Mailinglist Archive


[Fwd: [Downloads] Security policy checklist]
From:Joe Klemmer
Date: Mon, 09 May 2005 21:36:39 -0400

This is a multi-part message in MIME format.
--------------050708080300060409030802
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit

    Some good info here.  You need to be a member of TechRepublic, though.

-------- Original Message --------
Subject: 	[Downloads] Security policy checklist
Date: 	Thu, 5 May 2005 14:33:49 -0700 (PDT)
From: 	TechRepublic 
Reply-To: 	TechRepublic 

To: 	joe@webtrek.com



 	

*Security Policy Checklist:
Make Sure You Hit All of the Issues*

    *Check out these NEW, FREE downloads, exclusively for TechRepublic
    members:*

    *IT Security Policy Checklist
    *
    An IT Security Policy should be a place to standardize and document
    company-wide security practices. This checklist provides a
    comprehensive list of issues that should be covered and recommends a
    variety of security policy best practices. Join the discussion for
    this download to add your recommendations for a security policy.

    *Small Business Storage: Backup Technology Comparison Chart
    *
    Unfortunately, many small businesses fail to adequately protect
    their critical data, or they have aging storage devices that should
    be replaced with newer, more efficient technology. This chart
    compares common devices within three backup technology categories:
    optical, hard drive, and tape. The chart outlines each product's
    important specification, advantages, disadvantages, and primary usage.

    *Windows Server 2003: Lock It Down in 10 Steps
    *
    The default installation of Windows Server 2003 is more secure than
    previous versions of Windows server, but that doesn't mean that your
    work is done. Here is a list of 10 best practices that can help you
    implement top-level security for a Windows Server 2003 system.

    *Hacking Windows-Specific Services on Windows Server 2003
    *
    This sample chapter, taken from McGraw-Hill's *Hacking Exposed
    Windows Server 2003*, provides detailed insight on how to fight
    common hacking methods such as password guessing, eavesdropping on
    authentication, subverting authentication via rogue server or
    man-in-the-middle (MITM) attacks, and attacking vulnerabilities in
    Windows-specific services.

    *Administrator's Guide to Security in Windows Server 2003
    *
    Download the entire Security chapter from TechRepublic's
    *Administrator's Guide to Windows Server 2003* and gain valuable
    insights on best practices for securing Windows Server 2003. The
    chapter provides proven tips for securing Active Directory,
    leveraging Windows Rights Management Services, maximizing group
    policy controls and more.

    *15 Extensions Your PHP Build Must Support
    *
    PHP has always supported a wide variety of extensions, which allows
    it extend with new technologies. Developers take advantage of this
    flexibility to create useful add-ons to the language. This download
    lists some of the most useful PHP extension modules, discussing how
    they may be used and the configure-time arguments needed to activate
    them in the UNIX version of PHP.

    *Remove Internet Explorer Content Advisor Password
    *
    When users forget their Internet Explorer Content Advisor passwords,
    you can't reset the password without knowing the original password,
    and reinstalling IE won't solve the problem, because the password
    settings are stored in the Windows registry. This one-page task
    sheet shows you how to quickly remove the IE Content Advisor
    password with a simple Windows registry hack.

    *Get the Most Out of Your IT Budget by Using Portfolio Management
    *
    Here is a comprehensive document from project management guru Tom
    Mochal that shows how the principles of portfolio management can be
    applied to businesses in general, and even to business units such as
    IT. This can help you decide how to put your money in the places
    where it can make the most impact on your business.

    *Webcast: The Business Case for VoIP Collaboration
    *
    Learn about the benefits derived from good VoIP collaboration tools
    and how they impact the bottom line, as well as one company's use of
    collaboration to improve customer service and employee productivity
    in this Webcast from Shoretel.

