This email newsletter comes to you free and is supported by the
following advertisers, which offer products and services in which you
might be interested. Please take a moment to visit these advertisers'
Web sites and show your support for Windows IT Security UPDATE.
St. Bernard Software
What's in the June 2006 Issue of Windows IT Security
- Feature: Reaping the Benefits of WPA and PEAP
- Access Denied
- Toolbox: Nmap 4.0 Does Windows
==== Sponsor: Symantec ===
A multi-tier approach to email security prevents unauthorized access and can
stop spam, viruses, and phishing attacks. Learn to implement one today, and
protect your network security and business systems!
What's in the June 2006 Issue of Windows IT Security
Focus: The Benefits of WPA and PEAP
Learn how to secure your WLAN with WPA and PEAP, how to craft an effective
password policy, how to use free tools to audit your Web applications, how to
use Nmap 4.0 to scan for rogue applications, and more.
The following article is available at no charge to nonsubscribers for a
Reaping the Benefits of WPA and PEAP
Learn about the benefits and configuration steps for securing your
wireless networks by using WPA or WPA2 technology.
Nonsubscribers now have access to the Access Denied and Toolbox columns:
--Randy Franklin Smith
Preventing Users with Administrator Authority from Installing Software
Although no measure is completely effective, here are some methods you can
use to make it harder for users to load unauthorized applications on their
Defending Against Rootkits
Prevention is the best medicine against rootkits, which are deployed the
same way as other malware but are harder to detect once they're on your
Auditing Folder Permission Changes
Here's how to configure Windows to record alterations of folder
permissions in the Security log.
Toolbox: Nmap 4.0 Does Windows
This essential open-source network port scanner can help you quickly
identify applications running on your network and easily test firewalls and
Subscribers have access to the entire contents of the June 2006
issue. For a list of the other articles available in this issue, go to
Windows IT Security is a monthly, paid, print newsletter loaded with
news and tips to help you manage, optimize, and secure your Web-enabled
enterprise. In addition to receiving the monthly print newsletter,
subscribers can access all the newsletter content, including the most recent
issue, at the Windows IT Security Web site.
Subscribe today and access all the issues online!
==== Sponsor: St. Bernard Software ===
Examine the threats of allowing unwanted or offensive content into your network
and learn about the technologies and methodologies to defend against
inappropriate content, spyware, IM, and P2P.
==== Events & Resources === (from Windows IT Pro and its partners)
Use virtual lab automation solutions to address special challenges in pre-
production and staging environments, such as virtual server file library
management, provisioning, configuration, and remote access concerns. Live Event:
Thursday, May 18
Mark Joseph Edwards discusses emerging spyware threats, including rootkits and
keyloggers, and spyware distribution methods. Live Event: Tuesday, May 30
Maximize your VoIP environment by integrating FoIP technology to increase ROI
and streamline processes.
Learn the advantages of running SQL Server 2005 and its BI subsystems on the x64
platform; the performance benefits the x64 architecture provides for Analysis
Services, Integration Services, and Reporting Services; and how to migrate to
the new 64-bit x64 platform.
==== Featured White Paper ===
Determining effective permissions on Windows can be incredibly challenging. In
this must-have white paper, you'll learn why it's essential to determine
effective permissions; how to determine who has access to critical information
in Windows; how to resolve overlapping permissions for network access, shared
hierarchies, and local machine rights; and how entitlement reporting can
overcome the challenges with an automated solution.
==== Hot Release ===
Combat phishing and pharming with complete protection against complex internet
threats by filtering at multiple points on the gateway, network, and endpoints.
==== Announcements ===(brought to you by Windows IT Pro)
Windows IT Pro Master CD--SAVE 50%!
Subscribe today and get portable, high-speed access to the entire Windows
IT Pro article database on CD. This searchable library includes every Windows IT
Pro issue ever published. The newest issue also includes BONUS Windows IT Tips.
Order now and save:
May Exclusive--Get $100 off the Windows IT Security Newsletter
For a limited time, order the Windows IT Security newsletter and SAVE up
to $100! In addition to 12 helpful issues loaded with solutions you won't find
anywhere else, you'll get FREE access to the entire Windows IT Security online
article database. Subscribe now:
==== Contact Us ===
About the newsletter -- firstname.lastname@example.org
About technical questions -- http://list.windowsitpro.com/t?ctl=2B20E:4FB69
About product news -- email@example.com
About your subscription -- firstname.lastname@example.org
About sponsoring UPDATE -- email@example.com
Make sure your copy of Inside Windows IT Security UPDATE doesn't get
mistakenly blocked by antispam software! Be sure to add
Inside_WindowsITSecurity_Update@list.windowsitpro.com to your list of
allowed senders and contacts.
This email newsletter is brought to you by Windows IT Security, the
leading publication for IT professionals securing the Windows enterprise
from external intruders and internal users. Subscribe today!
Windows IT Pro is a division of Penton Media Inc.
221 East 29th Street, Loveland, CO 80538,
Attention: Customer Service Department
Copyright 2006, Penton Media, Inc. All Rights Reserved.
Attend the Black Hat Briefings and
Training, Las Vegas July 29 - August 3
2,500+ international security experts from 40 nations,
10 tracks, no vendor pitches.