[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1367 Download | Alert*

Internet Information Services provides support for Web and FTP Servers, along with support for ASP.NET web sites. dynamic content such as Classic ASP and CGI, and local and remote management. Internet Information Services (IIS, formerly Internet Information Server) is an extensible web server created by Microsoft for use with Windows NT family. The setting should be configured correctly. Certain ...

Simple TCP/IP Services are really a collection of command line utilities. This collection includes the 'quote of the day' protocol, the daytime protocol, character generator (chargen), echo protocol, and discard protocol. These are just ports that are opened up on your Windows computer to perform specific testing or diagnostic functions. Therefore, these features should be configured co ...

Telnet Client is used to connect to remote machine by using the Telnet protocol. Telnet Client allows a computer to connect to a remote Telnet server and run applications on that server. Once logged on, a user is given a command prompt that can be used as if it had been opened locally on the Telnet servers console. Telnet is disabled by default on Windows7 for the simple reason that it is someti ...

Telnet Server hosts the remote sessions for Telnet clients. When Telnet Server is running on a computer, users can connect to the server with a Telnet client from a remote computer. Telnet Server is implemented in Windows as a service that can be configured to always run, even when no one is logged on to the server. Telnet servers exchange data by using unencrypted characters (plaintext). If you ...

The Trivial File Transfer Protocol (TFTP) client allows the transfer of files using the TFTP protocol between a TFTP client and a TFTP server. The TFTP protocol is implemented using the User Datagram Protocol (UDP) to send and receive data. The TFTP protocol implements its own reliability scheme using UDP. Some programs and features included with Windows, such as Internet Information Services, mu ...

The Windows Media Center features should be configured correctly. Some programs and features included with Windows, such as Internet Information Services, must be turned on before you can use them. Certain other features are turned on by default, but you can turn them off if you don t use them. To turn a feature off in earlier versions of Windows, you had to uninstall it completely from your compu ...

This security setting determines whether the local Administrator account is enabled or disabled. Notes If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Adminis ...

This policy setting controls the level of validation a computer with shared folders or printers (the server) performs on the service principal name (SPN) that is provided by the client computer when it establishes a session using the server message block (SMB) protocol. The server message block (SMB) protocol provides the basis for file and print sharing and other networking operations, such as r ...

Allowing source routed network traffic allows attackers to obscure their identity and location. IP source routing is a mechanism that allows the sender to determine the IP route that a datagram should follow through the network. Vulnerability: Source routing allows a computer that sends a packet to specify the route that the packet takes. Attackers can use source routed packets to obscure th ...

Hiding the computer from the Browse List removes one method attackers might use to gether information about computers on the network. You can configure a computer so that it does not send announcements to browsers on the domain. If you do, you hide the computer from the Network Browser list; it does not announce itself to other computers on the same network. Vulnerability: An attacker who kn ...


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   136

© SecPod Technologies