NetworkNewz About Us iEntry
September 27, 2010
Increase Security by Decreasing User Access
By Michael Marr
Perhaps the old cliche is true: less is more. Details from a recent study by Beyond Trust has found that over 90% of the Windows 7 vulnerabilities from the past year can be guarded against by simply restricting user access. Removing administrative rights from a Windows workstation adds an additional level of security.

If you’re not already restricting your workstation’s user rights, then, as my colleague Bryan Young put it, "shame on you." However, there are some scenarios where you may feel that a user needs administrative rights, and this report will certainly encourage you to second guess that thought. These numbers shouldn’t be surprising. Malicious code typically gains access via an opened file or application. Thus, this bad code will run initially as the particular user that accessed the host file. If that user doesn’t have the necessary access to change system files or settings, then it makes the life of malicious code that much more difficult. Obviously, some exploits allowed this malicious code to be run as the administrator, and thus why restricting user rights is not an end-all solution.

Continue Reading
The Best Value in Network Management
Interested in contributing to the Network community?
Can you write expert articles and news addressing all aspects of networking? If so, we are looking for you. Contact

Today's Top Videos:
Lessons Learned from Doing without Social Media
The results are in regarding a story WebProNews brought you last week. Harrisburg University of Science and Technology in Pennsylvania issued a social media ban across its entire campus for...
How Brick-and-Mortars Can Achieve Social Success
Because social media is an entirely different playing field, it can be difficult for businesses, especially brick-and-mortar businesses. Many offline businesses are hesitant about embracing social...
What Mobile PPC Can Do for You
Have you thought seriously about mobile PPC? If you haven't, you should. According to Cindy Krum of Rank-Mobile, it gets ads not only on smartphones, but also on the less sophisticated feature phones.
Recent Articles:
Virtual Networks for Simulating Topologies
Often, system administrators, and for that matter, developers, have a need to test packets and code that utilizes a certain network design. Setting up and deploying a duplicate “test” network is usually beyond the resources of most organizations. Actually connecting routers and switches and machines together, configured for production and another configured for development, is very expensive considering the hardware needed to be purchased and installed and tested. Perhaps, even an organization wanting to make changes to the network, phasing in changes...

Deltacloud Could Change The Face Of Standard...
Contrary to popular rumors, Red Hat’s recent webcast was not to announce an imminent acquisition. Red Hat instead laid out an ambitious cloud strategy, going as far as claiming that only Microsoft and Red Hat are positioned...
Network Neutrality 101
This past week, Google and Verizon introduced a joint legislative proposal. Shortly thereafter, blogs and forums filled with buzz and chatter over this two-page document. Many of those blogs and posts were targeted at Google, claiming that they...
Evaluating A Network For VoIP Tech
The average company would probably prefer not to equip all of its employees with cell phones. Landlines can represent a nuisance, too, since long distance calls cost a fair amount. Fortunately, VoIP tech can act...
Other iEntry Business Resources:
-- NetworkNewz is an iEntry, Inc. publication --
iEntry, Inc. 2549 Richmond Rd. Lexington KY, 40509
2010 iEntry, Inc. All Rights Reserved Privacy Policy Legal