Take Ownership permission, 125, 126
.tar files, 202
Task Scheduler
definition of, 279
malware using, 31
Tasks folder, 29
.taz files, 197, 202
TCP/IP NetBIOS Helper Service, 279
TCP/IP Print Server Service, 286
TCP/IP scanning program, 9
TCP/IP stack, hardening, 71–73
Telephony service, 279
Telnet service, 280
Telnet URI handler, 250
TelnetClients group, 111
templates
Administrative templates, group policy settings in, 481, 485
Document Template files, 196
Outlook Template files, vulnerabilities in, 199
Security templates, group policy settings in, 481, 485
Temporary Internet Files folder (TIF), IE, 29, 362, 380
Ten Immutable Laws of Security (Microsoft), 7
Terminal Server License Servers group, 86, 112
Terminal Server Users group, 85, 112
Terminal Services, 280
Terminal Services logons
allowing, 497
denying, 499
Terminal Services Session Directory, 280
TFTP (Trivial File Transfer program), attacks using, 8
.tgz files, 197, 202
Themes service, 280
This Organization group
computer accounts in, 116
definition of, 112
SID for, 85
Windows trusts and, 117
3DES (Triple DES), 299, 464
.386 files, 202
TIF (Temporary Internet Files) folder, IE, 29, 362, 380
Tiny Firewall, 68
TLS (Transport Layer Security), IE settings for, 383
TMKSoft.XPlugin adware, 48
Tn3270 URI handler, 250
token object, creating, 498
token-based authentication, 187
TokenMon utility (Sysinternals), 91
Top-Level Authority value, SID, 83–84
Transform Files (MST), 489
transport mode, IPSec, 297–298
traverse checking, bypassing, 498
Traverse Folder permission, 124, 126, 127–128
Triggers, for IIS, 446
Triple DES (3DES), 299, 464
Trivial File Transfer program (TFTP), attacks using, 8
Trivial FTP Daemon Service, 286
trojans. See also malware
Bookmarker trojan, 41
botnets, 13
Bropia trojan, 34
command and control trojan, 13
Daqa trojan, 73
definition of, 13–14
Download.Ject trojan, 38
FakeGina trojan, 165
Flush.D trojan, 49
Haxdoor.B backdoor trojan, 43
Haxor backdoor trojan rootkit, 41
keystroke logging trojans, 165
password logging trojans, 165
Petch trojan, 33, 41
Popdis Trojan, 47
Qaz trojan/worm, 190
Qhosts trojan, 48, 49
RAT (remote access trojan), 13
Redfall trojan, 46
Riler trojan, 73
rootkits, 14
Spyware Eblaster trojan, 38
StartPage.I trojan, 45
StartPage.O trojan, 43
Webber trojan, 38
zombie trojan, 13
True policies, 486
trust password, 523
Trusted for Delegation, enabling, 499–500
trusted man-in-the-middle (MitM) attacks, 322
Trusted Publishers, 31
Trusted sites zone, IE, 361
trusts
in Active Directory, 522–523
Windows trusts, permissions and, 116–117
TSGrinder program, 164–165
tunnel mode, IPSec, 297
twins (companion viruses), 12
two-factor authentication, 187
2004 Computer Crime and Security Survey (FBI), 5
2004 ICSA Labs Tenth Annual Computer Virus Prevalence Survey, 5, 391
.tz files, 202
Tzu, Sun ("Know Thy Enemy" strategy), 3