P2P networking. See peer-to-peer networking
package point and print functionality, 506
Passport services, 34, 259. See also CardSpace; Windows Live ID
password authentication, 14, 16
password cracking, 14, 44, 48-50. See also logon credential guessing/cracking
benefits of, 48, 50
methodology, 48
programs, 48
speed of, 48, 49
tools, 112, 113
ebook for, 113
password dictionaries, 47
attacks, 46
password guessing, 44-47
attacks, 299
web servers and, 299
automated, 44-46
problems with, 47
types of, 46
password hacking methods, 50-51
password hashes, 48
LM, 110
NT, 110
password hybrid attacks, 46
password storage, 110
password strength, 533, 535
account lockout and, 541-545
passwords, leaked, 383. See also malicious file attachments
PatchGuard, 39
patching
hot, 28
management, 28
PC/AT BIOS, 74, 75. See also EFI
Peer Name Resolution Protocol (PNRP), 37
peer-to-peer (P2P) networking, 37
people, hardening, 547
perimeters, SDI and, 448-449
permissions. See also NTFS; Share permissions
ACLs and, 24, 171
default, 186-189, 201
changes to, 186-189
modification of, 188-189, 201
phishing attacks, 383
phishing detection, Windows Mail, 385-386
phishing filter, 32, 254
anti-, 254-256
security zone setting, 274-275, 281
Piaget, Chris, 212
plain-text conversion, e-mail, 391-393. See also e-mail
Platform Software Developers Kit, 174
PM. See Protected Mode
PNRP. See Peer Name Resolution Protocol
Ponemon Institute, 77
Pop-up Blocker
security zone setting, 275, 281
portscanning, 409
POSIX subsystem
optional, 214
POST. See Power-on-Self Test
post-boot startup, 87
Power Users, 25, 180, 199
end of, 147, 180
Power-on-Self Test (POST), 74, 75
preferred networks, 463
Pre-Shared Key (PSK), 466
printer deployment, 506
Private network domain, 35
privilege(s). See also specific privileges
account rights v., 140
common task delegations and, 140-143
escalation, 54-55
new, 140-143
services with less, 205-207
Process Tracking auditing, 538
processes, 173. See also specific processes
as securable objects, 173
profiles, firewall, 417-419. See also Firewall, Windows; specific profiles
per-interface, 444
Protect Your PC marketing campaign, 128, 526
Protect Your Windows Network: From Perimeter to Data (Johansson, Riley), 174
Protected Mode (PM), 32, 146, 248-254, 277. See also Internet Explorer 7.0
low integrity folders, 250
malware/hackers impacted by, 253-254, 289
shim compatibility architecture, 251-252
turn off, 251
protected processes, 7
Task Manager and, 7
protocol listeners, 307-309. See also specific protocol listeners
protocols, 295
vulnerabilities, 295-296
PSK. See Pre-Shared Key
Public network domain, 35
Pwdump, 112