R


rainbow tables, 49-50

RATs. See remote access Trojans

Rbot, 226

RDP. See Remote Desktop Protocol

ReadyBoost technology, 19

USB flash memory drives and, 19

Recovery key, 79. See also Boot-up key

REG_DWORD, 101

Regedit.exe, 101

registry, 101

ACLs, 199-200

protection, 23

replacement, 108

structure, 101-108

virtualization, 25

registry keys, 173

list, 67-70

malware in, 67-70

low integrity, 250

as securable objects, 173

REG_MULTI_SZ, 102

REG_SZ, 102

relative identifier (RID), 124, 125. See also Administrator account, built-in 500, 124, 146, 180

reliant components-Run components signed/not signed with Authenticode (setting), 265, 278

remote access

UAC and, 148, 160

remote access Trojans (RATs), 63

Remote Assistance (RA), 148-149

UAC and, 149

Remote Desktop, 148-149

Remote Desktop Protocol (RDP), 26, 27

Remote Procedure Call. See RPC

remove operations, icacls and, 195-196

Request Filtering, 343-344

configuration, 343-344

Restart Manager, 28, 216-218, 222

Web information on, 218

RESTRICTED SID, 199, 200

Restricted sites security zone, 263-264. See also security zone settings

restricted token, 199, 200

Resultant Set of Policy (RSOP) tools, 450, 489

RID. See relative identifier

rights, 140. See also account rights

Rights Management Service (RMS), 27

Riley, Steve, 174, 448

risk management, 520-523, 547. See also information security

enterprise, 521-523

RMS. See Rights Management Service

roaming profiles, 91

robot code, 63. See also bot(s)

rogue Internet links, 58

rootkits, 65, 129, 226

routing compartmentalization, 36

RPC (Remote Procedure Call), 95-96

disabling, 96

Endpoint Mapper service, 205, 206

Windows XP, 205

importance, 96

settings, 508

Windows Firewall and, 442-443

Rpc-dump.exe, 97

RSOP. See Resultant Set of Policy tools

rsop.msc, 489, 491

rules. See specific rules

rules, Windows Firewall, 426-429

authentication exemption, 428

connection security, 427-428

directional, 427

precedence order, 428-429

server to server, 428

tunnel, 428

types, 426-429

when to use, 428

Run ActiveX controls and plug-ins (setting), 268, 279

Russinovich, Mark, 19, 73



Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net