Professional Windows Desktop and Server Hardening


Roger A. Grimes

image from book

Published by Wiley Publishing, Inc.

10475 Crosspoint Boulevard Indianapolis, IN 46256.
www.wiley.com

Copyright © 2006 by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN-13: 978-0-7645-9990-3

ISBN-10:

0-7645-9990-9

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

1MA/RS/QU/QW/IN

Library of Congress Cataloging-in-Publication Data:

 Grimes, Roger A.  Professional Windows Desktop and Server Hardening / Roger Grimes.    p. cm.  Includes index. 

ISBN-13: 978-0-7645-9990-3 (paper / web site)

ISBN-10: 0-7645-9990-9 (paper / web site)


1. Computer security. 2. Computer networks—Security measures. 3. Microsoft Windows (Computer file) I. Title.

QA76.9.A25G775 2006

005.8—dc22

2006003777

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at www.wiley.com/go/permissions.

image from book

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.

image from book

For general information on our other products and services please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Trademarks: Wiley, the Wiley logo, Wrox, the Wrox logo, Programmer to Programmer, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. Windows is a registered trademark of Microsoft Corporation in the United States and/or other countries. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

About the Author

Roger A. Grimes

Roger A. Grimes (CPA, CISSP, MCSE: Security, MVP, CEH, CHFI, TICSA) is a 20-year computer security consultant, writer, and teacher. He has written over a 150 national magazine articles on computer security, and this is his fifth book on Microsoft Windows security. He has consulted for many of the world's best-known enterprises (including McAfee, Microsoft, Verisign, and IBM), multiple universities, cities and school systems, plus every branch of the U.S. armed forces. He is currently a highly rated instructor teaching Windows and Linux security in Foundstone's Ultimate Hacking classes. He has presented at many of the industry's largest conferences, including MCP TechMentor, Windows Connections, and SANS. He was a contributing editor for Windows IT Pro magazine, and is the security columnist for InfoWorld magazine. He has written several advanced security courses, including for Microsoft. He is a three-year recipient of Microsoft's Most Valuable Professional (MVP) award, and was the creator and team leader of the successful www.hackiis6.com contest.

Acknowledgments

Twenty years ago, I thought I knew the world. Now, I know that I only barely grasp what would fit on the end of a technological fingernail. To that end, I want to thank the computer scientists and mailing lists that have had the most impact upon my learning.

I want to thank Microsoft and all the members of the par excellence MVPSec mailing list. You guys and gals are my doctorate education. I especially want to thank the following MVPs for their constant written responses to my endless questions: Susan Bradley, Chris Quirke (my tech reviewer), Joe Richards, Alun Jones, Obiwan, Bill Sanderson, Stephen J. Friedl (the Unix guru), Karl Levinson, Ron Chamberlin, and Harry L. Waldron.

Thanks to Microsoft for all the help and assistance in reviewing material and allowing me to read and experience the new stuff coming in Windows Vista, Internet Explorer 7.0, and IIS 7. Special thanks to Brett Hill, Microsoft's IIS Evangelist (and my friend for many years) for reviewing the chapter on IIS.

Thanks to Dshield, SANS, Bugtraq, and Securityfocus for the best practical public computer security mail lists on the planet. I especially want to thank Stephen Northcutt for his continued mentoring and guidance. I could not ask for a better employer, Foundstone, who pays me to teach and hack.

Thanks to Tim Nolan for reviewing my password chapter, making sure it was up to date and accurate. Thanks to Andrew Aronoff of Silent Runners.org for his script and excellent list of malware vectors. Thanks to Brian Livingston for feeding the world Windows facts for over a decade. Thanks to Ed Foster (the Gripeline) for fighting the hardest battles all the time. Thanks to Paul Ferguson, who invited me to disassemble my first computer virus back in 1987.

A big thanks to Carol Long who had the vision, and patience, to let me write the book I wanted to write. Thanks to Kenyon Brown, who suffered through my multiple drafts at all unexpected hours.

Lastly, thanks to my readers for frequently e-mailing me, asking me questions, and for frequently taking me to task over my various suggestions, forcing me to do more research. Our debates have made this a better book.

Credits

Executive Editor
Carol Long

Development Editor
Kenyon Brown

Technical Editor
Christopher Quirke

Production Editor
William A. Barton

Copy Editor
Luann Rouff

Editorial Manager
Mary Beth Wakefield

Production Manager
Tim Tate

Vice President and Executive Group Publisher
Richard Swadley

Vice President and Executive Publisher
Joseph B. Wikert

Project Coordinator
Michael Kruzil

Media Development Specialists
Angela Denny
Kit Malone
Travis Silvers

Graphics and Production Specialists
Carrie A. Foster
Denny Hager
Alicia B. South

Quality Control Technicians
John Greenough
Brian H. Walls

Proofreading and Indexing
Techbooks



Professional Windows Desktop and Server Hardening
Professional Windows Desktop and Server Hardening (Programmer to Programmer)
ISBN: 0764599909
EAN: 2147483647
Year: 2004
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net