Geometry.Net - the online learning center
Home  - Computer - Nt

e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 190    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

         Nt:     more books (100)
  1. NT Network Plumbing by Tony Northrup, 1998-07
  2. The Bible on Compact Disc NT NLT
  3. Schematic Capture Using MicroSim PSpice for Windows 95/98/NT by Marc E. Herniter, 1999-06-11
  4. Windows NT Networking for Dummies by Ed Tittel, Mary Madden, et all 1996-08-29
  5. Running Microsoft Windows NT Server 4.0 by Charlie Russel, 1996-01-01
  6. Windows NT 4 for Dummies Quick Reference by Valda Hilley, 1996-12-12
  7. Windows Nt 4 Advanced Programming (Windows Nt Professional Library) by Raj Rajagopal, Subodh P. Monica, 1997-10
  8. Windows NT for Open VMS Professionals by David Solomon, Debra Wasserman, 1996-06-18
  9. Honda NTV600 Revere, NTV650 and NT650 Deauville Service and Repair Manual (Haynes Service and Repair Manuals) by Matthew Coombs, Barry Maunders, 2001-11-26
  10. The Hungry Planet Bible Project NT NLT (Hungry Planet Bible Project: the Nl Tse)
  11. Windows NT/2000 ADSI Scripting for System Administration by Thomas Eck, 2000-03-16
  12. Teach Yourself Windows NT 4 VISUALLY by Ruth Maran, 1998-10
  13. Microsoft Windows NT Workstation 4.0 Resource Kit (Microsoft Professional Editions) by Microsoft Corporation, 1996-10-09
  14. Windows Nt Backup & Recovery (Windows Nt Professional Library) by John R. McMains, Bob Chronister, 1998-03

81. Known NT Exploits
Community Connection, the maker of a 128bit encrypted version of the Apache webservercalled Stronghold, has a nt Hack site at http//www.c2.net/hackmsoft/.
http://www.emf.net/~ddonahue/NThacks/ntexploits.htm
Good guys annouce security weaknesses, the bad guys keep them to themselves... This page will attempt to list all known NT Exploits used in hacking NT security, and application security related to an NT system. If you know of hacks, security bugs, patches, workarounds, or additional information which may be relevant to this list, please e-mail us nthacks@hidata.com . Non-hyperlinked attacks below exist but I haven't gotten around to writing a page on it. Thanks to the NT security mailing list at ntsecurity@iss.net , sister (or copycat) sites such as http://www.ntshop.net/security/exploits.htm , and contributors to this list. If you wish to subscribe to the NT security mailing list, send mail to request-ntsecurity@iss.net and, in the text of your message (not the subject line), write: subscribe ntsecurity. Bill Stout
Trojans
Dll
s
Password Syncronizing DLL abuse

Rollback.exe
...
Renamed Executables
Application Attacks
MS Office 7.0 FileManager hole
MS Access 1.0/2.0 SIDs
MS Word/Excel Macro virus Passwords
Guessing/Brute force

Snooping

Cracking (decrypting) Password caching Direct access Ntfsdos.exe

82. DeviceLock For Windows XP, Windows 2000 And Windows NT, The Floppy Lock Software
Gives network administrators control over which users can access what devices ports, floppies, MagnetoOptical disks, on a local computer. Program can be used to flush a storage device's buffers and to get extended information about devices and ntFS partitions. For Windows 2000/nt.
http://www.ntutility.com/dl/
Proactive Information Security Software for Windows NT/2000/XP
Choose a product Active Network Monitor Active Registry Monitor DeviceLock PortsLock Remote Task Manager Freeware DeviceLock
Download

Purchase

Press Kit

FAQ
...
DeviceLock for 9x/Me

Information
Discounts!

Your opinion

Recommend Us
Link To Us ... Links Newsletter subscription
If you would like to receive news about SmartLine's software, join our mailing list by entering your e-mail address below, then click the Join! button: DeviceLock "Secure your Windows NT/2000/XP system by locking access to removable devices." About DeviceLock DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs or any other device, depending on the time of day and day of the week. DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside.

