did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780735620421

Microsoft Windows XP Networking and Security Inside Out Also Covers Windows 2000

by ;
  • ISBN13:

    9780735620421

  • ISBN10:

    0735620423

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2005-09-28
  • Publisher: Microsoft Press
  • Purchase Benefits
List Price: $49.99

Summary

Dig into Windows XPand discover how you can really put its networking and security features to work! Also covering Windows 2000, this supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and handy workarounds in concise, fast-answer format. It's all muscle and no fluff. Find the best and fastest ways to perform everyday networking tasks, and challenge yourself to new levels of mastery! From Ethernet to WiFi, build a fast, reliable, security-enhanced network Keep your system current with Windows Update Design and troubleshoot a comprehensive data backup and recovery solution Help prevent network invasions with firewall solutions, encryption systems, Windows AntiSpyware, and other defenses Use logon, authentication, and Group Policy to help control access to shared resources Take ultimate control by blocking ports, encrypting files, and installing digital certificates Monitor security events by configuring auditing policies and security templatesCD features: Complete eBook Insider Extrasincluding sample batch and script files plus security templates Microsoft Encyclopedia of Networking, Second Edition, eBook Microsoft Encyclopedia of Security eBook Microsoft Computer Dictionary, Fifth Edition eBook Microsoft resourcesincluding Windows XP Expert Zone articles and downloadable security resources Links to Web sites of Microsoft Most Valuable Professionals (MVPs)

Author Biography

Carl Siechert specializes in implementing and documenting operating system technologies. He has coauthored several Windows-related books, including the popular Windows Vista Inside Out, Deluxe Edition, with Ed Bott and Craig Stinson.

