Summary


Chapter 10 covered the issue of securing Microsoft's most vulnerable and attacked piece of software, Internet Explorer. It described many of the common types of attacks made against Internet browsers, including URL spoofing, buffer overflows, cross-site scripting, zone manipulation, file execution, directory traversal, malicious content, MIME Type mismatch, cookie manipulation, browser interface manipulation, and plug-in exploits. This chapter covered the many ways administrators can make Internet browsing more secure, including individual recommendations for all of Internet Explorer's security settings. Tables 10-4 and 10-5 explain each setting and make a recommendation for most users' Internet zone. Chapter 11 covers how to secure e-mail from malware, spyware, and spam.



Professional Windows Desktop and Server Hardening
Professional Windows Desktop and Server Hardening (Programmer to Programmer)
ISBN: 0764599909
EAN: 2147483647
Year: 2004
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net