Security
Microsoft Windows security board.
4596 topics in this forum
-
eicartest
by Guest eicartes- 2 replies
- 513 views
http://www,eicartest.com If you are active in the anti-virus research field, then you will regularly receive requests for virus samples. Some requests are easy to deal with: they come from fellow-researchers whom you know well, and whom you trust. Using strong encryption, you can send them what they have asked for by almost any medium (including across the Internet) without any real risk. Other requests come from people you have never heard from before. There are relatively few laws (though some countries do have them) preventing the secure exchange of test viruses between consenting individuals, though it is clearly irresponsible for you simply to make vir…
-
***Spam*** Microsoft Tips and Tricks for beginners
by Guest Peter Foldes- 8 replies
- 749 views
-- Peter Please Reply to Newsgroup for the benefit of others Requests for assistance by email can not and will not be acknowledged.
-
Home Folder User Permissions
by Guest Mike- 1 reply
- 424 views
When you use the Microsoft Windows Server 2003 Active Directory Users and Computers Microsoft Management Console (MMC) snap-in to change the Home Folder path on the Profile tab of the user properties dialog box, the Home Folder path will have the following permissions: Administrators - Full Control and User - Full Control. How can we change it so the User permissions would have Modify Control instead of Full Control when the home folder is created? -- Mike
-
PDF Security Password
by Guest Trevor- 1 reply
- 435 views
I'm trying to open two e-mail attachments in PDF format. When I try to do this a dialogue box appears asking me to enter my PDF Security Password. I have no idea what this is, or how I go about getting one. Can anyone help, please? -- Trevor W
-
Re: Best Practice Internet Access Policy for Company Visitors
by Guest PA Bear- 6 replies
- 707 views
Forwarded to Security and IE Security newsgroups via crosspost. -- ~Robear Dyer (PA Bear) MS MVP-Windows (IE, OE, Security, Shell/User) AumHa VSOP & Admin DTS-L.org Marcus wrote: > I realise this is probably not the right place to ask this , however Im > trying to find out what the best practice is to allow company visitors to > gain access to the internet. > > Currently we have wired ADSL/SDSL and we have a Wireless network (WPA-PSK > [TKIP]). The subject has come up on how I should manage Internet access > for > visitors. So I was wondering what the best practice is for this ? > > Options :- > > 1) Give them w…
-
Windows 2003 running program only allowed after rightclick and Run
by Guest Matthijs- 2 replies
- 447 views
Hello, I have a problem on a Windows 2003 Server. When I want to open a program or a shortcut I can doubleclick all I want, but nothing will happen. When I rightclick te program or shortcut and choose Run As and then make the "Run this program with restricted access" checkbox blank it will open. I did not install and configure this server myself, but I saw that the admin account was member of ALL the available groups (User, Power Users etc). I removed them from all of them except the administrator group. Logged off and back on, but still no change..... Can someone help me please?? Thanks in advance, Matthijs
-
Re: Microsoft Tips and Tricks for beginners
by Guest James Matthews- 2 replies
- 540 views
spam -- http://www.goldwatches.com/Watches.asp?Brand=55 <gurijalasrinivas@gmail.com> wrote in message news:1185366985.411303.90610@k79g2000hse.googlegroups.com... > Hi, > Find loads of tips and tricks for beginners covering Microsoft > products like Windows Vista, Windows XP, MS Word, MS Excel, MS > Outlook, MS Access, etc., > > http://www.mstipsandtricks.com/ > > Cheers! > >
-
Trojan.W32.Looksky....Need help removeing it
by Guest Chimera- 1 reply
- 505 views
i have been trying myself to remove this trojan.but my lack of knowledge of computers has left me running around in circles. the spyware alert tells me that Trogan.W32.Looksky has been detected on my machine and the virus is distributed via the internet through e-mail and active-X objests. now i have no idea how to get riad of it and need someone to shine some light on this situation.
-
IIS Sample website and scripts
by Guest DD- 2 replies
- 633 views
I need to do the hardening of the IIS running on windows 2000 . need to remove the sample website and sample script. May I know where is the location of the sample website and the sample script ?
