Ask your problem
To remove the read-only attributes of all files in a particular directory as well as its subdirectories, the following command can be entered at the DOS prompt or in a batch file:
attrib -r DIRECTORY\*.* /s
Replace DIRECTORY with your desired directory. For example, if you are copying files from a CD to the directory c:\cdfiles, after copying the files, the command to remove the read-only attributes would be:
attrib -r c:\cdfiles\*.* /s
Labels: Security
Sharing of files and folders can be managed in two ways. If you chose simplified file sharing, your folders can be shared with everyone on your network or workgroup, or you can make your folders private. (This is how folders are shared in Windows 2000.) However, in Windows XP Professional, you can also set folder permissions for specific users or groups. To do this, you must first change the default setting, which is simple file sharing. To change this setting, follow these steps:
•Open Control Panel, click Tools, and then click Folder Options.
•Click the View tab, and scroll to the bottom of the Advanced Settings list.
•Clear the Use simple file sharing (Recommended) check box.
•To manage folder permissions, browse to the folder in Windows Explorer, right–click the folder, and then click Properties. Click the Security tab, and assign permissions, such as Full Control, Modify, Read, and/or Write, to specific users.
Labels: Security
•Open My Computer
•Double-click the drive where Windows is installed (usually drive (C:), unless you have more than one drive on your computer).
•If the contents of the drive are hidden, under System Tasks, click Show the contents of this drive.
•Double-click the Documents and Settings folder.
•Double-click your user folder.
•Right-click any folder in your user profile, and then click Properties.
•On the Sharing tab, select the Make this folder private so that only I have access to it check box.
Note
•This option is only available for folders included in your user profile. Folders in your user profile include My Documents and its subfolders, Desktop, Start Menu, Cookies, and Favorites. If you do not make these folders private, they are available to everyone who uses your computer.
•When you make a folder private, all of its subfolders are private as well. For example, when you make My Documents private, you also make My Music and My Pictures private. When you share a folder, you also share all of its subfolders unless you make them private.
•You cannot make your folders private if your drive is not formatted as NTFS For information about converting your drive to NTFS
Labels: Security
One way is to disable the Cancel button in the Logon dialog box.
Just run Regedit and go to:
HKEY_LOCAL_MACHINE/Network/Logon
Create the "Logon" subkey if it is not present on your machine: highlight the Network key -> right-click in the left hand Regedit pane -> select New -> Key -> name it "Logon" (no quotes) -> press Enter. Then add/modify a DWORD value and call it "MustBeValidated" (don't type the quotes). Double-click it, check the Decimal box and type 1 for value.
Now click the Start button -> Shut Down (Log off UserName) -> Log on as a different user, and you'll notice that the Logon Cancel button has been disabled.
Labels: Security
2. Protect your account by Password protect your screen saver, go to Control Panel > Display, Click on the Screen Saver tab and then check on resume password protect.
3. Setup a BIOS Password to protect your PC Setup application.
4. Always force you windows automatic update on, go to Control Panel > Automatic Updates and then Select the first option to have each update download and install automatically.
5. Install an Internet Security Suite such as "Kaspersky Internet Security", "Norton Internet Security" or "Mcafee Internet Security". And turn on software automatic update.
6. If you don’t have enough budgets to buy an Internet Security Suite, Turn on the Windows Firewall. Go to > Control Panel > Windows Firewall and click on under the General tab. And Install an antivirus program, turn on automatic updates, and set up a regular scanning schedule.
7. Never use same username and/or password for all of your accounts in Internet.
8. Turn off file sharing in Windows Explorer. Open Explorer, click Tools > Folder Options >View. Then Scroll to the bottom, uncheck Use simple file sharing, and click Apply.
9. Increase your Internet Explorer security settings. Click Tools > Internet Options> Privacy and move the slider to High.
10. Turn on your Internet Explorer’s pop-up blocker. Click Tools > Internet Options > Popup Blocker Settings > and then choose default.
Labels: Security
RTM and Service Pack 1 and Windows XP Service Pack 3. But deploying NAP is not exactly an effortless task. However, Microsoft is offering the necessary resources to help network administrators, infrastructure specialists and system architects. An illustrative example of this is the Network Access Protection Design Guide available via TechNet.
“The Network Access Protection Design Guide, authored by our very own technical writer and NAP Forum hero Greg Lindsay, is now live! The NAP Design Guide explains the advantages, disadvantages, requirements, recommendations, and design considerations for deploying NAP for the IPsec, 802.1X, VPN, and DHCP enforcement methods. (…) Huge thanks to Greg for his authoring efforts over the last year and to many NAP product team reviewers for helping to ensure that the content is technically accurate and complete,” revealed Joe Davies, NAP Senior Program Manager.
The documentation covers a variety of aspects, with a strong focus on NAP with IPsec enforcement; NAP with 802.1X enforcement; NAP with VPN enforcement; NAP with DHCP enforcement; and NAP-NAC enforcement. The guide offers the necessary process for data gathering to permit the planning, designing and deployment of NAP.
In the end, the resource will allow for NAP to be tailored to a specific environment. Following deployment, client machines in an IT infrastructure will be able to access the network only in relation to the level in which they align with the overall governance policy. “If a client is not compliant, NAP provides a mechanism for automatically bringing the client into compliance (a process known as remediation) and then dynamically increasing its level of network access,” Lindsay said.
Labels: Security