Ask your problem

I was recently asked how to remove the read-only property from all of the files in a given directory. It seems that this person was copying a large number of text and document files from a CD and all of the resultant files had the "R" property set. Luckily, changing this property for all files is quite easy.

To remove the read-only attributes of all files in a particular directory as well as its subdirectories, the following command can be entered at the DOS prompt or in a batch file:

attrib -r DIRECTORY\*.* /s

Replace DIRECTORY with your desired directory. For example, if you are copying files from a CD to the directory c:\cdfiles, after copying the files, the command to remove the read-only attributes would be:

attrib -r c:\cdfiles\*.* /s

Sharing of files and folders can be managed in two ways. If you chose simplified file sharing, your folders can be shared with everyone on your network or workgroup, or you can make your folders private. (This is how folders are shared in Windows 2000.) However, in Windows XP Professional, you can also set folder permissions for specific users or groups. To do this, you must first change the default setting, which is simple file sharing. To change this setting, follow these steps:
•Open Control Panel, click Tools, and then click Folder Options.
•Click the View tab, and scroll to the bottom of the Advanced Settings list.
•Clear the Use simple file sharing (Recommended) check box.
•To manage folder permissions, browse to the folder in Windows Explorer, right–click the folder, and then click Properties. Click the Security tab, and assign permissions, such as Full Control, Modify, Read, and/or Write, to specific users.

You can set file and folder permissions only on drives formatted to use NTFS, and you must be the owner or have been granted permission to do so by the owner.

Make your Folders Private

•Open My Computer
•Double-click the drive where Windows is installed (usually drive (C:), unless you have more than one drive on your computer).
•If the contents of the drive are hidden, under System Tasks, click Show the contents of this drive.
•Double-click the Documents and Settings folder.
•Double-click your user folder.
•Right-click any folder in your user profile, and then click Properties.
•On the Sharing tab, select the Make this folder private so that only I have access to it check box.


Note

•To open My Computer, click Start, and then click My Computer.
•This option is only available for folders included in your user profile. Folders in your user profile include My Documents and its subfolders, Desktop, Start Menu, Cookies, and Favorites. If you do not make these folders private, they are available to everyone who uses your computer.
•When you make a folder private, all of its subfolders are private as well. For example, when you make My Documents private, you also make My Music and My Pictures private. When you share a folder, you also share all of its subfolders unless you make them private.
•You cannot make your folders private if your drive is not formatted as NTFS For information about converting your drive to NTFS

Restricting Logon Access

If you work in a multiuser computing environment, and you have full (administrator level) access to your computer, you might want to restrict unauthorized access to your "sensitive" files under Windows 95/98.
One way is to disable the Cancel button in the Logon dialog box.
Just run Regedit and go to:

HKEY_LOCAL_MACHINE/Network/Logon

Create the "Logon" subkey if it is not present on your machine: highlight the Network key -> right-click in the left hand Regedit pane -> select New -> Key -> name it "Logon" (no quotes) -> press Enter. Then add/modify a DWORD value and call it "MustBeValidated" (don't type the quotes). Double-click it, check the Decimal box and type 1 for value.
Now click the Start button -> Shut Down (Log off UserName) -> Log on as a different user, and you'll notice that the Logon Cancel button has been disabled.

1. Always protect your Administrator account by creating password, just go to Control Panel > User Accounts, select your account and the click on "create a password for your account".

2. Protect your account by Password protect your screen saver, go to Control Panel > Display, Click on the Screen Saver tab and then check on resume password protect.

3. Setup a BIOS Password to protect your PC Setup application.

4. Always force you windows automatic update on, go to Control Panel > Automatic Updates and then Select the first option to have each update download and install automatically.

5. Install an Internet Security Suite such as "Kaspersky Internet Security", "Norton Internet Security" or "Mcafee Internet Security". And turn on software automatic update.

6. If you don’t have enough budgets to buy an Internet Security Suite, Turn on the Windows Firewall. Go to > Control Panel > Windows Firewall and click on under the General tab. And Install an antivirus program, turn on automatic updates, and set up a regular scanning schedule.
7. Never use same username and/or password for all of your accounts in Internet.

8. Turn off file sharing in Windows Explorer. Open Explorer, click Tools > Folder Options >View. Then Scroll to the bottom, uncheck Use simple file sharing, and click Apply.

9. Increase your Internet Explorer security settings. Click Tools > Internet Options> Privacy and move the slider to High.

10. Turn on your Internet Explorer’s pop-up blocker. Click Tools > Internet Options > Popup Blocker Settings > and then choose default.

Network Access Protection is designed to permit a high degree of control over client computers across a network. A critical feature of Windows Server 2008, NAP is now also supported by Windows Vista
RTM and Service Pack 1 and Windows XP Service Pack 3. But deploying NAP is not exactly an effortless task. However, Microsoft is offering the necessary resources to help network administrators, infrastructure specialists and system architects. An illustrative example of this is the Network Access Protection Design Guide available via TechNet.

“The Network Access Protection Design Guide, authored by our very own technical writer and NAP Forum hero Greg Lindsay, is now live! The NAP Design Guide explains the advantages, disadvantages, requirements, recommendations, and design considerations for deploying NAP for the IPsec, 802.1X, VPN, and DHCP enforcement methods. (…) Huge thanks to Greg for his authoring efforts over the last year and to many NAP product team reviewers for helping to ensure that the content is technically accurate and complete,” revealed Joe Davies, NAP Senior Program Manager.

The documentation covers a variety of aspects, with a strong focus on NAP with IPsec enforcement; NAP with 802.1X enforcement; NAP with VPN enforcement; NAP with DHCP enforcement; and NAP-NAC enforcement. The guide offers the necessary process for data gathering to permit the planning, designing and deployment of NAP.

In the end, the resource will allow for NAP to be tailored to a specific environment. Following deployment, client machines in an IT infrastructure will be able to access the network only in relation to the level in which they align with the overall governance policy. “If a client is not compliant, NAP provides a mechanism for automatically bringing the client into compliance (a process known as remediation) and then dynamically increasing its level of network access,” Lindsay said.

;;