83. ZDNet: Product Guides : Windows NT
IT Resources and Tools • Special Reports • PDA Price Drops. ZDNet Reviews Windows Windows nt. Click Here. Downloads. •, Win nt 4.0 Service Pack 5.
http://www.zdnet.com/windows/filters/guide/0,7637,2151384,00.html
Cameras Reviews Prices Tech Update ... Windows Windows NT
Search For: All ZDNet The Web Search Tips Power Search
Downloads Win NT 4.0 Service Pack 5 Internet Explorer 5 Fastlane's Windows NT WormKiller Diskeeper Lite
Companion Guides Networking Operating Systems Utilities
Resources Windows News NT Workstation Help NT Server Help NT Tips ... Windows NT Forum
Comments?
Contact us

NOS crossroads

We examine the strengths and weaknesses of four OSs to help you pick the right solution for your network.
Windows Guide Main Windows Page Windows 98 Windows NT Windows 95 ... Windows Downloads Server
NT versus Linux
So which runs faster? According to Microsoft-sponsored tests, NT is the winner. But is it really as clear as all that? NOSadmin for Windows NT Version 6.1 The latest version of NOSadmin for Windows NT finds security flaws and helps you take action. Microsoft Exchange Server An excellent IMAP server that combines function with a complete set of management tools. Workstation The Desktop Dilemma Choosing the right OS isn't easy. Should you stick with what you've got, upgrade to NT 4, or wait for Windows 2000? We can help you decide. Wintel Cranks up Workstations Microsoft and Intel collaborate to beef up performance and volume.

84. NetIQ Corporation - End-to-End Solutions For Managing E-Business Infrastructures
NetIQ offers the NetIQ AppManager Suite, the industry's most comprehensive solution for centrally monitoring the performance and availability of Windows nt systems and server applications such as Microsoft BackOffice (Exchange, SQL Server, IIS, etc.), Lotus Domino, Citrix WinFrame/MetaFrame and Oracle. Provides service level agreement reporting. Used by companies such as Microsoft and Shell Oil to monitor their Windows nt infrastructure.
http://www.netiq.com
VigilEnt Password Manager 2.0 Streamlines Password Management for Windows, Linux and UNIX Environments NetIQ VigilEnt Policy Center Wins SC Magazine 'Best Buy' NetIQ Delivers Application-Based Storage Area Network Management NetIQ Extends Content Security Solutions to Corporate Instant Messaging Environments ... More News ... Alert! Sendmail vulnerability detected. Are you secure? Learn more ... Content Security and Anti-spam NetIQ's Marshal solutions help you enforce acceptable use policies for email, the web and Instant Messaging. Learn more about MailMarshal... Learn more about WebMarshal... Learn more about imMarshal for MSN... VigilEnt Integrated Security Management
Solutions from NetIQ With the acquisition of PentaSafe Security Technologies, NetIQ now delivers the most effective and efficient way to reduce the cost of securing your business and to optimize the administration and protection of information assets throughout your enterprise. Learn more ... Announcing the new WebTrends Reporting Series 6.0 Real-time, accurate answers to improve visitor acquisition, conversion and retention with the choice of either software or a hosted service.

85. Windows NT2000 Software, Shareware, And Freeware - Win2000Archives.com
Download Windows nt workstation and server software. Many categories to choose from.Category Computers Software Shareware Windows nt...... Windows nt/2000 Software Downloads. Microsoft ® , Windows ® , Windows nt ®, and Windows 2000 ® are registered trademarks of Microsoft Corporation.
http://www.ntware.com/
Click Here! Search WinNT/2000Archives: Windows NT/2000 Software Downloads Windows 2000
Links
Bookstore
Bugs

FAQ?