    *Follow the Rules to More Effective C# Programming
    *
    For C# programmers, no single function generates more discussion and
    more confusion than GetHashCode(). Hash-based containers use hash
    codes to optimize searches. In .NET, every object has a hash code
    that is established based on three specific rules. This chapter from
    Bill Wagner's *Effective C#: 50 Specific Ways to Improve Your C#*,
    explains how those three rules are applied and how their proper
    application is essential to effective C# programming.

    *Exchange Server: Lock It Down in 10 Steps
    *
    E-mail is one of the most pervasive business applications in the
    world, which makes e-mail servers a major target for hackers. Use
    this list of 10 best practices to help get your Microsoft Exchange
    servers locked down. Provide your own Exchange security tips in the
    discussion of this download.

    *White Paper: Business Strategies for Accelerating Growth: The Value
    of Making Better Decisions Through CRM
    *
    Download this Siebel Systems white paper and learn the five key
    components of a successful customer relationship management (CRM)
    initiative and how they can improve your organization's
    decision-making ability.

    *Visit our Downloads Center*
     for more!

    ------------------------------------------------------------------------

    *Happy Birthday TechRepublic:* We're giving away 6 iPod Minis!

    To celebrate our birthday, we're giving away lots of great prizes
    including 6 iPod Minis and tons of TechRepublic merchandise. Find
    out how you can enter to win!
    

Copyright © 2005 CNET Networks, Inc. All rights reserved.
------------------------------------------------------------------------
You expressed interest in receiving periodic updates and information 
from TechRepublic when you became a TechRepublic member. If you no 
longer wish to receive these updates, please go here 
, or 
to review your other TechRepublic e-mail settings or unsubscribe from 
all TechRepublic e-mail lists, go here 
. You are currently 
on our mailing list as [joe@webtrek.com].

Member Preferences, TechRepublic, 1630 Lyndon Farm Court, Louisville, KY 
40223, USA


-- 
Joe Klemmer 
Linux/UNIX System Administrator | Resident Hacker | Linux Instructor


--------------050708080300060409030802
Content-Type: multipart/related;
 boundary="------------070907090904050501050004"


--------------070907090904050501050004
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit




  Security Policy Checklist: Make Sure You Hit All of the Issues
  
  


    Some good
info here.  You need to be a member of TechRepublic, though.

-------- Original Message --------
Subject: [Downloads] Security policy checklist
Date: Thu, 5 May 2005 14:33:49 -0700 (PDT)
From: TechRepublic <CNET_Networks_Member_Services@newsletter.online.com>
Reply-To: TechRepublic <CNET_Networks_#3.147236.3330393831333937@newsletters.online.com>
To: joe@webtrek.com


Security Policy Checklist: Make Sure You Hit All of the Issues

Security Policy Checklist:
Make Sure You Hit All of the Issues

Check out these NEW, FREE downloads, exclusively for TechRepublic members:

IT Security Policy Checklist
An IT Security Policy should be a place to standardize and document company-wide security practices. This checklist provides a comprehensive list of issues that should be covered and recommends a variety of security policy best practices. Join the discussion for this download to add your recommendations for a security policy.

Small Business Storage: Backup Technology Comparison Chart
Unfortunately, many small businesses fail to adequately protect their critical data, or they have aging storage devices that should be replaced with newer, more efficient technology. This chart compares common devices within three backup technology categories: optical, hard drive, and tape. The chart outlines each product's important specification, advantages, disadvantages, and primary usage.

Windows Server 2003: Lock It Down in 10 Steps
The default installation of Windows Server 2003 is more secure than previous versions of Windows server, but that doesn't mean that your work is done. Here is a list of 10 best practices that can help you implement top-level security for a Windows Server 2003 system.

Hacking Windows-Specific Services on Windows Server 2003
This sample chapter, taken from McGraw-Hill's Hacking Exposed Windows Server 2003, provides detailed insight on how to fight common hacking methods such as password guessing, eavesdropping on authentication, subverting authentication via rogue server or man-in-the-middle (MITM) attacks, and attacking vulnerabilities in Windows-specific services.

