This email newsletter comes to you free and is supported by the
following advertisers, which offer products and services in which
you might be interested. Please take a moment to visit these
advertisers' Web sites and show your support for Security UPDATE.
CDW. The Technology You Need When You Need It.
Speed up your systems--try Diskeeper 9 free
1. In Focus: Copying Files Securely Between Systems
2. Security News and Features
- Recent Security Vulnerabilities
- Microsoft Releases 9 Security Bulletins in October
- Microsoft Announces New Products and New Consortium
- Microsoft Brings Antimalware Tech to Corporations
- Symantec to Acquire BindView
- 10 Network Security Assessment Tools You Can't Live Without
3. Security Toolkit
- Security Matters Blog
- Security Forum Featured Thread
4. New and Improved
- Freeze Workstation Configurations
==== Sponsor: CDW ===
CDW. The Technology You Need When You Need It.
It takes a lot to keep up with today's business.
Starting with today's technology.
Our account managers and product specialists can get you quick
answers to any questions you might have.
So visit us online and find out first hand how we make it
happen. Every order, every visit, every time.
No matter what you need in technology, you can count on CDW
for the right technology, right away.
==== 1. In Focus: Copying Files Securely Between Systems
by Mark Joseph Edwards, News Editor, mark at ntsecurity / net
If you need to copy files from one system to another over an
unprotected network, you can do it in a few ways. For example, you can
employ the RRAS component that comes with Windows Server 2003 and
Windows 2000 Server to establish a VPN that uses PPTP; you can use
Microsoft IIS and Secure Sockets Layer (SSL) connections along with a
custom Web interface; or you can use Secure Shell (SSH). There are
other ways to accomplish this task, but these are probably the most
If you're interested in setting up RRAS and PPTP, you can find
instructions in the Microsoft article "Step-by-Step Guide for Setting
Up a PPTP-based Site-to-Site VPN Connection in a Test Lab" (URL below).
This is a good solution, especially if you want to use the VPN for
Using IIS and SSL is simple enough, but it does require you to design a
Web interface that meets your needs. For example, designing for
downloading files is easy enough, but you'll need a script or ActiveX
control for uploading files. This method also requires that you expose
the IIS system to some extent, which you might not want to do.
The third method, using an SSH server, might be a better solution. SSH
servers provide encrypted transports between clients and servers by
using a variety of encryption methods, including Triple DES (3DES),
Blowfish, CAST (named after its developers Carlisle Adams and Stafford
Tavares), Advanced Encryption Standard (AES), and possibly others,
depending on the software you use. Another benefit is that SSH can use
public keys instead of passwords to authenticate a session. Plus, SSH
servers offer cross-platform support--versions are available for just
about every popular OS, including Linux and BSD, as well as Sun
Microsystems and Apple platforms.
By using SSH, you can not only copy files securely, you can also open a
secure Telnet session (using a special shell client) to a remote
server, which might come in handy for remote administration. In
addition, you can tunnel unencrypted services over SSH connections. For
example, by using port forwarding, you can run SQL traffic, POP3
traffic, and many other types of service traffic over SSH connections.
Several commercial and open-source SSH servers are available for
Windows. If you want a robust commercial solution, check out the
products at SSH Communications Security (at the first URL below) or
AttachmateWRQ (at the second URL below). If you want an open-source
solution, consider OpenSSH for Windows (at the third URL below) or
freeSSHd (at the fourth URL below). Both open-source solutions can run
as a system service; freeSSHd offers a simple GUI interface, OpenSSH
If you run Windows 2003, a step-by-step tutorial is available to help
you install OpenSSH for Windows. "Installing OpenSSH for Windows 2003
Server - How to get it working," by Steve Pillinger, senior computer
officer at the School of Computer Science at the University of
Birmingham in England, describes how to set up user accounts, assign
user rights, set file permissions, and configure authentication.
If you run Win2K Server, you can use Beau Monday's step-by-step guide,
"Configuring OpenSSH (Win32) for Public Key Authentication." His guide
is equally detailed and includes information about how to configure
PuTTY, which is an open-source SSH command-line client for Windows
platforms. The PuTTY package also includes a PuTTY Secure Copy (PSCP)
client. If you use Monday's guide, take note that his link to OpenSSH
for Windows is broken. The project has relocated to SourceForge, and
you can find it by using the second URL below.
I've used the PuTTY PSCP client quite a bit, and even though it's a
good tool, I prefer a GUI because it saves me a whole lot of typing.