Links
... Service Pack 2 for Windows 2000 Now Available Windows NT
Links
Alpha Downloads
Bookstore

Bugs

FAQ?
...
Vulnerability
Other Archives: t Win 95/98/Me t Palm Pilot t Windows CE t Pocket PC t Linux t Newton t Psion t Screen Savers t Themes t OS/2 t BeOS t Java t Games t Mac t CGI t Ware of the Month Free Newsletter What´s New! Web Position Gold: Web site promotion tool that helps you achieve the highest possible rankings in all of the major search engines. Enter Email
Address Below: Workstation Server Microsoft , Windows , Windows NT , and Windows 2000 are registered trademarks of Microsoft Corporation. Microsoft Corporation in no way endorses or is affiliated with WinNT2000Archives.com. All other trademarks are the sole property of their respective owners. WinNT2000Archives.com is NOT responsible for the performance of software applications, programs or services included anywhere in its pages, or for damages or problems of any kind which may result from their use.

86. IconsPLUS - Comic Book, Sci-fi, TV And Movie Desktop Icons
Site dedicated to creating cool comic book, scifi, tv, movie and other pop culture icons and desktop wallpaper to decorate the Mac or Windows 95/98/nt. Freeware
http://www.iconsplus.com/
Home of comic book, sci-fi, tv, movie and other pop culture icons to decorate your computer desktop. Here you will find freeware icons, desktop patterns, desktop pictures and fonts for private non-commercial non-web use.
Get or Internet Explorer 4.x to access IconsPLUS IconsPLUS

87. Workstation NT Web Site - Resource For Windows NT Workstation 4.0
How to use and optimize Windows nt Workstation.Category Computers Software Windows Windows nt nt Workstation......Features architectural information and optimization techniques for desktopinstallations of Windows nt. Windows nt Workstation
http://personal.cfw.com/~tkprit/
Windows NT Workstation 4.0 resource for stand-alone computers This site is no longer being updated. As such, the links are good only as of the last updates (early 1999; see below), and the tips are good generally through NT v 4.0 SP4. Last Updates 18 Jan 1999 Workstations and Links have been seriously revamped. 09 Jan 1999 Recovery backup programs updated (versions and prices). 02 Jan 1999 Internet Security
system tweaks Clutter Files
Memory Optimization
Memory Leaks, Detecting
more...
ui tweaks Desktop
File Typing
Start Menu
more...
reference
NT system files AND TIPS! STOP Error Messages Internet Explorer 4 Command Line Usage Necessary Services Internet Security Recovery Service Packs NT Resource Kit Info Other Utilities Workstations Workstation Bookstore Microsoft ... Links

88. Compare Prices And Read Reviews On Windows NT At Epinions.com
Reviews on Windows nt written by consumers at Epinions.com.
http://www.epinions.com/cmsw_Operating_Systems_Enterprise_Computing-Windows_NT
Join Epinions Help Sign In
All Categories Beauty Books Computer Hardware Education Electronics Games Gourmet Health Movies Music Musical Equipment Outdoor Gear Personal Finance Pets Software Sporting Goods Related Deals
Windows NT
Overall rating: This product has
not yet been reviewed. Write a review Compare Prices View Details No Reviews Subscribe to reviews on this product
Marketplaces Store Rating
638 store reviews

Search for Windows NT at eBay Search "Buy it Now" for Windows NT at eBay
Featured Resources Additional information on Windows NT and other related products. New Car - Dealer Prices
Compare multiple price quotes on a new car from local dealers and save
www.pricequotes.com Search For Your Ideal Car
www.autoweb.com Used Police Car
From formerly large inventory in the USA. www.usedpolicecars.com Help Member Center Privacy Statement Site Index ... Trademark Notice Epinions.com periodically updates pricing and product information from third-party sources, so some information may be slightly out-of-date. You should confirm all information before relying on it.