Table of Contents

Acknowledgments xix
We'd Like to Hear from You! xxi
About the CD xxiii
Conventions and Features Used in This Book xxv
Part 1 Windows Networking and Security Essentials
Windows Networking and Security 101
3(24)
Building a Network with Security in Mind
3(7)
Which Windows? A Comparison of Networking Features
5(1)
Using a Hardware Firewall Appliance
6(1)
Configuring Network Hardware
7(3)
Blocking Attacks by Using a Firewall
10(7)
Packet Filtering
11(1)
Stateful-Inspection Packet Filtering
11(1)
Application Filtering
12(4)
Who Needs a Firewall?
16(1)
Restricting Network Access to Files and Folders
17(7)
Windows Sharing and Security Models
17(7)
Workgroups vs. Domains
24(3)
Computer Security: Are You at Risk?
27(18)
Balancing Safety and Convenience
28(1)
Know Your Enemy: Seven Threats to Your Computer's Security
29(14)
Threat #1: Physical Attacks
30(2)
Threat #2: Pilfered Passwords
32(2)
Threat #3: Nosy Network Neighbors
34(1)
Threat #4: Viruses, Worms, and Other Hostile Programs
35(3)
Threat #5: Outside Intruders and Trojan Horse Takeovers
38(2)
Threat #6: Invasions of Privacy
40(1)
Threat #7: E-Mail Threats
41(2)
How Can You Protect Yourself?
43(2)
Windows Security Tools and Techniques
45(36)
What Are User Accounts?
46(9)
Local vs. Domain Accounts
48(2)
Built-In User Accounts
50(1)
Security Groups
51(3)
Rule of Least Privilege
54(1)
Controlling the Logon and Authentication Process
55(8)
How Interactive Logons Work
57(3)
Safeguarding the Security Accounts Manager
60(1)
Using Group Policy to Restrict Access
61(2)
Ensuring the Security of Files
63(3)
Using NTFS Permissions
63(2)
Sharing Files Over a Network
65(1)
Encryption Options
66(1)
Securing Your Computer: A Checklist
66(10)
Install and Configure a Firewall
67(1)
Install All Windows Security Updates
68(1)
Install and Configure Antivirus Software
69(1)
Eliminate or Disable Unused Accounts
70(1)
Set Strong Passwords for All User Accounts
71(1)
Tighten Logon Security for All Users
71(1)
Use NTFS for All Drives
72(1)
Review NTFS Permissions on All Data Directories
73(1)
Review All Network Shares
74(1)
Use Your Screen Saver as a Security Device
75(1)
Create a Backup
76(1)
Advanced Security Options
76(5)
Managing User Accounts and Passwords
81(54)
Managing User Accounts for Security
82(21)
Finding the Account-Management Tools
83(6)
Creating User Accounts
89(2)
Disabling or Deleting User Accounts
91(3)
Assigning User Accounts to Security Groups
94(3)
Assigning a Password to a User Account
97(2)
Securing the Administrator Account
99(2)
Securing the Guest Account
101(2)
Following Best Practices for Your Everyday Account
103(5)
Using Passwords Effectively
108(14)
Creating Strong Passwords
111(2)
Establishing and Enforcing Password Policies
113(2)
Recovering a Lost Password
115(4)
Managing Passwords
119(3)
Configuring the Logon Process for Security
122(13)
Securing the Welcome Screen
122(1)
Securing the Classic Logon
123(2)
Controlling Automatic Logons
125(2)
Logging On with a Biometric Device
127(1)
Displaying a Welcome Message---or a Warning
128(3)
Setting Account Lockout Policies
131(1)
Adding Another Layer of Protection with Syskey
132(3)
Securing a Shared Computer
135(44)
Using NTFS Permissions for Access Control
136(22)
Basic and Advanced Permissions
141(2)
Viewing and Changing NTFS Permissions
143(8)
Applying Permissions to Subfolders Through Inheritance
151(3)
What Happens to Permissions When You Copy or Move Files?
154(2)
How to Break into Files and Folders When You Don't Have Access Rights
156(2)
Locking Up Personal Documents
158(6)
Making a Folder Private with Windows XP
158(5)
Protecting Personal Files in Windows 2000
163(1)
Sharing Documents Securely on a Multiuser Computer
164(5)
Restricting Access to Programs
169(1)
Restricting Access to the Registry
170(5)
Managing Removable Storage Devices and Printers
175(4)
Restricting Access to Removable Storage Devices
175(2)
Restricting Access to Printers
177(2)
Preventing Data Loss
179(34)
Determining Your Backup Needs
181(2)
How Much Data Do You Have to Back Up?
181(1)
What Is Your Most Important Goal?
182(1)
How Much Are You Willing to Spend?
182(1)
