[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194074 Download | Alert*

This setting specifies the number of days that Internet Explorer keeps track of the pages viewed in the History List. The delete Browsing History option can be accessed using Tools, Internet Options and General tab.

This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose options from the drop-down box. Custom, to control permissions settings individually.

Internet Explorer uses Multipurpose Internet Mail Extensions (MIME) data to determine file handling procedures for files received through a Web server. This policy setting determines whether Internet Explorer requires that all file-type information provided by Web servers be consistent. For example, if the MIME type of a file is text/plain but the MIME sniff indicates that the file is really an ex ...

This policy setting turns off the Security Settings Check feature, which checks Internet Explorer security settings to determine when the settings put Internet Explorer at risk.

This policy setting allows you to manage whether users may download unsigned ActiveX controls from the zone. Such code is potentially harmful, especially when coming from an untrusted zone.

This policy setting allows you to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. A MIME sniff is the recognition by Internet Explorer of the file type based on a bit signature.

Network Security: Minimum session security for NTLM SSP based (including secure RPC) clients

Creates a connection to a remote network whenever a program references a remote DNS or NetBIOS name or address. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\System Services!Remote Access Auto Connection Manager (2) REG: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasAuto!Start

Audit rules about the Unauthorized Access Attempts to Files (unsuccessful) are enabled

The group of the rsh executable must be wheel. The rsh utility copies its standard input to the remote command, the standard output of the remote command to its standard output, and the standard error of the remote command to its standard error. Interrupt, quit and terminate signals are propagated to the remote command; rsh normally terminates when the remote command does.


Pages:      Start    11840    11841    11842    11843    11844    11845    11846    11847    11848    11849    11850    11851    11852    11853    ..   19407

© SecPod Technologies