|
Welcome To C-Systems Security

This page was developed to
cover primarily Windows 95/98,
WindowsNT, and other networking security issues.

Problem: Using most any windows operating system any user can bypass the
network login screen at startup and have just about unlimited access to the network. All
by simply pressing the cancel button.
Solution: Place a password protected screen saver in the startup folder of the
default desktop. (Warning, this is a quick fix and can be quickly defeated in many ways.)
Solution2: Use Folder Guard to
lock off the cancel button. |

Problem: When loggin onto a windows system all the users have the same access
to things such as Network setting and other tools that would be considered extreme
security breaches. Solution: Use the program Poledit.exe
(located on any windows 98 or 95 disk.) to secure desktops settings lock off all icons and
restricted the use of the start menu. |

Problem: Any user can right click and access windows explorer.
Solution: Not found. *Sumit your
solution* |

Problem: By default, Windows NT places the user name of the last user to log
on the computer in the User name text box of the Logon dialog box. This makes it more
convenient for the most frequent user to log on. To help keep user names secret, you can
prevent Windows NT from displaying the user name from the last log on. This is especially
important if a computer that is generally accessible is being used for the (renamed)
built-in Administrator account.
Solution: To prevent display of a user name in the Logon dialog box, use the
Registry Editor to create or assign the following registry key value: |

Tip!
Display a Legal Notice Before Log On
Windows NT, 95/98 can display a
message box with the caption and text of your choice before a user logs on. Many
organizations use this message box to display a warning message that notifies potential
users that they can be held legally liable if they attempt to use the computer without
having been properly authorized to do so. The absence of such a notice could be construed
as an invitation, without restriction, to enter and browse the system.
The log on notice can also be
used in settings where users might require instruction on how to supply a user name and
password for the appropriate account.
To display a legal notice, use the Registry Editor to create or assign the following
registry key values on the workstation to be protected: |
The
changes take effect the next time the computer is started. You might want to update the
Emergency Repair Disk to reflect these changes.
Example:
"Welcome to the C-Systems
Corp Network.
Log on using account name Guest and password Guest.
Authorized Users Only.
This system is for the use of authorized users only. Individuals using this
computing system without authority, or in excess of their authority, are subject to having
all of their activities on this system monitored and recorded by system personnel.
In the course of monitoring individuals improperly using this system, or in the course of
system maintenance, the activities of authorized users may be monitored. Anyone
using this system expressly consents to such monitoring and is advised that if such
monitoring reveals possible evidence of criminal activity, system personnel may provide
the evidence of such monitoring to law enforcement officials." |

|