-
Antigen - Exceeded Internet Timeout
by Guest Anne Butera- 3 replies
- 706 views
I'm running Antigen V9.00.1055, and some of my outbound emails are getting blocked with an Incident "Exceeded Internet Timout". Is this a virus? Please help, I need to get these emails released. Thanks
-
Windows Update scan
by Guest ncasey@nospam.postalias- 3 replies
- 509 views
When using the Windows Update site, what is scanned to determine missing patches? Is the scan searching the registry to determine installed patches or is the scan actually checking file versions to determine if a patch is needed. The reason I ask is because our security scanning tool is only checking the registry for installed patches. Our desktop staff says the list of missing patches is incorrect because the way they are installing patches isn’t making the registry entries (SMS packages or something like that) Thanks
-
Norton Internet Security 2007 and Webroot Spy Sweeper Don't Mix
by Guest apple lady- 3 replies
- 604 views
If you're going to purchase or update to Norton Internet Security 2007 and you're also running Webroot's Spy Sweeper, supposedly NIS 2007 will only install properly if you've uninstalled Webroot fist. Also, I've read that you can re-install Webroot afterwards and it will run OK. I wouldn't know because I didn't hear about this incompatibility issue between NIS 2007 and Webroot until after several weeks of infuriating communications with Norton's outsourced tech support and their attempts to fix the multiple install problems. Those "fixes" actually made the NIS 2007's functionality even worse -- and it also disabled my Norton SystemWorks besides. If you pl…
-
Win32/VirtuMonde.O
by Guest DanG- 10 replies
- 801 views
I had a message pop up today from Window Defender, indicating that I had a "Win32/Virtumonde.O" trojan on my PC. I had WD remove the virus, and restarted as required. A few minutes later, the message popped up again. I have tried everything I can think of, including running WD in Safe Mode, but the virus keeps coming back. It seems that WD says it's been successfully removed, but it really isn't. I've downloaded SpywareBot and Ad-Aware, but neither found my bug. When I run the Symantec program specifically intended to remove Adware.Virtumonde, it doesn't find anything. Neither does Avast. Perhaps Adware.VirtuMonde and Win32/VirtuMonde are not the same thin…
-
Installing Software without being Local Admin?
by Guest Ben- 5 replies
- 605 views
Hi, Some of you may remember back in June I posted a topic entitled 'Network Computer Games on Business Machines' which detailed the problem we were having with some of our users installing software & games on their machines, as they were local admins (against my recommendations). A number of people posted replies, including PA Bear, Malke, Aaron etc with advice, and recommendations including presenting the directors with a risk analysis. Well I went on holiday the following week, and while there wrote up a fairly long, detailed risk analysis, which I gave to our directors when I returned. Surprisingly they actually accepted and agreed with the ris…
-
Command Prompt
by Guest Barry- 8 replies
- 703 views
Hi Everyday at a particular time Command Prompt windows appears for a few seconds, is there something i need to be careful about TIA Barry
-
- 1 reply
- 424 views
Hallo, I have 10 Server 2003 and 6 WinXP in a network. They are updated by WSUS and it's works fine. The problem is that reboot for the machines are very critical. It seem that the WinXP computers don't need to reboot every time an update has been installed bu the Servers allways need at reboot! Why this difference and can change some settings on the Servers 2003 so I not allways need to reboot? Thanks in advance JK
-
Missing Admin Shares
by Guest Oxo- 4 replies
- 679 views
Hi, I am experiencing a strange problem on a large number of XP machines on our domain. At least half of our PCs (both notebooks and desktops) are missing the administrative shares in Windows XP (C$ and Admin$) on a daily basis. It seems that the following key gets reset back to 0 (instead of 1) on a regular basis, with no intervention from us or the user. This key enables or disables the Admin shares:- Hive: HKEY_LOCAL_MACHINE Key: SYSTEM\CurrentControlSet\Services\LanManServer\Parameters Name: AutoShareWks for workstations Type: REG_DWORD Value: 1 (on) 0 (off) As far as I'm aware, we have no virus infection that could cause this and h…
-
Security controls in a web application
by Guest Big Charles- 2 replies
- 473 views
Hello, I have developed a web application in .NET that interacts with Oracle database. Now this app is been audited according to security issues of ISO 17799. I'm afraid that my web app is lacking of many security controls. I have implemented some security controls like a login page that asks for userid and password in order to access the web app. Also, every web page calls a stored procedure when is loaded. That SP consults if the userid is allowed to access that web page. However, there are many other security controls that I didn't know. For example, a guy asked me if the login page controls how many times can somebody try to login. If somebody tries t…
-
Which scenario is more secure? (VPN)
by Guest Mr. Magoo- 2 replies
- 497 views
Scenario 1: I have a Windows box running IAG (the Microsoft Remote Access solution). Such box is in the 'perimeter' network. This box is supposed to be joined to the internal domain in order to allow users to reset passwords, etc. Scenario 2: Linux based VPN box. Box is also in the perimeter network. Box is not joined to the domain at all. This box requires to have a domain user account with 'reset password rigts' configured. Hard drive of such machine is protected by strong encryption. From a security stand point, which solution above is stronger?