With a GUI, you can copy files using simple drag-and-drop techniques,
and you can typically navigate directories in a treeview similar to
that of Windows Explorer. As an alternative to PuTTY, you might
consider WinSCP (at the URL below) for file-copying tasks. WinSCP
supports both Secure Copy (SCP) and Secure FTP (SFTP).
==== Sponsor: Diskeeper ===
Speed up your systems--try Diskeeper 9 free
The secret to maximum computer speed is simple: Eliminate disk
fragmentation entirely. Diskeeper 9, the Number One Automatic
Defragmenter, features a high-speed defragmentation engine that runs in
the background. It's so fast and so transparent that you can run it on
active servers and PCs, keeping your systems defragmented while your
users work. All you do is "Set It and Forget It", and fragmentation-
related problems are gone for good. Don't settle for less performance
than your servers and PCs can deliver. See the benefits for yourself--
download your FREE evaluation version of Diskeeper 9 now!
==== 2. Security News and Features ===
Recent Security Vulnerabilities
If you subscribe to this newsletter, you also receive Security
Alerts, which inform you about recently discovered security
vulnerabilities. You can also find information about these
Microsoft Releases 9 Security Bulletins in October
Microsoft released nine security bulletins yesterday. Eight of them
relate to patches for Windows and one relates to a patch for Windows
and Microsoft Exchange Server. Of the nine, Microsoft considers at
least one to be critical.
Microsoft Announces New Products and New Consortium
After acquiring antivirus, antispyware, and antispam solution
makers, Microsoft has finally announced its new antimalware product
plans along with a new security consortium.
Microsoft Brings Antimalware Tech to Corporations
As promised, Microsoft will soon introduce a beta version of its
antispyware and antivirus tools for managed corporate networks, giving
enterprises the tools they need to remove malware on client PCs and
Symantec to Acquire BindView
Further strengthening its position in the security market space,
Symantec announced a deal to acquire BindView. The acquisition, which
is expected to close in first quarter 2006, better positions Symantec
to offer end-to-end security solutions for policy compliance and
10 Network Security Assessment Tools You Can't Live Without
Jerry Cochran describes his favorite penetration-testing tools,
including Nmap and SNMPWalk, and encourages you to use them on your
network--before the hackers do.
After you read this article, tell us your network security
assessment story and win a Windows IT Pro T-shirt. Just click in the
Interact! box on the article Web page.
==== Resources and Events ===
Discover SQL Server 2005 for the Enterprise. Are you prepared?
In this free half-day event, you'll learn how the top new features
of SQL Server 2005 will help you create and manage large-scale,
mission-critical enterprise database applications--making your job
easier. Find out how to leverage SQL Server 2005's new capabilities to
best support your business initiatives. Register today!
Get the Most from Your Infrastructure by Consolidating Servers and
Improved utilization of existing networking resources and server
hardware enable allocation of scarce financial and time resources where
they're needed most. In this free Web seminar, learn to optimize your
existing infrastructure with the addition of server and storage
consolidation software and techniques. You'll get the jumpstart you
need to evaluate the suitability and potential of your computing
environments for the added benefits that consolidation technology can
Deploy VoIP and FoIP Technologies
Voice over Internet Protocol (VoIP) is the future of
telecommunications, and many companies are already enjoying the
benefits of transporting voice over IP networks to significantly reduce
telephone and facsimile costs. Join industry expert David Chernicoff
for this free Web seminar to learn the ins and outs of boardless fax in
IP environments, tips for rolling out fax and integrating fax with
telephony technologies, and more!
Exploit the Opportunities of a Wireless Fleet
With the endless array of mobile and wireless devices and
applications, it's hard to decide what you can do with the devices
beyond providing mobile email access. It's even tougher to know how to
keep it all secure. Join industry guru Randy Franklin Smith in this
free Web seminar and discover what you should do to leverage your
mobile and wireless infrastructure, how to pick devices that are right
for you, and more!
The Conference & Expo on Mobile and Wireless Security
The must-attend event for securing your wireless applications and
networks, the Conference & Expo on Mobile and Wireless Security is
designed to navigate you through today's high-threat landscape.
Discover real-world security solutions from practitioners winning the
battle against hackers, undisciplined users, and the occasional
Click here for details: http://list.windowsitpro.com/t?ctl=16194:4FB69
Cut Your Windows XP Migration Time by 60% or More!
If your organization is considering--or has already begun migrating
your operating system to Windows XP, then this Web seminar is for you.
Sign up for this free event, and you'll learn how to efficiently
migrate your applications into the Windows Installer (MSI) format, how
to prepare them for error-free deployment, what steps you need to
follow to package your applications quickly and correctly, and more!
