123ArticleOnline Logo
Welcome to 123ArticleOnline.com


Here's the recent articles submitted by yang ws

Articles By yang ws

Page: << <    6  7 [8]  9  10  11    >  >>


Guidelines For Deciding Which Administrative Template To Use    Submitted as: unknownmem
Use administrative templates to apply restrictions selectively to users. A different policy can be designed for an OU or even, using filtering by groups, for members of specific Windows Groups whose accounts are in the OU.(read entire article)
View : 239 Times
Category : Education

Administrative Template Settings That Manage Remote Access    Submitted as: unknownmem
This setting will prevent the use of this tool by users to share items on the desktop "with other users. Providing remoteusers access to resources on a client system in any manner is a security risk.(read entire article)
View : 220 Times
Category : Computers

Practice: Analyzing Administrative Template Settings To Control Application Features    Submitted as: unknownmem
Enable this setting to prevent users with Citrix ICA clients from reconnecting to a session from a computer other than the computer that they started the session with.(read entire article)
View : 232 Times
Category : System/Network Administration

Design Activity: Designing Technical Controls To Manage The Use Of Laptop Computers    Submitted as: unknownmem
Chief Security Officer "We have a very restrictive desktop lockdown program. If there is a way to configure an application so that you must be an administrator to configure it, we do it.(read entire article)
View : 242 Times
Category : System/Network Administration

Designing Security For Wireless Networks    Submitted as: unknownmem
Change the SNMP community word. Some access points run an SNMP agent. This provides a network management tool for network administrators, and if the community word is left at the default, it is a tool that can be used by attackers to configure the access point(read entire article)
View : 250 Times
Category : System/Network Administration

Guidelines For Providing Proper Wireless Access Point Configuration And A More Secure Network Topolo    Submitted as: unknownmem
Change the default Server Set ID (SSID). The SSID identifies the wireless access point and thus its wireless network. If the wireless access point is correctly configured, only clients that are configured with the same SSID can communicate with it.(read entire article)
View : 247 Times
Category : System/Network Administration

Designing Security Using 802.1x For Wireless Networks    Submitted as: unknownmem
Microsoft Internet Authentication Services (IAS) can be used as the RADIUS server. Both computer and user authentication flexibility is added by the ability to use Exten-sible Authentication Protocol (EAP) types, including the following:(read entire article)
View : 229 Times
Category : Computers

Practice: Securing A Rogue Access Point    Submitted as: unknownmem
You attend a meeting in the executive suite of Tailspin Toys. You find that a "wireless access point provides network access for the executive suite. By asking a few questions, you determine that the access point was given to the president of the company by his wife.(read entire article)
View : 197 Times
Category : Education

Translating A Security Policy That Controls User Access To Operating System Features    Submitted as: unknownmem
Software restriction policies Tools in Group Policy that can be used to restrict or allow software to run on computers running Windows XP Professional and Windows Server 2003.(read entire article)
View : 191 Times
Category : Computers

Securing A Network From A Free Wireless Access Site    Submitted as: unknownmem
The Baldwin Museum of Science has a community center and promotes the use of the center for public activities. It also organizes public events such as music concerts, poetry readings, and art displays.(read entire article)
View : 227 Times
Category : Education

See As RSS
Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: