Dig into Windows XP—and discover how you can really put its networking and security features to work! Also covering Windows 2000, this supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and handy workarounds in concise, fast-answer format. It’s all muscle and no fluff. Find the best and fastest ways to perform everyday networking tasks, and challenge yourself to new levels of mastery!
From Ethernet to WiFi, build a fast, reliable, security-enhanced network
Keep your system current with Windows Update
Design and troubleshoot a comprehensive data backup and recovery solution
Help prevent network invasions with firewall solutions, encryption systems, Windows AntiSpyware, and other defenses
Use logon, authentication, and Group Policy to help control access to shared resources
Take ultimate control by blocking ports, encrypting files, and installing digital certificates
Monitor security events by configuring auditing policies and security templates
Insider Extras—including sample batch and script files plus security templates
Microsoft Encyclopedia of Networking, Second Edition, eBook
Microsoft Encyclopedia of Security eBook
Microsoft Computer Dictionary, Fifth Edition eBook
Microsoft resources—including Windows XP Expert Zone articles and downloadable security resources
Links to Web sites of Microsoft Most Valuable Professionals (MVPs)
A Note Regarding the CD or DVD
The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to email@example.com.
Windows Networking and Security Essentials
Chapter 1 Windows Networking and Security 101
Building a Network with Security in Mind
Blocking Attacks by Using a Firewall
Restricting Network Access to Files and Folders
Workgroups vs. Domains
Chapter 2 Computer Security: Are You at Risk?
Balancing Safety and Convenience
Know Your Enemy: Seven Threats to Your Computer's Security
How Can You Protect Yourself?
Chapter 3 Windows Security Tools and Techniques
What Are User Accounts?
Controlling the Logon and Authentication Process
Ensuring the Security of Files
Securing Your Computer: A Checklist
Advanced Security Options
Chapter 4 Managing User Accounts and Passwords
Managing User Accounts for Security
Following Best Practices for Your Everyday Account
Using Passwords Effectively
Configuring the Logon Process for Security
Chapter 5 Securing a Shared Computer
Using NTFS Permissions for Access Control
Locking Up Personal Documents
Sharing Documents Securely on a Multiuser Computer
Restricting Access to Programs
Restricting Access to the Registry
Managing Removable Storage Devices and Printers
Chapter 6 Preventing Data Loss
Determining Your Backup Needs
Organizing Your Data
Designing a Backup Solution
Using the Windows Backup Program
Using Other Data Loss Prevention Tools Included with Windows
Chapter 7 Keeping Your System Secure
Monitoring Security in Windows XP
Keeping Current with Windows Update
Security Alert Services
Testing and Verifying Your Secure Status
Smart, Secure Networking
Chapter 8 Setting Up a Secure Home or Small Business Network
Choosing a Network Type
Setting Up Your Network Hardware
Configuring Your Network
Managing Network Connections
Securing Network Connections
Sharing Information Across Your Network
Chapter 9 Sharing an Internet Connection
Connecting Your Network to the Internet
Using Direct Internet Connections on a LAN
Sharing an Internet Connection Through Hardware
Sharing an Internet Connection Through Software
Controlling Inbound Access to Your LAN
Chapter 10 Wireless Networking
The Risks and Rewards of Wireless Networking
Controlling Connections to a Wireless Access Point
Encrypting Wireless Transmissions
Configuring a Windows Computer for Wireless Networking
Extra Security for Wireless Networks
Chapter 11 Working with a Corporate Network
Introducing Windows-Based Domains
Joining a Domain
Working on a Domain-Based Computer
Connecting Remotely to a Corporate Network
Protecting Your Personal Computer
Chapter 12 Making Internet Explorer More Secure
When Web Pages Go Bad
Following Safe Browsing Practices
Using Security Zones
Managing Browser Add-Ons
Managing ActiveX Controls
Managing Java Applets
Chapter 13 Blocking Spyware, Adware, and Other Unwanted Software
What Is Spyware?
Blocking Unwanted Software
Choosing and Using Anti-Spyware Tools
Rooting Out Spyware
Chapter 14 Stopping Viruses, Worms, and Trojan Horses
How Malicious Software Attacks Your Computer
Identifying Malicious Software
Choosing an Antivirus Program
Protecting Your Computer from Hostile Software
Repairing an Infected System
Chapter 15 Securing E-Mail and Instant Messages
Protecting Yourself from Hazardous Attachments
Protecting Yourself from Rogue HTML
Using Web-Based E-Mail Securely
Protecting E-Mail from Prying Eyes
Using Instant Messaging Safely
Chapter 16 Blocking Spam
What Is Spam?
Basic Spam-Blocking Techniques
Third-Party Spam-Busting Solutions
Fighting Back Against Spam
Chapter 17 Securing Your Computer by Using a Firewall
How Hack Attacks Work
Configuring a Host Firewall
Chapter 18 Protecting Your Privacy
Protecting Your Identity
Avoiding Losses from "Phishing" Attacks
Ensuring Your Children's Safety and Privacy
Watching for Web Bugs
Covering Your Tracks
Chapter 19 Securing Ports and Protocols
How Ports and Protocols Allow Access to Your Computer
Determining Which Ports Are Active
Restricting Access to Ports
Why Blocking Ports Isn't Enough
Shutting Down Unneeded Services
Tightening Security on Internet Information Services
Chapter 20 Installing and Using Digital Certificates
What Are Digital Certificates?
Obtaining a Personal Certificate
Managing Your Certificates
Chapter 21 Encrypting Files and Folders
Using the Encrypting File System
Creating a Data Recovery Agent
Backing Up Your Certificates
Chapter 22 Managing Security Through Group Policy and Security Templates
Exploring Security-Related Policies
Using the Group Policy Snap-In
Using Security Templates
Analyzing System Security
Chapter 23 Monitoring Security Events
Auditing Security Events
Viewing the Log of Security Events
Viewing Other Security-Related Logs
Appendix A The Ten Immutable Laws of Security
Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore.
Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore.
Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.
Law #4: If you allow a bad guy to upload programs to your Web site, it's not your Web site anymore.
Law #5: Weak passwords trump strong security.
Law #6: A computer is only as secure as the administrator is trustworthy.
Law #7: Encrypted data is only as secure as the decryption key.
Law #8: An out-of-date virus scanner is only marginally better than no virus scanner at all.
Law #9: Absolute anonymity isn't practical, in real life or on the Web.
Law #10: Technology is not a panacea.
Microsoft® Windows® XP Networking and Security Inside Out: Also Covers Windows 2000
Ed Bott is an award-winning journalist and one of the most recognized voices in the computing world. He's been writing about Microsoft® Windows® and Office for two decades and is the author of more than two dozen books.
Carl Siechert specializes in implementing and documenting operating system technologies. He has coauthored several Windows®-related books, including the popular Windows Vista® Inside Out, Deluxe Edition, with Ed Bott and Craig Stinson.