How Important Is Your Data?
182(1)
What Level of Hassle Are You Willing to Endure?
183(1)
Organizing Your Data
183(5)
Eliminating Unnecessary Data
183(2)
Arranging Your Data for Easy Backup
185(2)
Choosing a Backup Location
187(1)
Designing a Backup Solution
188(7)
Simple Backup Strategies
188(2)
Backing Up Selected Folders and Files
190(2)
Using Imaging Software to Back Up Complete Partitions
192(2)
Combining Methods for a Comprehensive Backup Strategy
194(1)
Using the Windows Backup Program
195(9)
Choosing a Backup Type
197(2)
Performing Interim Backups with Windows Backup
199(5)
Using Other Data Loss Prevention Tools Included with Windows
204(4)
Checking for Hard Disk Errors with Chkdsk
204(1)
Keeping an Up-to-Date Emergency Repair Disk
205(1)
Creating System Restore Points
205(2)
Backing Up the Registry
207(1)
Protecting Backups
208(1)
Recovering Data
209(4)
Recovering Individual Files from Backups
209(1)
Restoring a System by Using an Emergency Repair Disk
210(1)
Restoring a System by Using an Automated System Recovery Disk
211(1)
Recovering Data from a Damaged Hard Disk
212(1)
Keeping Your System Secure
213(26)
Monitoring Security in Windows XP
213(4)
Keeping Current with Windows Update
217(8)
Automating Your Updates
220(4)
Downloading the Update Files for Multiple Computers
224(1)
Security Alert Services
225(4)
Receiving Alerts Through Instant Messaging
225(1)
Receiving E-Mail Alerts and RSS Notification
226(2)
Other Sources for Security Alerts
228(1)
Testing and Verifying Your Secure Status
229(10)
Checking Your Update Status with Microsoft Baseline Security Analyzer
230(9)
Part 2 Smart, Secure Networking
Setting Up a Secure Home or Small Business Network
239(62)
Choosing a Network Type
241(5)
Ethernet Networking
241(1)
Wireless Networking
242(1)
HomePNA Networking
243(1)
HomePlug Powerline Networking
244(1)
Other Network Types
245(1)
Setting Up Your Network Hardware
246(4)
Installing and Configuring a Network Adapter
246(1)
Connecting with Hubs, Switches, and Routers
246(3)
Selecting Cable for an Ethernet Network
249(1)
Configuring Your Network
250(9)
Using the Network Setup Wizard in Windows XP
250(7)
Configuring a Connection in Windows 2000
257(1)
Configuring Workgroup Settings
258(1)
Managing Network Connections
259(17)
Checking Connection Status
261(2)
Installing Protocols, Services, and Clients
263(5)
Setting IP Addresses
268(4)
Configuring Network Bindings and Provider Order
272(2)
Bridging Connections
274(2)
Securing Network Connections
276(9)
Using Windows Firewall in Windows XP
277(3)
Choosing a Third-Party Personal Firewall
280(5)
Sharing Information Across Your Network
285(16)
Setting Up Shared Folders
285(9)
Managing Shared Folders
294(7)
Sharing an Internet Connection
301(28)
Connecting Your Network to the Internet
302(3)
Using Direct Internet Connections on a LAN
305(5)
Configuring a Dial-Up Connection
305(1)
Configuring a Broadband Connection
306(2)
Adding Firewall Protection
308(2)
Sharing an Internet Connection Through Hardware
310(6)
Configuring a Router or Residential Gateway
312(2)
Tightening Security on a Router
314(2)
Sharing an Internet Connection Through Software
316(5)
Setting Up Internet Connection Sharing in Windows XP
317(3)
Setting Up Internet Connection Sharing in Windows 2000 Professional
320(1)
Controlling Inbound Access to Your LAN
321(8)
Using Peer-to-Peer File-Sharing Software
322(1)
Running a Web Server on Your Network
322(1)
Connecting to Your Desktop from a Remote Location
323(6)
Wireless Networking
329(18)
The Risks and Rewards of Wireless Networking
330(4)
Controlling Connections to a Wireless Access Point
334(3)
Encrypting Wireless Transmissions
337(3)
Configuring a Windows Computer for Wireless Networking
340(6)
Managing Wireless Network Connections
342(2)
Configuring a New Wireless Network
344(2)
Extra Security for Wireless Networks
346(1)
Working with a Corporate Network
347(38)
Introducing Windows-Based Domains
348(5)
Active Directory
349(1)
Domain Servers
350(1)
Domain Structure
351(1)
Group Policy
352(1)
Joining a Domain
353(10)
Configuring Network Settings
357(1)
Adding Domain Accounts to Your Local Account Database
