Protect Your Windows Network: From Perimeter to Data

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

labeling

LAN Manager

        authentication 2nd 3rd

        hash value storage 2nd

laptops

        dealing with stolen 2nd 3rd 4th 5th

        passwords

       small businesses

                applying anti-spyware/antivirus software 2nd

                configuring firewalls 2nd

                controlling automatic updating

                protecting 2nd 3rd 4th

                updating software 2nd

laws of security 2nd 3rd 4th 5th 6th 7th 8th

layers

        ACLs (access control lists) 2nd

        protecting 2nd 3rd 4th

least user access (LUA) 2nd

LeBlanc, David

length

        password distribution

limiting

        malicous code (client security tweaks) 2nd

LM hash 2nd 3rd 4th

LM hashes

        disabling 2nd

load balancing

       downtime

                preventing

local groups

Local Security Authority (LSA) Secrets

local security authority (LSA) secrets

LocalService

LocalSystem

locking doors

lockout (accounts)

lockout (acocunt)

        passwords

logic

        of penetration tests

logon

        cached credentials 2nd

        events

        passwords [See also passwords]

long passwords, selection of

lookup requests

        DNS

LSA (Local Security Authority) Secrets

LSA (local security authority) secrets

LSA Secrets

LSALogonUser function

LUA (least user access) 2nd

Категории