Grabbing the Throttle; Tool Time; Attachment Security; and more

Grab the Throttle
I must say that Keith Ward’s editorial in the January issue, “Grab the Throttle,” hits home with me. I was always told that if you want something, you have to go get it, because no one is going to give you anything! Here’s an example: Working as a heavy equipment operator for over 20 years, I wanted to do something different and provide a better living for my family. I started taking night classes to get an MCSE in Windows NT 4.0. Many of the other students were head and shoulders better than I was at this stuff. I decided that if I wanted to get better at computers, I needed to be doing it eight hours a day and not just eight hours a week. I took an almost-$5 per hour paycut and started working as a support tech. After a year, the company saw my commitment, and I was offered a training position and a chance to launch Windows XP. I’m currently an MCSE and MCSA in Windows 2000 and working at a help desk. I still have dreams of being a network administrator. If you aren’t qualified, how do you get qualified? You have to be willing to grab the throttle!
—Jeff Wallen, via online
Arizona

I have a private pilot’s license, too. Nothing is better than buzzing the “padi fields” and coconut trees! My initial PPL was on a Cessna 172, and I loved every minute of it. Anyway, I think this new “Take Control” technique in the magazine is to help one improve, be more responsible, more alert, look at all options and always choose the best one. Everybody wants to move up, and here we’re being shown how. We all start as tech support or on a help desk and want to move to administrator, engineer or architect/consultant. So this new concept—and the articles—might help. Of course, there’s a lot of other stuff one needs to do before taking the big leap (such as specializing in a specific field, like security).
—Gill, via online
Singapore, Southeast Asia

Tool Time
I’m just beginning to look into auditing and policy management tools. I’ve heard of FAZAM, but are there other tools I should look at?
—Amy Bremer
Newton, Massachusetts

We’ve done a lot of work with both policy and auditing tools. In fact, we recently wrote a review of multiple policy and auditing tools, “12 Mighty Labors of Active Directory Management,” in the September 2003 issue. We also describe in-depth how you can perform these 12 mighty labors without commercial tools (online at: http://mcpmag.com/Features/article.asp?EditorialsID=361). Both articles will give you a better idea of what you need to do to manage an Active Directory.

As far as Fazam is concerned, it’s now integrated with NetIQ’s Security Administration Suite, which provides much more functionality than Fazam alone. You can also start by using the Microsoft Group Policy Management Console. The GPMC is free at www.microsoft. com/downloads and provides great support for Group Policy Management in AD.

Active Administrator from Small Wonders Software/ScriptLogic is also a useful tool in the arena of audit and policy management. It wasn’t included in our original review, but we think it bears a closer look if you want a commercial tool, because it seems to address both of your areas of concern.

It depends on the size of your network or the number of users and systems you need to manage, but our advice is this: Take a look at the GPMC first. It’s free and may well do most of what you need. If that doesn’t do it, move on to Active Administrator and/or Fazam.
—Nelson and Danielle Ruest

Attachment Security
If someone sends an e-mail attachment such as a text file using Yahoo e-mail, what are the security risks? Where is encryption initiated? If the file had been initiated from and received by machines with Windows XP, Outlook 2000 or later, and Internet Explorer 6.0 with all the latest service packs, does the attachment get encrypted? What is a good operating procedure for security of e-mail attachments?
—Wayne Henegar, MCP
Mt. Carmel, Illinois

By default, attachments aren’t ever encrypted, and most free e-mail Services, like Yahoo, don’t handle S/MIME, which is required for encryption. At best, you could ZIP and encrypt a file at the sender, in which case, it would remain encrypted until decrypted on the destination machine. But, you’re not sending a text file attachment at that point.

If you’re using Yahoo, the only way to ensure nobody can eavesdrop is to encrypt the file—using something like WinZIP or Windows XP’s own built-in compressed folders feature—on the sending machine, and then have the recipient decrypt it. You’ll need to provide the recipient with the ZIP file’s password to do so. Then everything in the ZIP will be encrypted through the entire process, even when sitting in Yahoo.

