TAILIEUCHUNG - Windows NT 4.0 Security

In our next sections together we will consider the Windows NT and Windows 2000 operating systems. Windows NT was Microsoft’s first effort in building a production server operating system, and they made a number of changes and improvements in Windows 2000. We are going to take a quick look at the architecture and file system and then move into the tools that you can use to gather clues from your operating system. | Windows NT Security Secure System Administration - SANS GIAC 2000 2001 1 In our next sections together we will consider the Windows NT and Windows 2000 operating systems. Windows NT was Microsoft s first effort in building a production server operating system and they made a number of changes and improvements in Windows 2000. We are going to take a quick look at the architecture and file system and then move into the tools that you can use to gather clues from your operating system. I am going to approach the tools in the following way since NT has tools to implement security we are going to learn to configure our system security policy and at the same time how to check it. As always we will focus on learning to use the tools that are available with the operating system and possibly the Resource Kit but we are also going to look at something new your operating system s interface to the network. In order to run a number of the exercises you will need to be logged in as Administrator. As always unless this is a scratch operating system that you loaded only for testing make sure you have a good backup before trying privileged system commands. 1 User Processes Outlook Explorer . Subsystems Security Win32 POSIX . U S E R M O D E K E R N E L M O D E NT Executive Object Manager Virtual Memory Manager I O Manager Windows NT Kernel Hardware Abstraction Layer Responsible for CPU and bus HARDWARE Secure System Administration - SANS GIAC 2000 2001 2 Windows NT is a synthesis of operating systems that came before it including MACH UNIX and VMS. The hardware privilege model is straightforward kernel mode can run anything and user mode is tightly constrained. Two things to note Though there are multiple subsystems including POSIX OS 2 and the Virtual DOS Machine VDM they are rarely used. The Win32 subsystem is the animal that is more equal than other animals and it operates with more privileges. Application programmers are supposed to write to the subsystems via Application .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.