Background Intelligent Transfer Service (BITS), 269, 445
Backup Operators group, 86, 103–104
backups
allowing access to, 497–498
for EFS, 471–476
restoring, security options for, 502, 503
Barracuda Spam Firewall, 69–70
.bas files, 194
Baseline Security Analyzer, Microsoft (MBSA), 65
Basic authentication, IIS, 430, 431, 432, 449
.bat files, 194, 247
batch files, 23, 194, 247
Batch group, 84, 104
batch job
allowing logons as, 500
denying logons as, 499
Bayesian filtering, anti-spam software using, 412–413
Beagle.AV worm, 195, 200, 391
BeatLM program, 168
BHOs (Browser Helper Objects), exploitation of, 364–365
BIOS, password-protecting, 71
birthday attacks, 173
BITS (Background Intelligent Transfer Service), 269, 445
blacklists, anti-spam software using, 410
Blaster worm, 8, 253
blocked inheritance, for GPOs, 532
Blowfish encryption, 299
.bmp files, 194
Bookmarker trojan, 41
books. See publications
boot files, permissions for, 135
Boot Information Negotiation Layer service, 283
boot sectors, viruses infecting, 12
booting
boot-up passwords, 71
restricting to primary hard drive, 71
Boot.ini file, 23, 132
Bootsec.dos file, 23
botnets, 13–14
bots (spam bots), 5, 395, 409, 419
Bradley, Susan (The Complete Patch Management Book), 64
Brett Hill's IIS Answers.com, 456
Bropia trojan, 34
Browser Helper Objects (BHOs), exploitation of, 364–365
browser interface manipulation, 364
browsers. See also IE (Internet Explorer)
cell-phone-based, 350
Firefox browser, 52–53, 350, 351–352
Konqueror browser, 350
Lynx browser, 350, 351
Mozilla browser, 350, 351
Netscape browser, 350
Opera browser, 350, 351
Safari browser, 350
brute-force attacks for password cracking, 171–172
Brutus program, 164
buffer overflow attacks
definition of, 15
file flaws allowing, 191
risks associated with, 217–218
services and, 254
using IE (Internet Explorer), 357
built-in groups, list of, 102–113
Built-In OU, 520
built-in users, list of, 99–102
bulk e-mailing programs, 394–395
bullet-proofing, 395