89. I386 The Source For Windows NT, 2000, XP - Bormio - Home  « BormioOnline.com
Advanced nt/2000 Information for Administration and Power Users. Unattended Setup, Administration Category Computers Software Operating Systems Windows Windows nt...... and POP3 downloading! Download your free 60 day Trial!.'. IntRUSIONDETECTION Software for Windows nt/2000. 'NetworkWide Event Log
http://www.i386.com/
Block all email viruses and worms at server level with GFI MailSecurity. Dld Trial!
Home
Administration Deployment Disaster Recovery ... News
Newsletter Get the latest stuff from i386 to your Email!
New And Updated VPN Auditor 1.1
i386's newest tool for scanning Microsoft VPN Servers. Collects the users, computers and even scans the connected clients for Anti-Virus and Personal Firewall. 31 January 2003 Music Libraries, Ripping, Recording...
Not all music library or jukebox software are the same you'll soon discover after you've got bored with the visualisations and sound effects. Many of these applications require you to purchase extra plug-in's and add-on's at an extra cost. 28 January 2003 Firewall on a Floppy
Creating a Firewall on a single floppy to host a mail server, web server and some webcams on IP address. Linux based firewall which runs off one floppy on a 486 or higher. IPTables examples. 29 November 2002 C++ class for Microsoft VPN Server
Connect remotely or locally to query computer information such as user, computer name, time connected and connection type. Also the ability to disconnect users using this Visual C++ class. 23 November 2002 Installing an EXE package remotely and silently.

90. NetIntellGames Card And Board Games
Seven Windows 95/98/2000/nt card games; play offline or online. Download shareware, register online.
http://www.netintellgames.com/
Home Download Register Contact Us Games Windows 95/98/ME/NT/2000/XP
Net Gin Rummy

Net Spite and Malice

Net Cribbage

Net Poker
...
Net Sea War

Free Java Applets
Gin Rummy

Cribbage

Other Games
Resources
Home Download Center How to Register Register Now! What's New ... Link To Us Newsletter Sign up for the free email newsletter Introduction Of the wealth of games in existence, there are some which people have played for many years and centuries. These include card and board games. Some of these games, for example chess, are more than four hundred years old, and checkers was found in the burial chamber of Egyptian pharaoh Tutankhamen, and the first references to cards have been dated by historians to the 10th century AD. We would like to offer you computer versions of these games, the significant feature of which is the fact that they are games played with another player. So if you want to play card and board games: - offline against computer opponents; - with your relatives or colleagues via local home or company network;

91. JSI, INC. - Your Windows NT / 2000 / XP / .NET ® Resource.
Sells and supports Windows nt / Windows 2000 / Windows XP platform products. Located in metro Atlanta.Category Computers Consultants United States Georgia......
http://www.jsiinc.com/
Viewing this site requires a browser capable of displaying frames and is best viewed with JAVA and JavaScript support enabled.

92. Japan Windows NT Users Group (JWNTUG) Home Page

http://www.jwntug.or.jp/
http:// JWNTUG - Since Nov 27, 1996 - has grown to over members
Information
What's new
About JWNTUG

Contact
Membership JWNTUG-NET Technical
Newsletter Web
NT-FAQ-J
TechNote
Links
JWNTUG-NET
Freeware
Japanization
Project
RC5/DES Cracking
Misc
Event
Sponsors
The first Windows NT-based group established in Japan. We would like to provide various types of information and means of discussion among NT users who seek better and smoother management of the operating system. All the voices and opinions formed here by the NT users will certainly change the course of Windows NT may take in the future.
Feeling Your NTBOX Secure Now?
Team JWNTUG RC5-64 cracking challenge started as a regional effort in Japan. But of course, NT users from all over the world are always welcome to realize more secure NT environment and to help us push the name of Windows NT to the top of the lists Join us and win together!