357(4)
Leaving a Domain
361(1)
Accessing Domain Resources from a Computer Running Windows XP Home Edition
361(1)
Enabling Security Center
362(1)
Working on a Domain-Based Computer
363(10)
Logging On to a Domain
363(1)
Displaying My Network Places
364(1)
Specifying Network Resources by UNC Path
365(1)
Finding Files, Printers, and Users
365(3)
Connecting to Shared Network Folders
368(1)
Windows XP Differences in a Domain Environment
369(4)
Connecting Remotely to a Corporate Network
373(12)
Setting Up a VPN Connection
374(1)
Connecting to a VPN
375(2)
Working with VPN Connection Properties
377(2)
Setting Up a Virtual Private Network
379(6)
Part 3 Protecting Your Personal Computer
Making Internet Explorer More Secure
385(46)
When Web Pages Go Bad
388(1)
Following Safe Browsing Practices
389(16)
Using the Information Bar
391(1)
Blocking Pop-Ups
392(3)
Downloading Executable Files
395(2)
Dealing with Automatic Downloads
397(1)
Controlling ActiveX Downloads
398(6)
Using Least Privilege When Browsing the Internet
404(1)
Using Security Zones
405(18)
Configuring the Local Intranet Zone
409(1)
Adding Sites to a Zone
409(2)
Configuring Security Settings
411(12)
Managing Browser Add-Ons
423(2)
Managing ActiveX Controls
425(5)
Updating an ActiveX Control
426(1)
Reading a Control's Properties
426(1)
The Safe for Initialization and Safe for Scripting Flags
427(1)
Deleting a Downloaded ActiveX Control
428(1)
Permitting Only Administrator-Approved ActiveX Controls to Run
428(1)
Deactivating an ActiveX Control
429(1)
Managing Java Applets
430(1)
Blocking Spyware, Adware, and Other Unwanted Software
431(26)
What Is Spyware?
432(4)
Blocking Unwanted Software
436(6)
Choosing and Using Anti-Spyware Tools
442(9)
Rooting Out Spyware
451(6)
Identifying Potentially Unwanted Software
452(3)
Using Automated Removal Tools
455(1)
Using Special-Purpose Removal Tools
456(1)
Removing Unwanted Software Manually
456(1)
Stopping Viruses, Worms, and Trojan Horses
457(36)
How Malicious Software Attacks Your Computer
458(12)
Attachment-Borne Viruses
463(2)
Attacks from the Web
465(1)
Trojan Horse Programs
466(1)
Other Attacks
467(3)
Identifying Malicious Software
470(4)
Choosing an Antivirus Program
474(8)
Protecting Your Computer from Hostile Software
482(8)
Training Users to Avoid Viruses
483(2)
Blocking Dangerous Attachments
485(3)
Using Backups and System Restore
488(2)
Repairing an Infected System
490(3)
Securing E-Mail and Instant Messages
493(34)
Protecting Yourself from Hazardous Attachments
494(15)
Attachment and Automation Security in Outlook
495(10)
Attachment Security in Outlook Express
505(4)
Protecting Yourself from Rogue HTML
509(3)
Changing the Security Zone
510(1)
Activating Script in an Outlook 2002 or Outlook 2003 Message
510(2)
Using Web-Based E-Mail Securely
512(3)
Handling Attachments and Script
514(1)
Protecting E-Mail from Prying Eyes
515(9)
Obtaining a Public Key/Private Key Pair
516(1)
Using S/MIME to Send Encrypted Messages
517(3)
Ensuring the Authenticity and Integrity of Your Messages
520(2)
Using PGP for Signing and Encrypting
522(1)
Other Third-Party Encryption Tools
523(1)
Using Instant Messaging Safely
524(3)
Avoiding Malicious Software
524(1)
Preventing Spim
525(2)
Blocking Spam
527(34)
What Is Spam?
528(8)
Sneaky Spammers' Secrets
530(1)
How to Decode an E-Mail Header
531(5)
Basic Spam-Blocking Techniques
536(4)
Using Filters
540(19)
Creating Custom Filters
544(9)
Using Outlook's Junk E-Mail Filters
553(4)
Backing Up Message Rules
557(2)
Third-Party Spam-Busting Solutions
559(1)
Fighting Back Against Spam
560(1)
Securing Your Computer by Using a Firewall
561(24)
How Hack Attacks Work
562(2)
Configuring a Host Firewall
564(13)
Allowing Incoming Connections Through Windows Firewall
565(10)
Controlling Windows Firewall with Group Policy
575(1)
Using the Netsh Command to Manage Windows Firewall
576(1)
Blocking All Exceptions
577(1)
Identifying Intruders
577(5)
Configuring Windows Firewall Logging
578(1)
Examining Windows Firewall Logs
579(3)
Fighting Back
582(3)
Protecting Your Privacy
585(42)
Protecting Your Identity
587(4)
Avoiding Losses from ``Phishing'' Attacks
591(2)
