested by Brian Aker, one of the programmers who works on Linux.com, NewsForge, Slashdot, and other OSDN sites; he runs several servers of his own that host a number of small non-profit sites in the Seattle area. "I have one box still running a version of Solaris that's so old none of the script kiddies can figure it out," Brian says. "They tend to focus on the latest and greatest, and don't have the slightest idea how to handle my old Sun box."
Subscribe to:
Posts (Atom)