|
|
When writing this chapter, I didn't want to provide you with detailed, step-by-step instructions on the methods of cracking Windows NT/2000/XP (this information wouldn't be sufficient, anyway). Rather, this chapter is addressed to those of you who are interested in security in general (and in Windows NT security in particular) and want to restrict the security of their networks. Remember: "The person who's been warned, is armed".
Of course, this chapter isn't a complete reference on computer security. This topic deserves a separate book (and there are volumes of these in libraries). Additional information sources are provided in the bibliographical reference at the end of this book.
|
|