==== Featured White Paper ===
Stopping Crimeware and Malware: How to Close the Vulnerability Window
Computer users can no longer wait for a new vaccine every time a new
security threat appears. How do you defend your network in a world of
smarter, faster, Internet-borne zero-day attacks? Find out about
Intrusion Prevention that can detect and destroy unknown malware with
virtually zero false positives.
==== Hot Release ===
Meeting Enterprise Management Needs: The Integration of Microsoft SMS
2003 and Afaria
Learn about the capabilities offered by the integration of Microsoft
SMS 2003 and Afaria. In this free white paper you'll learn about new
functionality and benefits of Microsoft SMS specifically targeted to
improving management of remote and mobile devices, challenges of
managing frontline systems, how the combined solution creates value
around the successful use of technology at the front lines of business
==== 3. Security Toolkit ====
Security Matters Blog: Nematodes: Worms That Help Your Networks
by Mark Joseph Edwards, http://list.windowsitpro.com/t?ctl=16192:4FB69
Would you unleash a worm on your networks if that worm was designed to
protect the networks instead of infiltrate them? Dave Aitel thinks you
would, and that was the subject of his presentation at the latest Hack
in the Box conference in Malaysia. Read more about it in this blog
by John Savill, http://list.windowsitpro.com/t?ctl=16191:4FB69
Q: Can I change the type of logging that Active Directory (AD) uses?
Find the answer at
Security Forum Featured Thread: How to Automate Setting ACLs on Folders
Drew is trying to verify folder security on his file servers. He's
running into many inconsistencies with folder permissions and wants to
know if there's a script he can run to adjust the permissions. For
example, all his users have a home directory on one of his file
servers. He wants to set the ACL on each home directory folder to allow
the user, administrators, and System account to have full control. Join
the discussion at:
==== Announcements === (from Windows IT Pro and its partners)
Become a VIP Subscriber!
Get inside access to ALL the articles, tools, and helpful resources
published in Windows IT Pro, SQL Server Magazine, Exchange and Outlook
Administrator, Windows Scripting Solutions, and Windows IT Security--
that's more than 26,000 articles at your fingertips. Your VIP
subscription also includes a valuable 1-year print subscription to
Windows IT Pro and two VIP CDs (that contain the entire article
database). Sign up now:
SQL Server Magazine Has Answers
You won't want to miss any of the fall issues! Subscribe now and
discover the best tools to keep SQL Server tuned, the ins and outs of
SQL Server 2005, ways ADO.NET 2.0 solves your problems, and much more.
You'll also gain exclusive access to the entire SQL Server Magazine
online article database (more than 2300 articles) and you'll SAVE 44%
off the cover price. Click here:
==== 4. New and Improved === by Renee Munshi, firstname.lastname@example.org
Freeze Workstation Configurations
Faronics Technologies announces the official release of Deep Freeze
5.5 Standard, Professional, and Enterprise editions. Deep Freeze
protects original computer configurations. No matter what changes a
user makes to a workstation, when he or she restarts the system, Deep
Freeze eradicates all the changes and resets the computer to its
original state. Deep Freeze 5.5's new features include enhanced
compatibility when deployed as part of a master image, the ability to
specify login information for executing custom scripts during scheduled
maintenance periods, and enhanced password security. For more
information, go to
Tell Us About a Hot Product and Get a T-Shirt!
Have you used a product that changed your IT experience by saving
you time or easing your daily burden? Tell us about the product, and
we'll send you a T-shirt if we write about the product in a future
Windows IT Pro What's Hot column. Send your product suggestions with
information about how the product has helped you to
Editor's note: Share Your Security Discoveries and Get $100
Share your security-related discoveries, comments, or problems and
solutions in the Windows IT Security print newsletter's Reader to
Reader column. Email your contributions (500 words or less) to
email@example.com. If we print your submission, you'll
get $100. We edit submissions for style, grammar, and length.
==== Sponsored Links ===
Admins rush to install BLOG servers
How to run your own blog server. Free 5-user license.
==== Contact Us ====
About the newsletter -- firstname.lastname@example.org
About technical questions -- http://list.windowsitpro.com/t?ctl=16196:4FB69
About product news -- email@example.com
About your subscription -- firstname.lastname@example.org
About sponsoring Security UPDATE -- email@example.com
This email newsletter is brought to you by Windows IT Security,
the leading publication for IT professionals securing the Windows
enterprise from external intruders and controlling access for
internal users. Subscribe today.
Windows IT Pro, a division of Penton Media, Inc.
221 East 29th Street, Loveland, CO 80538
Attention: Customer Service Department
Copyright 2005, Penton Media, Inc. All rights reserved.
InfoSec News v2.0 - Coming Soon!