Administrator's Guide to Security in Windows Server 2003
Download the entire Security chapter from TechRepublic's Administrator's Guide to Windows Server 2003 and gain valuable insights on best practices for securing Windows Server 2003. The chapter provides proven tips for securing Active Directory, leveraging Windows Rights Management Services, maximizing group policy controls and more.

15 Extensions Your PHP Build Must Support
PHP has always supported a wide variety of extensions, which allows it extend with new technologies. Developers take advantage of this flexibility to create useful add-ons to the language. This download lists some of the most useful PHP extension modules, discussing how they may be used and the configure-time arguments needed to activate them in the UNIX version of PHP.

Remove Internet Explorer Content Advisor Password
When users forget their Internet Explorer Content Advisor passwords, you can't reset the password without knowing the original password, and reinstalling IE won't solve the problem, because the password settings are stored in the Windows registry. This one-page task sheet shows you how to quickly remove the IE Content Advisor password with a simple Windows registry hack.

Get the Most Out of Your IT Budget by Using Portfolio Management
Here is a comprehensive document from project management guru Tom Mochal that shows how the principles of portfolio management can be applied to businesses in general, and even to business units such as IT. This can help you decide how to put your money in the places where it can make the most impact on your business.

Webcast: The Business Case for VoIP Collaboration
Learn about the benefits derived from good VoIP collaboration tools and how they impact the bottom line, as well as one company's use of collaboration to improve customer service and employee productivity in this Webcast from Shoretel.

Follow the Rules to More Effective C# Programming
For C# programmers, no single function generates more discussion and more confusion than GetHashCode(). Hash-based containers use hash codes to optimize searches. In .NET, every object has a hash code that is established based on three specific rules. This chapter from Bill Wagner's Effective C#: 50 Specific Ways to Improve Your C#, explains how those three rules are applied and how their proper application is essential to effective C# programming.

Exchange Server: Lock It Down in 10 Steps
E-mail is one of the most pervasive business applications in the world, which makes e-mail servers a major target for hackers. Use this list of 10 best practices to help get your Microsoft Exchange servers locked down. Provide your own Exchange security tips in the discussion of this download.

White Paper: Business Strategies for Accelerating Growth: The Value of Making Better Decisions Through CRM
Download this Siebel Systems white paper and learn the five key components of a successful customer relationship management (CRM) initiative and how they can improve your organization's decision-making ability.

Visit our Downloads Center for more!


Happy Birthday TechRepublic: We're giving away 6 iPod Minis!

To celebrate our birthday, we're giving away lots of great prizes including 6 iPod Minis and tons of TechRepublic merchandise. Find out how you can enter to win!

Copyright © 2005 CNET Networks, Inc. All rights reserved.

You expressed interest in receiving periodic updates and information from TechRepublic when you became a TechRepublic member. If you no longer wish to receive these updates, please go here, or to review your other TechRepublic e-mail settings or unsubscribe from all TechRepublic e-mail lists, go here. You are currently on our mailing list as [joe@webtrek.com].

Member Preferences, TechRepublic, 1630 Lyndon Farm Court, Louisville, KY 40223, USA

