Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] failures CrashOnAuditFail family PCs (physical security) fault trees features disabling feedback receiving 2nd 3rd 4th 5th file encryption key (FEK) files encrypting 2nd recovering 2nd generic rights on HOSTS blocking spyware SRPs (software restriction policies) 2nd TIF (temporary Internet files) filtering IPsec traffic resticting access 2nd 3rd filters IPsec limiting malicious code firewalls applying 2nd 3rd 4th 5th 6th for small business configuring 2nd malicious code (limiting) types of Windows XP Service Pack 2 first-level zombies fixes folders redirecting footprinting networks address ranges 2nd application/OS version information 2nd expected hosts 2nd exposed applications host names 2nd patch states (of applications and hosts) public information 2nd structure (of applications and back-end servers) forewarning formatting removable media FRK (file encryption key) full IP VPNs 2nd 3rd 4th 5th 6th 7th full privilege auditing functionality restricting browser 2nd 3rd 4th turning off 2nd 3rd functions LSALogonUser |