93. Windows NT Utilities
A command-line SSH client. Supports secure file copying.Category Computers Security Cryptography SSH Clients Windows......Windows nt Utilities. Swapping CapsLock and LeftControl. Expect for Windowsnt. SSH and SCP for Windows 95 and nt (command line only version).
http://bmrc.berkeley.edu/people/chaffee/winntutil.html
Windows NT Utilities
  • Swapping CapsLock and Left-Control.
    • Many people coming from the Unix world, particularly heavy Emacs users, are unhappy with the placement of CapsLock and Control on PC keyboards. I have created three keyboard layout files for Windows NT. For Unix X users, look here
    • A US English layout with CapsLock changed to be Control
    • A US English layout with CapsLock and Control swapped.
    • A US Dvorak layout with CapsLock change to be Control
      To use one, pick up the U.S. keyboard distribution
    • swapcapslock.zip and follow the instructions for NT 4.0 or the instructions for NT 3.5
    • For a U.K. version of the DLL that was provided by Charles Reindorf , get kbduksw1.dll
    • If you are using Hummingbird's very good eXceed X Server, you'll need to install a special keymap in addition to the key swapper above. Here are the instructions for swapping keys on eXceed.
    • You can also edit the registry to make arbitrary changes to the keyboard mapping. Unlike the above keyboard layouts, the registry change affects all users.

    94. Oreilly.com -- Online Catalog: Managing The Windows NT Registry
    A musthave for every nt system manager or administrator, it covers what the Registry is and where it lives on disk, available tools, Registry access from programs, and Registry content.
    http://www.oreilly.com/catalog/manwinreg/
    Books Articles Conferences
    O'Reilly Home
    Press Room Jobs Resource Centers Perl Java Python C/C++ ... Bioinformatics Book Series Hacks The Missing Manuals Online Publications MacDevCenter.com ONDotnet.com ONJava.com ONLamp.com ... XML.com Special Interest Author Events Meerkat News Ask Tim tim.oreilly.com ... Learning Lab Inside O'Reilly About O'Reilly International Media Kit Contact Us ...
    Join Email List
    Managing the Windows NT Registry
    By Paul Robichaux
    1st Edition April 1998
    1-56592-378-2, Order Number: 3782
    This book is out of print.
    Buy from O'Reilly:
    The Windows NT Registry is the repository for all hardware, software, and application configuration settings. This is the system administrator's guide to maintaining, monitoring, and updating the Registry database. A "must-have" for every NT system manager or administrator, it covers what the Registry is and where it lives on disk, available tools, Registry access from programs, and Registry content. [ Full Description
    Related O'Reilly Titles:
    DNS on Windows NT
    Windows NT Event Logging

    O'Reilly Home

    95. CERT®/CC Steps For Recovering From A UNIX Or NT System Compromise
    CERT ® Coordination Center. Steps for Recovering from a UNIX or nt System Compromise. Reviewsecurity using the UNIX or nt Configuration Guidelines document.
    http://www.cert.org/tech_tips/win-UNIX-system_compromise.html
    Options
    Advisories
    Vulnerability Notes Database Incident Notes Current Activity
    Related Summaries Tech Tips AirCERT Employment Opportunities
    more links CERT Statistics Vulnerability Disclosure Policy CERT Knowledgebase System Administrator courses ... Channels
    Related Sites
    CERT Coordination Center
    Steps for Recovering from a UNIX or NT System Compromise
    This document is being published jointly by the CERT Coordination Center and AusCERT (Australian Computer Emergency Response Team). It describes suggested steps for responding to a UNIX or NT system compromise. Your response should be carried out in several stages: Introduction
    A. Before you get started
  • Consult your security policy If you do not have a security policy Consult with management ... Document all of the steps you take in recovering
  • B. Regain control
  • Disconnect compromised system(s) from the network Copy an image of the compromised system(s)
  • C. Analyze the intrusion
  • Look for modifications made to system software and configuration files Look for modifications to data Look for tools and data left behind by the intruder ... Check for systems involved or affected at remote sites
  • D. Contact the relevant CSIRT and other sites involved
  • Incident Reporting Contact AusCERT - Australian Computer Emergency Response Team Contact the CERT Coordination Center ... Obtain contact information for other sites involved
  • E.