-- 
Joe Klemmer <joe@webtrek.com>
Linux/UNIX System Administrator | Resident Hacker | Linux Instructor
--------------070907090904050501050004 Content-Type: image/gif; name="trlogo_white151x42.gif" Content-Transfer-Encoding: base64 Content-ID: Content-Disposition: inline; filename="trlogo_white151x42.gif" R0lGODlhlwAqAPeVAM3MzGloaDg2Ngp/wzY0NLSzs/Ly8ubm5tnZ2QuAxKempmpoaF1bWwN/ wzY1NDc2NQt/xI+OjnZ0dERCQgR/xJqZmTg2NcDAwIKBgVBOTmhnZ9rZ2Tc1NEef0giAxDg1 NXV0dDc0NM3NzU9NTYOCgoG/4QR/w/Py8s3NzKPP6Kinp4W/4eDv91xaWsLf8ODv+HZ1dERD Q8Df8GhoZ5qamdHn9PD3+wSAxBqHyI6NjUig011cXMHAwLOzs4KBgGloZ4S/4V1cW+/3+1FP T6PP6UKf0oO/4Ven1nZ1dbLX7Eag05uamcC/v4+OjUNBQSOPy2av2oKAgJuZmUif08DAv3a3 3WlnZ6HP6EOf08Hf8BSHxwt/w0NCQURCQTOYz9Dn9CqQy6LP6TiXzmev2lxbWjaYz6DP6LDX 7JTH5Wew2qenpgd/xF1bWkRDQpqamimPyzOXzzOXzkOg01io11FOTo+NjaGwuGhoaFWo1xmH x1BNTXK43sfW3o6OjV1aWneuzE9OTiqPy5DH5RqIyKinpk9OTVBOTaHP6YOBgTY1NVFPTpPH 5TmYz2Kv2lKn1lBPToOCgVOn1kOf0puamjc1Nf///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEAAJUALAAAAACXACoAAAj/ACsJHEiwoMGD CBMqXMiwocOHECNKnEixosWLGDNq3Mixo8ePIEOKHGmwAMmTKFEiaIMgpcuXG0+0oGQSps2b BgpMolHAgEIDDChROnCzqMsCEygRUErJh0+DBxgIIDDJqFWSkwgIEErpgwVKExQQNDApKSUN V9OCBCA0xFeuD7ZOCPAjgNKlO56q3ZtwA4YKGPQmzEDpAYgLAABEyCDAAaW3XCkFEfyxhgsX NQ4m3px4A8gDAFAAoFxp8wGdk2oaxBAlQBSxCi8IVS2QrBOuAj4UBkF6YJYBAygkuAEhQYMB CaY8fHK8yEGhWwVsBUtb4yToAAxCn6QhEYcACANM//qBArzBSVVLC4ANlYRZShJQLJSBPIHx 4/YhQHkIAXiH5xaEINQDlHDggADZcTSJAwRwcEJBCLhFySQSBBBABAjBEAEAAahwEAyUkFAJ AgwwhIAIDtVQRAdYaJHAAA10IGMJgqwABBosEBRGCSWskIIQwJmwxxdG8OiCQFyJN0kQQjlA w4joTdKDT6ApMEkFV/YwEAAiiODZiIkhUMEDBDgQZU+lUbLVJJu1VMkGUVaAgAEkRJCeQSNs hUElF4DUwXE3CLRCAx408CIERFTyxRPANdDADS6s8aIX9hk3QBWVWEBgemwJFYEEuW1lwQQb VFAYbpRk4NlbCwikgVILXP+npmNyIYBCgZTIJhR4GMQVnXkK7cAVex79CVwlSUCgrBhg2OfB C2XccAMF1A5wBXIDbOFBccANUglXOYAWlJp2CbXABAQQkIGsZKqp5hCV6EYJhpUEIF2sXBFA oFAZdPrArUKhF5lSwCZkACSOUeKmRzoM0F8lXjj8H5AeeHAEjGvAcYYMZtDnMAR4lKBFxR5U QoCmGAyswlcCVMXEA7qBWNgBJ/hwqghCUSVQUASQIIFjDBhwQAsfLKVAdGx9NQlhAjhRgAgA VGdQComm/B1GEhykAwUxVvKiCdUCB4EJyFGQ2UAUAFeGQBdT4AECTFEooACgUXJg0bMKoMGB