Ensuring Your Children's Safety and Privacy
593(2)
Managing Cookies
595(22)
The Anatomy of a Cookie
596(4)
Setting Cookie Preferences in Internet Explorer 6
600(12)
Setting Cookie Preferences in Firefox/Mozilla
612(1)
Backing Up, Restoring, and Deleting Cookies
613(2)
Using a Cookie-Management Program
615(2)
Watching for Web Bugs
617(1)
Browsing Anonymously
617(1)
Covering Your Tracks
618(9)
Eliminating Your Internet Explorer History
619(1)
Erasing Your Internet Explorer AutoComplete History
620(1)
Turning Off Inline AutoComplete in Internet Explorer
620(1)
Clearing Your Recent Documents List
620(1)
Eliminating Recent Document History on Exit
621(1)
Eliminating Applications' Most-Recently-Used Lists and the Recent Documents Menu
622(1)
Using Third-Party Cleaners
623(4)
Part 4 Extreme Security
Securing Ports and Protocols
627(44)
How Ports and Protocols Allow Access to Your Computer
628(4)
How Ports Are Assigned
628(2)
Unofficial Port Usage
630(1)
How Connections to a Port Are Made
631(1)
Determining Which Ports Are Active
632(6)
Restricting Access to Ports
638(12)
Restricting Ports by Using Windows Firewall
638(1)
Restricting Ports by Using TCP/IP Filtering
638(1)
Restricting Ports by Using a Perimeter Firewall
638(2)
Restricting Ports by Using IP Security
640(10)
Why Blocking Ports Isn't Enough
650(1)
Shutting Down Unneeded Services
650(12)
Understanding Windows Services
652(10)
Tightening Security on Internet Information Services
662(9)
Managing IIS Services
663(1)
Running the IIS Lockdown Tool
664(2)
Blocking Anonymous Access to IIS
666(2)
Using Server Logs
668(2)
Keeping Up with IIS Security Updates
670(1)
Installing and Using Digital Certificates
671(28)
What Are Digital Certificates?
672(6)
Certificate Purposes
673(1)
Certificate Stores
674(1)
Certification Authorities
675(3)
Obtaining a Personal Certificate
678(3)
Managing Your Certificates
681(18)
Using the Certificates Dialog Box
683(2)
Using the Certificates Snap-In
685(3)
Viewing and Modifying Certificate Properties
688(5)
Exporting Certificates for Safekeeping
693(3)
Importing Certificates
696(1)
Copying or Moving a Certificate
696(1)
Deleting a Certificate
697(1)
Renewing a Certificate
697(2)
Encrypting Files and Folders
699(30)
Using the Encrypting File System
702(18)
Before You Begin: Learn the Dangers of EFS
703(1)
Encrypting Your Data
704(5)
Using Encrypted Data
709(6)
Recovering Encrypted Data
715(1)
Disabling or Reenabling EFS
716(3)
Strengthening EFS Protection
719(1)
Creating a Data Recovery Agent
720(4)
Generating a File Recovery Certificate
721(1)
Designating Data Recovery Agents
721(2)
Removing the Private Key
723(1)
Backing Up Your Certificates
724(5)
Backing Up the File Recovery Certificate
725(1)
Exporting a Personal Encryption Certificate
726(1)
Importing a Personal Encryption Certificate
727(1)
Creating a New Personal Encryption Certificate
728(1)
Managing Security Through Group Policy and Security Templates
729(44)
Exploring Security-Related Policies
730(24)
Exploring User Rights
732(4)
Exploring Security Options
736(10)
Exploring Other Group Policies
746(8)
Using the Group Policy Snap-In
754(7)
Using the Security Settings Extension
756(1)
How Policies Are Applied
757(2)
Starting Group Policy for a Remote Computer
759(2)
Using Security Templates
761(10)
Using the Security Templates Snap-In
765(1)
Reviewing Account Policies, Local Policies, Event Log, and System Services Settings
766(1)
Controlling Security Group Membership
767(1)
Configuring Permissions on Folders, Files, and the Registry
768(1)
Applying Template Settings
769(2)
Analyzing System Security
771(2)
Monitoring Security Events
773(20)
Auditing Security Events
773(8)
Enabling Security Auditing
774(2)
Configuring Auditing of Access to Files, Printers, and Registry Keys
776(4)
Deciding What to Audit
780(1)
Viewing the Log of Security Events
781(7)
Working with Logged Events
782(2)
Working with Log Files
784(4)
Viewing Other Security-Related Logs
788(5)
Part 5 Appendix
Appendix The Ten Immutable Laws of Security 793(8)
Index to Troubleshooting Topics 801(2)
Index 803

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program