Sheldon's guide approaches security from the perspective of the Windows NT and addresses key issues such as protective features available within NT as well as potential security holes. Readers learn how to create defensive strategies and become familiar with different security protocols.How Infections Occur A system becomes contaminated with a virus through file system activity. A contaminated file is either copied from a disk or downloaded from an online service, bulletin board, or the Internet. ... When files are contaminated, they may increase in size, so it is relatively easy for a virus detection program to report such problems. ... The best protection is to lock up systems and carefully monitor the activities of employees, especially people who might be leaving theanbsp;...
|Title||:||Windows NT Security Handbook|
|Publisher||:||McGraw-Hill Osborne Media - 1997-01-01|