|
Network Bondage
Discipline your network bindings in the privacy of your own home. Microsoft's networking technology is only required for sharing files and printer services with other Microsoft-based PC's.
It is not needed for connecting to the Internet or for using any Internet services. Using it in wide area networking (WAN - like the Internet) situations, dramatically lowers your security by divulging information about you and your computer, exposing Microsoft's weak password protection system to password crackers over the Internet, bringing your machine to the attention of Internet scanners and intruders and making you a target for attack.
ShieldsUP! Advice: Version 2
I have learned a great deal from the feedback and experiences of the quarter of a million visitors who came through this web site during its first 30 days of life. And this site's shocking popularity caused me to invest much more time than I originally had in working out the most foolproof solutions to securing Windows NetBIOS networking.
As a result, the following Advice and Instruction pages have been significantly revised. Frankly, I am extremely excited about the new super-solid solutions I've worked out, and I believe you'll be very pleased with the well-deserved feeling of mastery you'll soon have over your Windows networking system.
The second generation guidelines
presented on these pages:
Completely close your system to all NetBIOS name and resource sharing leakage, and firmly shut the three NetBIOS scanner bait ports 137, 138, and 139.
Cost nothing to implement, other than the time taken to read and understand these pages, and do not depend upon any external software.
Present a single, uniform, solution that is very likely to be appropriate for everyone to use in every situation.
Will not in any way disturb your current Windows or network logon procedures and will not disrupt your dial-up networking or other stored passwords.
Do not rely upon any hacking tricks or undocumented procedures. No warranties will be voided and no one can refuse to support your system on the grounds that you've done something strange to it. (You won't have.)
Can be completely and easily reversed. If you don't like any outcome of following these simple instructions you will have learned how to easily reverse the simple changes you have made.
Create a solid foundation for establishing a secure local area network — today or tomorrow. When you have read and understood this page and the one that follows, you will have gained a solid understanding of the theoretical and practical aspects of network component binding.
Return CONTROL of a significant and important aspect of your personal computing experience — your computer's networking — back to YOU where it always belonged!
Bondage
|
|
|
|
Posted on Saturday, 18 October 2003 @ 05:00:00 EDT by phoenix22
|
|
|
|
|
Login |
|
|
|
|
|
· New User? ·
Click here to create a registered account.
|
|
|
Article Rating |
|
|
|
|
|
Average Score: 0
Votes: 0
|
|
|