T


Take Ownership permission, 125, 126

.tar files, 202

Task Scheduler

definition of, 279

malware using, 31

Tasks folder, 29

.taz files, 197, 202

TCP/IP NetBIOS Helper Service, 279

TCP/IP Print Server Service, 286

TCP/IP scanning program, 9

TCP/IP stack, hardening, 71–73

Telephony service, 279

Telnet service, 280

Telnet URI handler, 250

TelnetClients group, 111

templates

Administrative templates, group policy settings in, 481, 485

Document Template files, 196

Outlook Template files, vulnerabilities in, 199

Security templates, group policy settings in, 481, 485

Temporary Internet Files folder (TIF), IE, 29, 362, 380

Ten Immutable Laws of Security (Microsoft), 7

Terminal Server License Servers group, 86, 112

Terminal Server Users group, 85, 112

Terminal Services, 280

Terminal Services logons

allowing, 497

denying, 499

Terminal Services Session Directory, 280

TFTP (Trivial File Transfer program), attacks using, 8

.tgz files, 197, 202

Themes service, 280

This Organization group

computer accounts in, 116

definition of, 112

SID for, 85

Windows trusts and, 117

3DES (Triple DES), 299, 464

.386 files, 202

TIF (Temporary Internet Files) folder, IE, 29, 362, 380

Tiny Firewall, 68

TLS (Transport Layer Security), IE settings for, 383

TMKSoft.XPlugin adware, 48

Tn3270 URI handler, 250

token object, creating, 498

token-based authentication, 187

TokenMon utility (Sysinternals), 91

Top-Level Authority value, SID, 83–84

Transform Files (MST), 489

transport mode, IPSec, 297–298

traverse checking, bypassing, 498

Traverse Folder permission, 124, 126, 127–128

Triggers, for IIS, 446

Triple DES (3DES), 299, 464

Trivial File Transfer program (TFTP), attacks using, 8

Trivial FTP Daemon Service, 286

trojans. See also malware

Bookmarker trojan, 41

botnets, 13

Bropia trojan, 34

command and control trojan, 13

Daqa trojan, 73

definition of, 13–14

Download.Ject trojan, 38

FakeGina trojan, 165

Flush.D trojan, 49

Haxdoor.B backdoor trojan, 43

Haxor backdoor trojan rootkit, 41

keystroke logging trojans, 165

password logging trojans, 165

Petch trojan, 33, 41

Popdis Trojan, 47

Qaz trojan/worm, 190

Qhosts trojan, 48, 49

RAT (remote access trojan), 13

Redfall trojan, 46

Riler trojan, 73

rootkits, 14

Spyware Eblaster trojan, 38

StartPage.I trojan, 45

StartPage.O trojan, 43

Webber trojan, 38

zombie trojan, 13

True policies, 486

trust password, 523

Trusted for Delegation, enabling, 499–500

trusted man-in-the-middle (MitM) attacks, 322

Trusted Publishers, 31

Trusted sites zone, IE, 361

trusts

in Active Directory, 522–523

Windows trusts, permissions and, 116–117

TSGrinder program, 164–165

tunnel mode, IPSec, 297

twins (companion viruses), 12

two-factor authentication, 187

2004 Computer Crime and Security Survey (FBI), 5

2004 ICSA Labs Tenth Annual Computer Virus Prevalence Survey, 5, 391

.tz files, 202

Tzu, Sun ("Know Thy Enemy" strategy), 3



Professional Windows Desktop and Server Hardening
Professional Windows Desktop and Server Hardening (Programmer to Programmer)
ISBN: 0764599909
EAN: 2147483647
Year: 2004
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net