Adaptec 2940U - AHA Storage Controller Ultra SCSI 20 MBps Información técnica Pagina 109

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 186
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 108
Chapter 4 Securing the Enterprise 95
K
%SystemRoot %\ System32\Winspool.drv
K
%SystemRoot %\ System32\Mpr.dll
Protecting Against Viruses and Trojan Horses
It is extremely important to prevent intentional intrusions into your computer
network that take the form of viruses and Trojan horses. Viruses are programs that
attempt to spread from computer to computer and either cause damage (by erasing
or corrupting data) or annoy users (by printing messages or altering what is
displayed on the screen) on every computer they infect. Trojan horses are
programs that masquerade as other common programs while they attempt to
capture information.
An example of a Trojan horse is a program that masquerades as a system logon
screen in an attempt to capture user names and password information, which the
writers of the Trojan horse can later use to access the system.
How to Prevent Trojan Horse Attacks
Windows 2000 provides an important safeguard against Trojan horse programs.
Before you can log onto a Windows 2000 computer, you must press the secure
attention sequence, CTRL+ALT+DEL. This series of keystrokes always directly
invokes the Windows 2000 operating system logon screen; Trojan horse programs
are never activated this way. Users provide only their username and password to
the operating system itself. To ensure the effectiveness of this procedure, make
sure your users always press CTRL +ALT+DEL or CTRL +F1 in a
MetaFrame
session before logging on at a computer, even if the logon window is already on
the screen.
The secure attention sequence is also required before a user can unlock a locked
workstation or change his or her password.
Another way to guard against Trojan horses is to make your applications Read and
Execute only so that they cannot be replaced with programs that masquerade as
the original program to illegally obtain information.
How to Prevent Virus Outbreaks
Viruses are usually not intentionally introduced to your system. In most cases,
users unknowingly introduce a virus into your network when they obtain what
they believe to be a useful, safe program from another source, such as an online
bulletin board. Many network users are unaware that they can bring viruses into
the network this way. Therefore, one of the best ways to keep your network virus-
free is by educating your users.
Vista de pagina 108
1 2 ... 104 105 106 107 108 109 110 111 112 113 114 ... 185 186

Comentarios a estos manuales

Sin comentarios