1. Trang chủ
  2. » Công Nghệ Thông Tin

The Best Damn Windows Server 2003 Book Period- P103 pot

3 135 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 3
Dung lượng 376,94 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

c o mStealing the Network: How to Own a Continent Ryan Russell, FX, Dan "Effugas" Kaminsky, Joe Grand, Tim Mullen, Jay Beale, Russ Rogers, Ken Pfeil, Paul Craig The first book in the "St

Trang 1

996 Index

W

warnings and log files, 261

WBEM (Web-Based Enterprise

Management), 35 Web, accessing your server over, 33

Web-Based Enterprise Management

(WBEM), 35 Web Distributed Authoring and

Versioning (WebDAV), 3, 78 Web Edition, Windows Server 2003,

12–13 Web servers

configuring, 59–60

securing, 78

and server roles, 58–59

Web Service Extensions, enabling (IIS),

914–915 Web Site Creation Wizard, 907

Web sites

hosting multiple (IIS), 917

restricting access by permission, 909

setting up in IIS Manager, 905–920

TechNet, 106

Windows Update, 71–72

WebDAV (Web Distributed Authoring

and Versioning), 3, 5 whoami tool, 362–363, 404

Windows 2000

DNS and BIND compatibility

comparison (table), 691–692 domain functional levels, 458

domain rename limitations in forest,

486–487 domains, upgrading, 17

forest functional levels, 462–463

and universal groups, 405–406

Windows 2000 Server, minimum system

requirements for (table), 67 Windows 98, software updates for, 103

Windows Backup

described, using, 268–275

and new system state backup method,

472–476 Windows Client Access License (CAL),

14–15 Windows Components Wizard, 61–63,

169, 293 Windows Explorer, encrypted files in, 8

Windows Installer packages

creating, 609–610

described, 602, 606 logging, enabling, 624 Windows Load Balancing Service (WLBS), 225

Windows Management Instrumentation (WMI), 35, 569, 575

Windows NT 4.0 DNS and BIND compatibility comparison (table), 691–692 upgrading to Windows Server 2003, 17

Windows NT directory services (NTDS), 322

Windows NT Server 4, minimum system requirements for (table), 67

Windows operating system, housekeeping tasks, 244 Windows Resource Kit, 32 Windows script, 31 Windows Server 2003

Active Directory See Active Directory

administrative tools, 490 Administrative Tools Pack, 34 Certificate Services overview, 829–830 default protocol, 246

developing test network environment, 21–25

disk management generally, 107–115 DNS and BIND compatibility comparison (table), 691–692 domain and forest functional levels (table), 456–457

editions of, 12–14 Emergency Management Services, 37–38

enhanced clustering technology, 6–7 features overview, 1–12

forest functional levels, 460–462 licensing issues, 14–15

log files, 260–261 logging on with smart cards, 844–845 minimum system requirements for, 66–68

new domainwide features, 454–456 new networking and communication features, 7–8

planning tools, documentation, 17–21 power-saving features, 209

product activation, 15 replication service, 345–347

resources, standard types, 191–192 revised IIS architecture, 6 system state data, 273 using as router, 777–781 WINS improvements, 712 Windows Support Tools Setup Wizard, 428

Windows Terminal Services See

Terminal Services Windows Update, 95 Windows XP printing from, 57 Service Pack 1, 101 and Windows Server 2003, 1–2 WinINSTALL LE 2003, 609 Winlogon service, 812 WINS

clients’ configuration, 724–726 database compaction, 728 interoperability with, 696–699 new to Windows Server 2003, 712 planning for database backup, restoration, 731–732 proxy agent, 725 referral zones, 698 replication, 714 reverse lookup records, 697 WINS servers

backups, 273–274 enabling consistency checking, 729–730

multihomed, 723, 738 performance issues, 726–730 planning deployment of, 713 replication intervals, and performance, 758

replication partnership configuration, 715–719

scavenging records, 727 securing, 77

security issues, 730–731 and server roles, 57–58 split registration prevention, 726 troubleshooting problems, 737 wireless 802.11 standards, 851, 862 wireless remote access, 851 wireless access points (WAPs), 862–864 wireless local area networks WLANs), 9 wireless networking, configuring, 870–872

