P-Q


P2P networking. See peer-to-peer networking

package point and print functionality, 506

Passport services, 34, 259. See also CardSpace; Windows Live ID

password authentication, 14, 16

password cracking, 14, 44, 48-50. See also logon credential guessing/cracking

benefits of, 48, 50

methodology, 48

programs, 48

speed of, 48, 49

tools, 112, 113

ebook for, 113

password dictionaries, 47

attacks, 46

password guessing, 44-47

attacks, 299

web servers and, 299

automated, 44-46

problems with, 47

types of, 46

password hacking methods, 50-51

password hashes, 48

LM, 110

NT, 110

password hybrid attacks, 46

password storage, 110

password strength, 533, 535

account lockout and, 541-545

passwords, leaked, 383. See also malicious file attachments

PatchGuard, 39

patching

hot, 28

management, 28

PC/AT BIOS, 74, 75. See also EFI

Peer Name Resolution Protocol (PNRP), 37

peer-to-peer (P2P) networking, 37

people, hardening, 547

perimeters, SDI and, 448-449

permissions. See also NTFS; Share permissions

ACLs and, 24, 171

default, 186-189, 201

changes to, 186-189

modification of, 188-189, 201

phishing attacks, 383

phishing detection, Windows Mail, 385-386

phishing filter, 32, 254

anti-, 254-256

security zone setting, 274-275, 281

Piaget, Chris, 212

plain-text conversion, e-mail, 391-393. See also e-mail

Platform Software Developers Kit, 174

PM. See Protected Mode

PNRP. See Peer Name Resolution Protocol

Ponemon Institute, 77

Pop-up Blocker

security zone setting, 275, 281

portscanning, 409

POSIX subsystem

optional, 214

POST. See Power-on-Self Test

post-boot startup, 87

Power Users, 25, 180, 199

end of, 147, 180

Power-on-Self Test (POST), 74, 75

preferred networks, 463

Pre-Shared Key (PSK), 466

printer deployment, 506

Private network domain, 35

privilege(s). See also specific privileges

account rights v., 140

common task delegations and, 140-143

escalation, 54-55

new, 140-143

services with less, 205-207

Process Tracking auditing, 538

processes, 173. See also specific processes

as securable objects, 173

profiles, firewall, 417-419. See also Firewall, Windows; specific profiles

per-interface, 444

Protect Your PC marketing campaign, 128, 526

Protect Your Windows Network: From Perimeter to Data (Johansson, Riley), 174

Protected Mode (PM), 32, 146, 248-254, 277. See also Internet Explorer 7.0

low integrity folders, 250

malware/hackers impacted by, 253-254, 289

shim compatibility architecture, 251-252

turn off, 251

protected processes, 7

Task Manager and, 7

protocol listeners, 307-309. See also specific protocol listeners

protocols, 295

vulnerabilities, 295-296

PSK. See Pre-Shared Key

Public network domain, 35

Pwdump, 112



Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net