W


WAIK. See Windows Automated Installation Kit

web servers, 293-294

buffer overflows, 296

DoS attacks, 298-299

OS vulnerabilities, 295

password guessing attacks, 299

sniffing attacks, 297-298

threats, 293-299

list of, 294

Web sites in less privileged web content zone can navigate into this zone (setting), 275, 281

Wecsvc service. See Windows Event Collector service

WEP. See Wired Equivalent Privacy

wetware, 546. See also information security

wf.msc, 422

WFP. See Windows File Protection; Windows Filtering Program

Whoami /all command, 114

security token and, 125

Wi-Fi, 461-471. See also wireless networks

Ad-Hoc mode, 462-463

Alliance, 462

best practices, 482

802.11 network technologies, 461

802.11 standards, 463-464

comparison of, 464

types, 463

Infrastructure mode, 462-463

security standards, 464-471

setup diagram, 462

terminology/technologies, 461-471

Wi-Fi Protected Access. See WPA

Wi-Fi Protected Setup (WPS), 466, 467

Window Stations (winsta), 211

Windows authentication, 322-323, 324

other authentication methods v., 325

Windows Automated Installation Kit (WAIK), 549, 550. See also Windows Pre-Installation Environment

Windows Backup. See Backup, Windows

Windows CardSpace. See CardSpace

Windows Defender, 13, 14, 230, 231-238. See also Windows Live OneCare subscription service

accuracy, 236-237

heuristic scanning, 235

OneCare and, 238, 239

real-time scanning, 232

areas of, 232-233

Software Explorer feature, 235, 236

startup program information by, 236

Windows Event Collector (Wecsvc) service, 30

Windows Explorer, 154

elevation motions for, 154-156

deletion and, 154-156

Windows Fax and Scan service, 215

Windows File Protection (WFP), 25, 26, 209. See also Windows Resource Protection

WRP v., 209

Windows Filtering Program (WFP), 405-407

architecture diagram of, 406

Windows Firewall. See Firewall, Windows

Windows infrastructure, 73-117

Windows Installer 4.0, 28

Windows Live ID, 34

Windows Live Mail, 352

Windows Live Messenger, 214

Windows Live OneCare subscription service, 238-239

anti-virus scanning, 238

firewall, 238

Windows Defender and, 238

Windows Mail, 31. See also e-mail

domain blocking, 387-390

e-mail storage in, 390

introduction, 384-390

junk mail detection, 386-387

phishing detection, 385-386

security features, 384-390

Windows Meeting Space, 214, 215

Windows Messenger, 214. See also Office Live Communicator

Windows Modules Installer, 181. See also Trusted Installer service

Windows Name Service (WINS), 90

Windows NT file system. See NTFS

Windows Pre-Installation Environment (WinPE), 10-11, 549

bootable USB flash drive, 549

building, 549-554

features, 10-11

packages in, 551

Windows Presentation Foundation (WPF) platform, 264

Windows Protected Media Path (WMPM), 7

Windows Recovery Environment (WinRE), 10

Windows Remote Management (WinRM) service, 30

Windows Resource Protection (WRP), 26, 209-210

Web information on, 210

WFP v., 209

Windows Shared View, 37

Windows Sidebar, 215

Windows Terminal Services, 148. See also Remote Desktop

Windows Vista. See also access control lists; Group Policy; information security; security features, Vista; wireless networks

ACLs, 114-117, 171-201

client protection, 225-241

components

new, 215

optional, 213-214, 214

reduction of, 213-214

removed, 214-215

undesirable, 215-216

information security, 519-547

security features, 3-42

Security Guide, 510-513

security options, 498-504

wireless improvements in, 476-477

Windows XP, 178. See also access control lists

ACL UI, 197

ACLs, 178-179

default, 179

problems in, 178-179

firewall, 403, 404

WindowsSystem32 files

protection of, 23

Winload.exe, 9, 75, 76

Winlogon, 496. See also Group Policy

Group Policy and, 496-497

WinPE. See Windows Pre-Installation Environment

WinRE. See Windows Recovery Environment

Winresume.exe, 10

WinRM service. See Windows Remote Management service

WINS. See Windows Name Service

winsta. See Window Stations

Wired AutoConfig, 467

Wired Equivalent Privacy (WEP), 465-466, 480-481

Dynamic, 480-481

Wireless Fidelity, 462. See also Wi-Fi

wireless networks, 482. See also Wi-Fi

best practices, 482

securing, 37, 477-481

threats, 471-475

DoS attacks, 475

eavesdropping, 472-474

malware, 474-475

unauthorized access, 474

Vista improvements for, 476-477

Wireshark, 57

WMF worm, 228, 229

WMI filters, 440-441

version specification, 441

Work network domain, 35

worker processes, 309

working set, privilege for, 141

Workstation service, 98, 99, 205

disabling, 98-99

worms, 62. See also specific worms

WPA (Wi-Fi Protected Access), 466, 481

Enterprise Mode, 467-471

Personal Mode, 466-477

using, 481

WPA2 Enterprise Mode, 467-471

WPA2/802.11i, 466, 481, 482

WPF platform. See Windows Presentation Foundation platform

WPS. See Wi-Fi Protected Setup

write-restricted tokens, 207

services with, 207

WRP. See Windows Resource Protection



Windows Vista Security. Securing Vista Against Malicious Attacks
Windows Vista Security. Securing Vista Against Malicious Attacks
ISBN: 470101555
EAN: N/A
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net