Key Sites and Portals:
Stealth and Security Tests:
a pub from the FTC with screwed-up, reversed, priorities: http://www.ftc.gov/bcp/conline/edcams/infosecurity/
w2k Installation and Update:
w2k Configuration [Security Guides]: (I recommend that you get them all, including templates for secedit.exe)
Free downloads for Microsoft users: from one of several locations
9x: winipcfg.exe 2k: ipconfig.exe
This util can help associate some open ports with running processes: http://www.sysinternals.com/files/tcpview.zip
Detecting and Removing Trojans and Malicious Code from w2k Systems: http://online.securityfocus.com/infocus/1627
It's October 1992 and there is still email software in widespread general use which will run infected attachments automatically. God save us from GWB and MS.
The W32/Bugbear worm attempts to exploit a MIME and an IFRAME vulnerability in some versions of Microsoft Outlook, Microsoft Outlook Express, and Internet Explorer. These vulnerabilities allow an executable attachment to run automatically, even if you do not double-click on the attachment.
use nms Scripts from http://nms-cgi.sourceforge.net/scripts.shtml
Windows autostarting culprits: http://www.tlsecurity.net/auto.html
Before you invest in Windows/XP, read this: http://www.hevanet.com/peace/microsoft.htm
I wonder if this is solved yet ... http://archives.neohapsis.com/archives/bugtraq/2000-03/0092.html