Security_Intelligence

Facebook Twitter

Exploits

Center for Internet Security. Computer Cops. CERT. WindowsSecurity. TechNet Security. Frequently Asked Questions. Computer Security. Computer Security The web is like a large city, exciting, wonderful, but with a few dangers.

Computer Security

Most teachers do not have the time to research and find the best security products to safeguard their computers from attack by vandals, including students. I have attempted to give a few basic recommendations that can help you safeguard your personal computer. Most of these recommendations are for PCs with windows. Learn to Manage Default Shares. Recently, I received a phone call from a former coworker who left a small Independent Software Vendor (ISV) to take a job in a large corporate IT department.

Learn to Manage Default Shares

He had some questions about Microsoft Systems Management Server (SMS) that he hoped I could answer. We chatted about the product and his computing environment, then he signed off to install SMS on his test network. Twenty-four hours later, I received a somewhat panicky phone call: SMS wouldn't install on some of the computers on his test network, and my friend couldn't figure out why. Safe Computing Tips.

Please note that this document is quite dated (last updated in 2008).

Safe Computing Tips

Some of the infomation is still of interest so I'm keeping the document up for posterity only. Some of the old links have been removed. Safe Hex - A collection of suggestions intended to help you defend against viruses, worms, trojans (oh my!) ACK Tunneling Trojans. Summary A firewall between the attacker and the victim that blocks incoming traffic will usually stop a trojan client on the outside from contacting a trojan server on the inside.

ACK Tunneling Trojans

ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you will be safe from that. This paper describes another concept that I call ACK Tunneling. ACK Tunneling works through firewalls that don't apply their rule sets on TCP ACK segments. Security Links. NSA Security Recommendation Guides. Shortcut and WinHelp Commands in HTML Help. IMPORTANT: This article contains information about modifying the registry.

Shortcut and WinHelp Commands in HTML Help

Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: ( ) Description of the Microsoft Windows Registry. Security Notification Service. Help protect your computing environment by keeping up to date on Microsoft technical security notifications.

Security Notification Service

Notifications are available in RSS, mobile device, or e-mail format, and are also available online at the TechNet Security Bulletin Search page. Basic Alerts Microsoft's free monthly Security Notification Service provides links to security-related software updates and notification of re-released Microsoft Security Bulletins. Information Security Magazine. Internet Storm Center. Razor.