| [Fwd: [Downloads] Security policy checklist] | |
| From: | Joe Klemmer |
| Date: | Mon, 09 May 2005 21:36:39 -0400 |
This is a multi-part message in MIME format.
--------------050708080300060409030802
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Some good info here. You need to be a member of TechRepublic, though.
-------- Original Message --------
Subject: [Downloads] Security policy checklist
Date: Thu, 5 May 2005 14:33:49 -0700 (PDT)
From: TechRepublic
Reply-To: TechRepublic
To: joe@webtrek.com
*Security Policy Checklist:
Make Sure You Hit All of the Issues*
*Check out these NEW, FREE downloads, exclusively for TechRepublic
members:*
*IT Security Policy Checklist
*
An IT Security Policy should be a place to standardize and document
company-wide security practices. This checklist provides a
comprehensive list of issues that should be covered and recommends a
variety of security policy best practices. Join the discussion for
this download to add your recommendations for a security policy.
*Small Business Storage: Backup Technology Comparison Chart
*
Unfortunately, many small businesses fail to adequately protect
their critical data, or they have aging storage devices that should
be replaced with newer, more efficient technology. This chart
compares common devices within three backup technology categories:
optical, hard drive, and tape. The chart outlines each product's
important specification, advantages, disadvantages, and primary usage.
*Windows Server 2003: Lock It Down in 10 Steps
*
The default installation of Windows Server 2003 is more secure than
previous versions of Windows server, but that doesn't mean that your
work is done. Here is a list of 10 best practices that can help you
implement top-level security for a Windows Server 2003 system.
*Hacking Windows-Specific Services on Windows Server 2003
*
This sample chapter, taken from McGraw-Hill's *Hacking Exposed
Windows Server 2003*, provides detailed insight on how to fight
common hacking methods such as password guessing, eavesdropping on
authentication, subverting authentication via rogue server or
man-in-the-middle (MITM) attacks, and attacking vulnerabilities in
Windows-specific services.
*Administrator's Guide to Security in Windows Server 2003
*
Download the entire Security chapter from TechRepublic's
*Administrator's Guide to Windows Server 2003* and gain valuable
insights on best practices for securing Windows Server 2003. The
chapter provides proven tips for securing Active Directory,
leveraging Windows Rights Management Services, maximizing group
policy controls and more.
*15 Extensions Your PHP Build Must Support
*
PHP has always supported a wide variety of extensions, which allows
it extend with new technologies. Developers take advantage of this
flexibility to create useful add-ons to the language. This download
lists some of the most useful PHP extension modules, discussing how
they may be used and the configure-time arguments needed to activate
them in the UNIX version of PHP.
*Remove Internet Explorer Content Advisor Password
*
When users forget their Internet Explorer Content Advisor passwords,
you can't reset the password without knowing the original password,
and reinstalling IE won't solve the problem, because the password
settings are stored in the Windows registry. This one-page task
sheet shows you how to quickly remove the IE Content Advisor
password with a simple Windows registry hack.
*Get the Most Out of Your IT Budget by Using Portfolio Management
*
Here is a comprehensive document from project management guru Tom
Mochal that shows how the principles of portfolio management can be
applied to businesses in general, and even to business units such as
IT. This can help you decide how to put your money in the places
where it can make the most impact on your business.
*Webcast: The Business Case for VoIP Collaboration
*
Learn about the benefits derived from good VoIP collaboration tools
and how they impact the bottom line, as well as one company's use of
collaboration to improve customer service and employee productivity
in this Webcast from Shoretel.
*Follow the Rules to More Effective C# Programming
*
For C# programmers, no single function generates more discussion and
more confusion than GetHashCode(). Hash-based containers use hash
codes to optimize searches. In .NET, every object has a hash code
that is established based on three specific rules. This chapter from
Bill Wagner's *Effective C#: 50 Specific Ways to Improve Your C#*,
explains how those three rules are applied and how their proper
application is essential to effective C# programming.
*Exchange Server: Lock It Down in 10 Steps
*
E-mail is one of the most pervasive business applications in the
world, which makes e-mail servers a major target for hackers. Use
this list of 10 best practices to help get your Microsoft Exchange
servers locked down. Provide your own Exchange security tips in the
discussion of this download.
*White Paper: Business Strategies for Accelerating Growth: The Value
of Making Better Decisions Through CRM
*
Download this Siebel Systems white paper and learn the five key
components of a successful customer relationship management (CRM)
initiative and how they can improve your organization's
decision-making ability.
*Visit our Downloads Center*
for more!
------------------------------------------------------------------------
*Happy Birthday TechRepublic:* We're giving away 6 iPod Minis!
To celebrate our birthday, we're giving away lots of great prizes
including 6 iPod Minis and tons of TechRepublic merchandise. Find
out how you can enter to win!
Copyright © 2005 CNET Networks, Inc. All rights reserved.
------------------------------------------------------------------------
You expressed interest in receiving periodic updates and information
from TechRepublic when you became a TechRepublic member. If you no
longer wish to receive these updates, please go here
, or
to review your other TechRepublic e-mail settings or unsubscribe from
all TechRepublic e-mail lists, go here
. You are currently
on our mailing list as [joe@webtrek.com].
Member Preferences, TechRepublic, 1630 Lyndon Farm Court, Louisville, KY
40223, USA
--
Joe Klemmer
Linux/UNIX System Administrator | Resident Hacker | Linux Instructor
--------------050708080300060409030802
Content-Type: multipart/related;
boundary="------------070907090904050501050004"
--------------070907090904050501050004
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Security Policy Checklist: Make Sure You Hit All of the Issues
Some good
info here. You need to be a member of TechRepublic, though.