At best, what Yahoo does is employ SSL/TLS to encrypt the connection between your browser and the Yahoo servers. That means the data is encrypted while physically in transit, but not encrypted while sitting on Yahoo’s servers. Using something like WinZIP can offer a workaround.
—Don Jones

Taking Control
In reference to the January 2004 feature, “Taking Control of Your Users,” by Mark Wingard: very good article. I know because I can speak from experience. Our help desk calls have dropped significantly because we use a single image for computers and have also implemented a common operating environment. Using Windows XP with Group Policy Objects, we give users the tools needed to do their job, yet prevent them from shooting themselves in the foot. Standardization is the key to a smooth-running company and IT department.
—Houston Admin, via online
Houston, Texas

Wireless Tips
Thanks for the informative article in your January “Tips & Tricks” column, “Little-Known Wireless Facts.” You seem to be just the person to clarify a few questions my organization has concerning wireless.

I work on the Tech Support Team at The Summit Country Day School in Cincinnati. We have approximately 1000 students, faculty and staff of about 200 and around 700 computers. Of the 700 computers, we have 15 laptop carts of 16 to 20 machines and a laptop for each faculty member. The carts each have an access point and are wireless running 802.11b. We have about 10 other access points on campus (802.11b). Due to some major construction, several of our desktop labs are temporarily running on the wireless network, also.

Our problem and, I guess my question, concerns the use of 802.11g access points and the potential for improved throughput in real world usage. Currently we’re having fairly good success with wireless when users are just using the computers to read e-mail or surf (research). However, we’ve had some serious bottlenecks during times when many users are logging on for the first few times (getting new profiles) or when an entire class pushes print in order to submit a paper to a teacher just as class ends. When 16 users are all logging on at once, we have issues where the users’ mapped drives, and so on don’t always load properly, and the actual boot time is very long due to the battle for bandwidth the machines are waging. Similar problems occur when a lot of users print or try to access bandwidth intensive Web sites.

Would upgrading the laptop cart access points to 802.11g help to alleviate the bottleneck from the machines to the access point during the peak though put times? We really don’t have a problem with the network once the data gets past the access point. I understand that some APs slow down to 802.11 when used with the 802.11b cards. If this is correct, can they still handle the wireless data coming though the air at the wider bandwidth?
—Kevin Ross, MCSE, A+
Cincinnati, Ohio

802.11g would definitely help. All of the users are sharing one wireless “pipe.” By making that pipe bigger, they’ll be able to work more quickly.
The trick is that if there are any 802.11b clients within range of the 802.11g AP, then all 802.11g devices will operate at a slower, “mixed-mode” speed. It’s faster than b, but much slower than full g. The only way around that is to eliminate all b clients within range of the AP.
Glad you enjoyed the article!
—Don Jone
s

NTFS and Encryption
Thanks for pointing out the presence of the CvtArea option in Chris Brooke’s January’s “Scripting for MCSEs” column, “Build a Better NTFS Converter. I was unaware of that.

A minor nitpick, though... Without specifically enabling encryption for files, they won’t be more secure than on FAT32. ACLs are enforced by Windows, not the file system. With an NTFS-aware boot disk or a Linux boot disk, the file system is bare, and all security—except encryption—ineffective. If physical access to the drive is possible (like a stolen laptop) and you’re not using encryption, don’t depend on NTFS security features to protect that data. This goes for any unencrypted file system.

Encrypt those documents and spreadsheets if you want them secure—this is very important. If you’re not familiar with this, give it a try. Download that NTFS boot disk (not the Windows XP install disk; it enforces those permissions). You won’t need the admin password to mount the volume and you can read any file on the system. Any modern Linux CD should be able to do this, too.
—Phil, via online
Columbia, Missouri

Thanks, Phil. Actually, I did mention encryption in the column, but it was sort-of "in passing." Indeed, you’re correct: EFS is the only effective way to protect files in the event that someone gains physical access to the computer. Oh sure, you could enforce BIOS passwords and configure your BIOS to disable the floppy and CD-ROM. Of course, then all they need is a small screwdriver to remove the drive and place it in an external enclosure and they would once again have access. Thanks for pushing us to give EFS its due!
—Chris Brooke

About the Author

Have a question or comment about an article or letter that appeared in MCP Magazine?

comments powered by Disqus
Most   Popular