[ISN] Inside Windows IT Security UPDATE

From: InfoSec News (isn@private)
Date: Mon May 22 2006 - 01:40:39 PDT


This email newsletter comes to you free and is supported by the 
following advertisers, which offer products and services in which you 
might be interested. Please take a moment to visit these advertisers' 
Web sites and show your support for Windows IT Security UPDATE.


St. Bernard Software



What's in the June 2006 Issue of Windows IT Security
     - Feature: Reaping the Benefits of WPA and PEAP
     - Access Denied
     - Toolbox: Nmap 4.0 Does Windows


==== Sponsor: Symantec ====

A multi-tier approach to email security prevents unauthorized access and can 
stop spam, viruses, and phishing attacks. Learn to implement one today, and 
protect your network security and business systems!

What's in the June 2006 Issue of Windows IT Security

Focus: The Benefits of WPA and PEAP
   Learn how to secure your WLAN with WPA and PEAP, how to craft an effective 
password policy, how to use free tools to audit your Web applications, how to 
use Nmap 4.0 to scan for rogue applications, and more.

The following article is available at no charge to nonsubscribers for a 
limited time:

Reaping the Benefits of WPA and PEAP
   Learn about the benefits and configuration steps for securing your 
wireless networks by using WPA or WPA2 technology.
   --John Howie

Nonsubscribers now have access to the Access Denied and Toolbox columns: 

Access Denied
   --Randy Franklin Smith

Preventing Users with Administrator Authority from Installing Software
   Although no measure is completely effective, here are some methods you can 
use to make it harder for users to load unauthorized applications on their 

Defending Against Rootkits
   Prevention is the best medicine against rootkits, which are deployed the 
same way as other malware but are harder to detect once they're on your 

Auditing Folder Permission Changes
   Here's how to configure Windows to record alterations of folder 
permissions in the Security log.

Toolbox: Nmap 4.0 Does Windows
   This essential open-source network port scanner can help you quickly 
identify applications running on your network and easily test firewalls and 
   --Jeff Fellinge

Subscribers have access to the entire contents of the June 2006 
issue. For a list of the other articles available in this issue, go to

Windows IT Security is a monthly, paid, print newsletter loaded with 
news and tips to help you manage, optimize, and secure your Web-enabled 
enterprise. In addition to receiving the monthly print newsletter, 
subscribers can access all the newsletter content, including the most recent
issue, at the Windows IT Security Web site.

Subscribe today and access all the issues online!


==== Sponsor: St. Bernard Software ====

Examine the threats of allowing unwanted or offensive content into your network 
and learn about the technologies and methodologies to defend against 
inappropriate content, spyware, IM, and P2P.


==== Events & Resources ====
   (from Windows IT Pro and its partners)

Use virtual lab automation solutions to address special challenges in pre-
production and staging environments, such as virtual server file library 
management, provisioning, configuration, and remote access concerns. Live Event: 
Thursday, May 18

Mark Joseph Edwards discusses emerging spyware threats, including rootkits and 
keyloggers, and spyware distribution methods. Live Event: Tuesday, May 30

Maximize your VoIP environment by integrating FoIP technology to increase ROI 
and streamline processes.

Learn the advantages of running SQL Server 2005 and its BI subsystems on the x64 
platform; the performance benefits the x64 architecture provides for Analysis 
Services, Integration Services, and Reporting Services; and how to migrate to 
the new 64-bit x64 platform.

==== Featured White Paper ====

Determining effective permissions on Windows can be incredibly challenging. In 
this must-have white paper, you'll learn why it's essential to determine 
effective permissions; how to determine who has access to critical information 
in Windows; how to resolve overlapping permissions for network access, shared 
hierarchies, and local machine rights; and how entitlement reporting can 
overcome the challenges with an automated solution.


==== Hot Release ====

Combat phishing and pharming with complete protection against complex internet 
threats by filtering at multiple points on the gateway, network, and endpoints.

==== Announcements ====
(brought to you by Windows IT Pro)

Windows IT Pro Master CD--SAVE 50%!
   Subscribe today and get portable, high-speed access to the entire Windows 
IT Pro article database on CD. This searchable library includes every Windows IT 
Pro issue ever published. The newest issue also includes BONUS Windows IT Tips. 
Order now and save:

May Exclusive--Get $100 off the Windows IT Security Newsletter
   For a limited time, order the Windows IT Security newsletter and SAVE up 
to $100! In addition to 12 helpful issues loaded with solutions you won't find 
anywhere else, you'll get FREE access to the entire Windows IT Security online 
article database. Subscribe now: 


==== Contact Us ====

About the newsletter -- letters@private
About technical questions -- http://list.windowsitpro.com/t?ctl=2B20E:4FB69
About product news -- products@private
About your subscription -- securityupdate@private
About sponsoring UPDATE -- salesopps@private


Make sure your copy of Inside Windows IT Security UPDATE doesn't get 
mistakenly blocked by antispam software! Be sure to add 
Inside_WindowsITSecurity_Update@private to your list of 
allowed senders and contacts.

This email newsletter is brought to you by Windows IT Security, the 
leading publication for IT professionals securing the Windows enterprise 
from external intruders and internal users. Subscribe today! 

View the Windows IT Pro Privacy policy at

Windows IT Pro is a division of Penton Media Inc.
221 East 29th Street, Loveland, CO 80538,
Attention: Customer Service Department

Copyright 2006, Penton Media, Inc.  All Rights Reserved.

Attend the Black Hat Briefings and
Training, Las Vegas July 29 - August 3
2,500+ international security experts from 40 nations,
10 tracks, no vendor pitches.

This archive was generated by hypermail 2.1.3 : Mon May 22 2006 - 01:52:15 PDT