JVb/ckBjBEhRoAXpEUjVHYWZRwVXTUxFCc5KTSLgvA+N4UEalQhLgNQQsZUgQYH051zaDYCh gxJyyKHEG8dBYINvH5cgkCOkA7AUJQoUwMFsbDnwAAMWLhDADCmnKtABj8EXXVUHuBXCJAEs ZR4TTQZwICUAHPj87XcyFIcHCVRhQAyU0FFShQGQ8LlBCKC78ED9NaDcACZAgIUQAtlQQwr4 NWKDDWc4hH0GkKhK6AACHogDAHZHgOygKwR6AMBWzDSQAxygXJurRK8eEII+bIUALQCA5iYU gA9spSUa4MBSIjC5TlHCVPwiygbed5BBQYACKbjAUj5ngHJBhxIB+BJB/zaAroINJEj/mQNw BoCDDsChAWmwQR5eZCkTJMEDwJGBQDqQNh1QT03ZQcRSCHCBNkynEAEARK7sopvbSacLPGDQ UlSoQsJNQABxWYq8YDAJ6WAveUtAQmMi0z2EJAEHCcDBC+yyp0oAZY5C0Y0ALIABovitAmah YSVYQDYKKOcFYnAbFsG2gkqkIAEeMIEJEkmEBlAAAlqsRAduqITr7JBPBSJAAC4wAbwxBQH2 EspbpmKSFiyFQDHYlwII8AEHmMWEIzgACLjCg9u54QCGyJlS1peQUw5gDjq0gE/sUiYQUCgp HwQL+ULgAA5wjgVAMIIRUjAQM1ShA0o4AhBytP/JEkiiCFAIgwtsZIQXCGQRQFjBFQBwpUlY MkpVMYACfGAhDFRlAZQIwQIUowEMJIgsC1jAEk4QpQNgaRIiUEAArKACn6CmAgyVApsqcQIV SEADEnCoQ9CAHBkQhgcLpAQMBKOCZNKKKQJoJF8QQj5KKHWpA5llJGggAPU59SAnyIFSpjMB zkEVSXYrJFRf4Cg+EGAEAECCQg6ggCVMoqVfTUjOxApVKAygBCPgwJziipEocfOrLKDAG5qA Pb4a9iNctAMl1KAgniSkAC3JiSPTQ1d6jciyAkGPVysBWYGcdBII0ORjJ6EAS7KPXqfRCZb+ upAUDOAPE+IIAy7AAGL/EQSmAuGCARaHgAOw4SBoEQiHCjLbBdh2IDMtDQnUJ4I+OSQAVhoB QoZbGg0gQIQAMK1DhLCFI0xASxthAABAoAAEhPS6wjtAcn3AAxL8gLSpWQAIEFAACRQALSoI gPCIO15CAHMBJxqeej93pTcVoAAgEE8ATJKDCxUEujzIgAbFc4IKFQAArSqNeTIsEUY8wQq9 qcgIGCABAxi3AiDYgAI0sFqBFCACDIiKBC4wAokioQJiCcABhiDRGRRkBGSQwAmg6wYJIECl 6CFwVQAg00lcIAAmLgADRJCB9wmPVAXYaDR7sBgMCze4RnxICRJQExFIQAJCpEgAEJABA/wA 4wN2kkAEcpDk2sQABJVgwAR8yycY4DaIQeATePSy5gkYQAN1mgQIIhABLMknsxUoDXpEUxUN FKAFk6ikaQPAoQIogAGTiAIVgiAb6nq5XgZ4UESSQIEjHSCkElhAiB3iY0YX4BGzXdq6kptn LdVBRE1QxBDglB20+IABGeD0nWqdgwKM2NMjGEKdBUKDSIsgyQxF9QLIAB4JC4TTG9CtH1rw gwNkgAFOKI9wzWMFBTA2IizAgXAV0AVQs/aw+IbIGI6HBA2AQALazbfAH2JQF/97swNPuMIX zvCGO/zhEI/4XgICADs= --------------070907090904050501050004 Content-Type: image/gif; name="click" Content-Transfer-Encoding: base64 Content-ID: Content-Disposition: inline; filename="click" R0lGODlhAQABAIAAAAAAAAAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw== --------------070907090904050501050004-- --------------050708080300060409030802--