-
Blocking threats from USB storage device
by Guest zhengshareware- 10 replies
- 1.1k views
USB storage devices have gained popularity nowadays. However, they are always host to viruses, Trojans, hacker toolkits, worms and other kinds of malicious programs. For example, when you plug your USB disk into a computer that is infected by viruses, these viruses will enter into your USB disk by creating a file named AUTORUN.INF and malicious programs on the disk. After that, when you use the USB disk in another computer, the one will be at risk. Threats from USB storage devices to computers have been a huge security risk for businesses and individuals. So, how should we protect against threats from USB storage devices? Well, here are some suggestions. 1. Disa…
-
Windows XP Pro x64 Performance Monitoring Permissions
by Guest 5000wpm@googlemail.com- 0 replies
- 419 views
Hi, Recently we have upgraded our systems to Windows XP Pro x64 and have run into a Permissions Problem. The problem I am working on involves normal users being able to use the 'Process Monitor' administration tool. After a bit of searching I discovered the following from MS: >From Windows Server 2003, you will get an exception if you try to get process performance information under a non-admin account. The workaround is to add that account into the Performance Counter Users Group." I have found this response in server places quoting both "Performance Counter User" and "Performance Counter Users" Our domain is functioning as a Windows Server 2003 domain…
-
Blocking threats from USB storage device
by Guest zhengshareware- 2 replies
- 492 views
USB storage devices have gained popularity nowadays. However, they are always host to viruses, Trojans, hacker toolkits, worms and other kinds of malicious programs. For example, when you plug your USB disk into a computer that is infected by viruses, these viruses will enter into your USB disk by creating a file named AUTORUN.INF and malicious programs on the disk. After that, when you use the USB disk in another computer, the one will be at risk. Threats from USB storage devices to computers have been a huge security risk for businesses and individuals. So, how should we protect against threats from USB storage devices? Well, here are some suggestions. 1. Disa…
-
Re: Find very quick method in detecting once the usb key is plugged
by Guest zhengshareware- 2 replies
- 495 views
The software removable storage guard is able to solve your problem. It protects you against all the threats via USB memory disk that try to attack your computer. Download link: http://www.download.com/Removable-Storage-Guard/3000-2239_4-10708709.html?tag=lst-0-2 http://www.tucows.com/software_detail.html?id=513961
-
Protecting the Automatic Logon Password
by Guest simple_user- 3 replies
- 606 views
Hi there, I was trying to change the way of automatic logon. I wrote simple executable using LSA to set password by LsaStorePrivateData (). Then I deleted reg.key value ‘DefaultPassword’ I restarted PC (WindowsXP installed) but it didn’t get through – it show log-on dialog and I have to enter password manually. I thought that Winlogon should be able to retrieve ‘secret’ password and not to look for ‘DefaultPassword’ value. Do I missing something here? Any additional steps needs? Regards,
-
0.6629967 Now Look Here ... 0.801854
by Guest iwantsex@0.9005771nowathome.com- 2 replies
- 505 views
0.3852821 Now Look Here ... 0.9005771 0.6629967 Now Visit http://www.clicklinknow.com/ss/ 0.801854