Trang 2

Index 997

wireless security protocols, configuring, 867–873

wizards activation, 15 Active Directory Installation, 55, 466, 470–471

ASR (Automated System Recovery), 285

Backup or Restore, 275 Certificate Request, 841 Configure Your Server, 53–54, 59 configuring and managing servers with, 50

Delegation of Control, 504 generally, accessing, 31–32 Group Policy, 577

IP Security Policy, 808 New Delegation, 665 New Partition, 121 New RADIUS Client, 871 New Server Cluster, 218 New SMTP Virtual Server, 912–913 New Trust, 486, 496

New Volume, 136–139, 142, 146 Remote Storage Setup, 171 Restore, 473

Resultant Set of Policy, 568 System Compatibility, 16 Virtual Directory Creation, 916 Web Site Creation, 907

Windows Components, 61–63, 169 Windows Support Tools Setup, 428 WLANs and IEEE 802.1X protocols, 9 WMI (Windows Management Instrumentation), 35 WMI Query Language (WQL), 581 Worker Process

configuring identity, 901 Model described, 902–903, 924 Worldwide Microsoft Licensing Web site, 14

WUAU22.msi, 101 WUAU.adm, 102

X

X.500 naming structure, 329–330 X.509 certificate authentication, 368–369

XML metabase (IIS), 905 XML Web Services, 11–12

Z

.zap setup files, publishing applications using, 610–611

zone replication, 678–683 zone transfers

with BIND, 693 troubleshooting DNS, 735–736

Trang 3

s o l u t i o n s @ s y n g r e s s c o m

Stealing the Network: How to Own a Continent

Ryan Russell, FX, Dan "Effugas" Kaminsky, Joe Grand, Tim Mullen, Jay Beale, Russ Rogers, Ken Pfeil, Paul Craig

The first book in the "Stealing the Network" series was called a "blockbuster" by Wired magazine, a

"refreshing change from more traditional computer books" by Slashdot.org, and "an entertaining and informative look at the weapons and tactics employed by those who attack and defend digital systems"

by Amazon.com This follow-on book once again combines a set of fictional stories with real tech-nology to show readers the danger that lurks in the shadows of the information security industry Could hackers take over a continent?

ISBN: 1-931836-05-1 Price: $49.95 US $69.95 CAN

AVAILABLE NOW!

ORDER at

www.syngress.com

Stealing the Network:

How to "Own the Box"

Ryan Russell, FX, Joe Grand, and Ken Pfiel

Stealing the Network: How to Own the Box is NOT intended to be an “install, configure, update,

troubleshoot, and defend book.” It is also NOT another one of the countless Hacker books out

there now by our competition So, what IS it? Stealing the Network: How to Own the Box is an

edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style World-renowned network security personalities present a series of chapters written from the point

of an attacker gaining access to a system This book portrays the street fighting tactics used to attack networks

ISBN: 1-931836-87-6 Price: $49.95 USA $69.95 CAN

Special Ops: Host and Network

Security for Microsoft, UNIX, and Oracle

Erik Pace Birkholz

“Strap on the night vision goggles, apply the camo pain, then lock and load Special Ops is

an adrenaline-pumping tour of the most critical security weaknesses present on most any

corporate network today, with some of the world’s best drill sergeants leading the way.”

—Joel Scambray, Senior Director, Microsoft’s MSN

ISBN: 1-928994-74-1

Price: $69.95 USA $108.95 CAN

AVAILABLE APRIL, 2004

www.syngress.com

Syngress (sin-gres): noun, sing Freedom

from risk or danger; safety See security.

Serious Security Library

AVAILABLE NOW!

ORDER at

www.syngress.com

Ngày đăng: 05/07/2014, 00:20