    96. Net Gear Maker Turns To NT | CNET News.com
    Startup Berkeley Networks will utilize the ever-increasing amount of network services found in Microsoft's Windows nt Server operating system for a new line of switching equipment for networks. News.com
    http://www.news.com/News/Item/0,4,17824,00.html?st.ne.fd.mdh

    97. CERT®/CC Windows NT Configuration Guidelines
    CERT ® Coordination Center. Windows nt Configuration Guidelines. Note that Microsoftinadvertently distributed ROLLBACK.EXE with some Windows nt 4.0 releases.
    http://www.cert.org/tech_tips/win_configuration_guidelines.html
    Options
    Advisories
    Vulnerability Notes Database Incident Notes Current Activity
    Related Summaries Tech Tips AirCERT Employment Opportunities
    more links CERT Statistics Vulnerability Disclosure Policy CERT Knowledgebase System Administrator courses ... Channels
    Related Sites
    CERT Coordination Center
    Windows NT Configuration Guidelines
    This document is being published jointly by the CERT Coordination Center and AusCERT (Australian Computer Emergency Response Team) and details common Microsoft Windows NT 4.0 configuration problems that have been exploited by intruders and recommends practices for deterring several types of break-ins. We encourage system administrators to review all sections of this document and modify their systems accordingly to fix potential weaknesses.
    I. Installation Guidelines
    II. Patches
  • Service Packs Hotfixes Keeping Patches Current
  • III. Computer Virus Prevention
    IV. Network Configurations
    V. Passwords
    VI. File System and Shares
    VII. Registry Setting Recommendations Access Control List Recommendations VIII. Audit Logs Users Files and Directories Registry ... Document revision history
    I. Installation Guidelines

    98. Pagina Niet Gevonden - Microsoft Nederland
    Met veel informatie, de datasheet en de kenmerken.
    http://www.microsoft.com/netherlands/windows/ntserver/default.asp

    99. Network Administration Tools: Linux, Windows 2000, NT, And More...
    Network Probe is a free network monitor and protocol analyzer that runs on Windowsnt/2K/XP, Linux, FreeBSD, Solaris (Intel), and Mac OS X. We downloaded the
    http://www.netadmintools.com/
    Categories:
    GNU/Linux
    Homebrew designs Perl Administration ... IT Career Center
    (free sample issue)
    Self Test Software, the World Leader in Certification Practice Tests

    Flashcards:
    Question:
    How do you install Red Hat GNU/Linux if you don't want to hook a VGA monitor and keyboard up to the server?
    answer
    Patch IIS 5.0 Now! - Topic: Security
    Posted:2003-03-17 16:35:57
    Printer Friendly:

    There is a remote exploit for IIS 5.0 that may allow an attacker to run arbitrary commands. This appears to be zero-day, folks. Details here Direct link to this article Stupid Bash Tricks: Simple Loop With Timestamp - Topic: GNU/Linux ABCs Posted:2003-03-17 13:59:40 Printer Friendly: We ran into an interesting situation where we needed to know two things: whether or not a particular server was down, and when, exactly, it went down. We had requested some service be done on the server, and had a shell open via ssh. A simple solution that did the trick, and illustrates some stupid BASH tricks, is this script: divine@trasho divine $ until [ 6 -eq 9 ] do echo $(date) sleep 1 done Mon Mar 17 14:01:13 PST 2003 Mon Mar 17 14:01:14 PST 2003 . . .

    100. Alice: Free, Easy, Interactive 3D Graphics For The WWW
    Free scripting and prototyping environment program for 3D object behavior. Runs on Windows 95/98/nt. Reads many common 3D file formats.
    http://www.alice.org/
    Al ice
    Learn to Program Interactive 3D Graphics
    Alice v2.0b is the next major version of the Alice 3D Authoring system, from the Stage3 Research Group at Carnegie Mellon University . It has been completely rewritten from scratch over the last two years. The focus of the Alice project is now to provide the best possible first exposure to programming for students ranging from middle schoolers to college students. FREE STUFF COMMUNITY Help INFO CREDITS Alice is made freely available as a public service.
    Alice v2.0 ©
    We gratefully acknowledge the University of Virginia, where the Alice project originated.
    We gratefully acknowledge the financial support of DARPA, Intel, Microsoft, NSF, and ONR.

    Page 5     81-100 of 190    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | 10  | Next 20

    free hit counter