Welcome To C-Systems Security

line

This page was developed to cover primarily Windows 95/98,
WindowsNT, and other networking security issues.

line

Problem: Using most any windows operating system any user can bypass the network login screen at startup and have just about unlimited access to the network. All by simply pressing the cancel button.

Solution: Place a password protected screen saver in the startup folder of the default desktop. (Warning, this is a quick fix and can be quickly defeated in many ways.)
Solution2: Use Folder Guard to lock off the cancel button.

line

Problem: When loggin onto a windows system all the users have the same access to things such as Network setting and other tools that would be considered extreme security breaches.

Solution: Use the program Poledit.exe (located on any windows 98 or 95 disk.) to secure desktops settings lock off all icons and restricted the use of the start menu.

line

Problem: Any user can right click and access windows explorer.

Solution: Not found. *Sumit your solution*

line

 

Problem: By default, Windows NT places the user name of the last user to log on the computer in the User name text box of the Logon dialog box. This makes it more convenient for the most frequent user to log on. To help keep user names secret, you can prevent Windows NT from displaying the user name from the last log on. This is especially important if a computer that is generally accessible is being used for the (renamed) built-in Administrator account.

Solution: To prevent display of a user name in the Logon dialog box, use the Registry Editor to create or assign the following registry key value:

line

Tip!
Display a Legal Notice Before Log On

Windows NT, 95/98 can display a message box with the caption and text of your choice before a user logs on. Many organizations use this message box to display a warning message that notifies potential users that they can be held legally liable if they attempt to use the computer without having been properly authorized to do so. The absence of such a notice could be construed as an invitation, without restriction, to enter and browse the system.

The log on notice can also be used in settings where users might require instruction on how to supply a user name and password for the appropriate account.
To display a legal notice, use the Registry Editor to create or assign the following registry key values on the workstation to be protected:

 

The changes take effect the next time the computer is started. You might want to update the Emergency Repair Disk to reflect these changes.
Example:

"Welcome to the C-Systems Corp Network.
Log on using account name Guest and password Guest.
Authorized Users Only.

This system is for the use of authorized users only. Individuals using this computing system without authority, or in excess of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel.  In the course of monitoring individuals improperly using this system, or in the course of system maintenance, the activities of authorized users may be monitored.  Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity, system personnel may provide the evidence of such monitoring to law enforcement officials."

line