--------
Original Message --------
Subject:
[Downloads] Security policy checklist
Date:
Thu, 5 May 2005 14:33:49 -0700 (PDT)
From:
TechRepublic
<CNET_Networks_Member_Services@newsletter.online.com>
Reply-To:
TechRepublic
<CNET_Networks_#3.147236.3330393831333937@newsletters.online.com>
To:
joe@webtrek.com
Security Policy Checklist: Make Sure You Hit All of the Issues

Security
Policy Checklist:
Make Sure You Hit All of the Issues
Check out these NEW, FREE downloads,
exclusively for TechRepublic members:
IT
Security Policy Checklist
An IT Security Policy should be a place to standardize and document
company-wide security practices. This checklist provides a
comprehensive list of issues that should be covered and recommends a
variety of security policy best practices. Join the discussion for this
download to add your recommendations for a security policy.
Small
Business Storage: Backup Technology Comparison Chart
Unfortunately, many small businesses fail to adequately protect their
critical data, or they have aging storage devices that should be
replaced with newer, more efficient technology. This chart compares
common devices within three backup technology categories: optical, hard
drive, and tape. The chart outlines each product's important
specification, advantages, disadvantages, and primary usage.
Windows
Server 2003: Lock It Down in 10 Steps
The default installation of Windows Server 2003 is more secure than
previous versions of Windows server, but that doesn't mean that your
work is done. Here is a list of 10 best practices that can help you
implement top-level security for a Windows Server 2003 system.
Hacking
Windows-Specific Services on Windows Server 2003
This sample chapter, taken from McGraw-Hill's Hacking Exposed
Windows Server 2003, provides detailed insight on how to fight
common hacking methods such as password guessing, eavesdropping on
authentication, subverting authentication via rogue server or
man-in-the-middle (MITM) attacks, and attacking vulnerabilities in
Windows-specific services.
Administrator's
Guide to Security in Windows Server 2003
Download the entire Security chapter from TechRepublic's Administrator's
Guide to Windows Server 2003 and gain valuable insights on best
practices for securing Windows Server 2003. The chapter provides proven
tips for securing Active Directory, leveraging Windows Rights
Management Services, maximizing group policy controls and more.
15
Extensions Your PHP Build Must Support
PHP has always supported a wide variety of extensions, which allows it
extend with new technologies. Developers take advantage of this
flexibility to create useful add-ons to the language. This download
lists some of the most useful PHP extension modules, discussing how
they may be used and the configure-time arguments needed to activate
them in the UNIX version of PHP.
Remove
Internet Explorer Content Advisor Password
When users forget their Internet Explorer Content Advisor passwords,
you can't reset the password without knowing the original password, and
reinstalling IE won't solve the problem, because the password settings
are stored in the Windows registry. This one-page task sheet shows you
how to quickly remove the IE Content Advisor password with a simple
Windows registry hack.
Get
the Most Out of Your IT Budget by Using Portfolio Management
Here is a comprehensive document from project management guru Tom
Mochal that shows how the principles of portfolio management can be
applied to businesses in general, and even to business units such as
IT. This can help you decide how to put your money in the places where
it can make the most impact on your business.
Webcast:
The Business Case for VoIP Collaboration
Learn about the benefits derived from good VoIP collaboration tools and
how they impact the bottom line, as well as one company's use of
collaboration to improve customer service and employee productivity in
this Webcast from Shoretel.
Follow
the Rules to More Effective C# Programming
For C# programmers, no single function generates more discussion and
more confusion than GetHashCode(). Hash-based containers use hash codes
to optimize searches. In .NET, every object has a hash code that is
established based on three specific rules. This chapter from Bill
Wagner's Effective C#: 50 Specific Ways to Improve Your C#,
explains how those three rules are applied and how their proper
application is essential to effective C# programming.
Exchange
Server: Lock It Down in 10 Steps
E-mail is one of the most pervasive business applications in the world,
which makes e-mail servers a major target for hackers. Use this list of
10 best practices to help get your Microsoft Exchange servers locked
down. Provide your own Exchange security tips in the discussion of this
download.
White
Paper: Business Strategies for Accelerating Growth: The Value of Making
Better Decisions Through CRM
Download this Siebel Systems white paper and learn the five key
components of a successful customer relationship management (CRM)
initiative and how they can improve your organization's decision-making
ability.
Visit
our Downloads Center for more!
Happy Birthday TechRepublic: We're
giving away 6 iPod Minis!
To celebrate our birthday, we're giving away lots of great
prizes including 6 iPod Minis and tons of TechRepublic merchandise.
Find out how
you can enter to win!
Copyright © 2005 CNET Networks, Inc.
All rights reserved.
You expressed interest in receiving
periodic updates and information from TechRepublic when you became a
TechRepublic member. If you no longer wish to receive these updates,
please go here, or to review your other TechRepublic
e-mail settings or unsubscribe from all TechRepublic e-mail lists, go here. You are currently on our mailing list
as [joe@webtrek.com].
Member Preferences, TechRepublic, 1630 Lyndon Farm Court, Louisville,
KY 40223, USA

--
Joe Klemmer <joe@webtrek.com>
Linux/UNIX System Administrator | Resident Hacker | Linux Instructor
--------------070907090904050501050004
Content-Type: image/gif;
name="trlogo_white151x42.gif"
Content-Transfer-Encoding: base64
Content-ID:
Content-Disposition: inline;
filename="trlogo_white151x42.gif"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--------------070907090904050501050004
Content-Type: image/gif;
name="click"
Content-Transfer-Encoding: base64
Content-ID:
Content-Disposition: inline;
filename="click"
R0lGODlhAQABAIAAAAAAAAAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw==
--------------070907090904050501050004--
--------------050708080300060409030802--