Tech Tips

Windows NT

Using two or more monitors

Windows 2000 makes it much easier to configure and use multiple displays. Whether you're doing software or Web development, desktop publishing, or other applications, having extra screen real estate can be a productivity booster. You can add additional PCI display adapters to a Win2K system to act as secondary displays...

Keeping passwords unique with domain account policies

A solid password aging policy can help secure network resources by forcing users to select different passwords periodically. Not only does this make it more difficult for intruders to guess user passwords, it also limits the amount of time that a cracked password can be used for illicit purposes. To...

Password expiration notification

As you know, security-minded administrators apply policies to user accounts that define password length, uniqueness, and expiration requirements. By default, Windows NT displays the password expiration notification 14 days in advance. If users complain that this is too little or too much time, you can edit the registry to change...

Secure the Administrator account

One of the most important user accounts in any network is the Administrator account. Users that can access this account can pretty much do anything they darn well please. You definitely don't want this account falling into the hands of intruders or other unauthorized personnel. So what can you do...

When you create a DNS zone, the name of the logged-on user is automatically placed in the SOA record

Did you know that when you create a new zone file in DNS, you might inadvertently reveal the name of the administrator account? When you create a DNS zone, the name of the logged-on user is automatically placed in the Responsible Person field in the Start of Authority (SOA) property...

Stopping unauthorized DNS zone transfers

If you do not specifically configure your DNS server to accept zone transfer requests only from designated sources, anyone on the Internet with the proper tools can transfer a complete copy of your DNS zone database to their system. This is normally done using the NSLOOKUP program and the...

Dealing with file types that execute automatically

Virus and script attacks leave many users and administrators feeling vulnerable, and for good reason. Antivirus software and other security tools are available, but another way to address some of these attacks is by using certain system settings that can help prevent rogue software from running. It's possible, for example,...

Adding a security warning

In some situations, you may want to add a security warning to Windows NT that users will see before they log on. Doing so is easy but requires you to edit the registry. To create a security warning, open the registry editor and navigate to \HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows NT\CurrentVersion\WinLogon. Next, double-click...

Auditing failed logons to track hacker activity

Hackers often gain access to a system by setting up an automated program that bombards a server with thousands of possible password combinations. Windows NT provides an auditing utility that can help you recognize these hacking attempts by tracking events at the system and object level. By default, this auditing...

Cached credentials: Another security issue

It's amazing how often a simple convenience for you becomes a virtual gift horse for a cracker. And since it seems like everybody's attempting to breach network security, it helps to be aware of the conveniences that may be in place on your organization's network that could make cracking the...

Contact Us | Authors | Subject Index | RSS Feeds

Copyright ©2007 Setup32.com