Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Windows Security Log - Wikipedia

    en.wikipedia.org/wiki/Windows_Security_Log

    Windows Security Log. The Security Log, in Microsoft Windows, is a log that contains records of login/logout activity or other security-related events specified by the system's audit policy. Auditing allows administrators to configure Windows to record operating system activity in the Security Log. The Security Log is one of three logs viewable ...

  3. Security Identifier - Wikipedia

    en.wikipedia.org/wiki/Security_Identifier

    Security Identifier. In the context of the Microsoft Windows NT line of operating systems, a Security Identifier ( SID) is a unique, immutable identifier of a user, user group, or other security principal. A security principal has a single SID for life (in a given domain), and all properties of the principal, including its name, are associated ...

  4. Local Security Authority Subsystem Service - Wikipedia

    en.wikipedia.org/wiki/Local_Security_Authority...

    Local Security Authority Subsystem Service ( LSASS) [1] is a process in Microsoft Windows operating systems that is responsible for enforcing the security policy on the system. It verifies users logging on to a Windows computer or server, handles password changes, and creates access tokens. [2] It also writes to the Windows Security Log .

  5. Event Viewer - Wikipedia

    en.wikipedia.org/wiki/Event_Viewer

    Event Viewer is a component of Microsoft 's Windows NT operating system that lets administrators and users view the event logs, typically file extensions .evt and .evtx, on a local or remote machine. Applications and operating-system components can use this centralized log service to report events that have taken place, such as a failure to ...

  6. Nikto (vulnerability scanner) - Wikipedia

    en.wikipedia.org/wiki/Nikto_(vulnerability_scanner)

    There are some variations of Nikto, one of which is MacNikto. MacNikto is an AppleScript GUI shell script wrapper built in Apple's Xcode and Interface Builder, released under the terms of the GPL. It provides easy access to a subset of the features available in the command-line version, installed along with the MacNikto application.

  7. Windows Script Host - Wikipedia

    en.wikipedia.org/wiki/Windows_Script_Host

    Windows Script Host overview. The Microsoft Windows Script Host ( WSH) (formerly named Windows Scripting Host) is an automation technology for Microsoft Windows operating systems that provides scripting abilities comparable to batch files, but with a wider range of supported features. This tool was first provided on Windows 95 after Build 950a ...

  8. Features new to Windows XP - Wikipedia

    en.wikipedia.org/wiki/Features_new_to_Windows_XP

    Windows XP improves DPAPI security by encrypting the Master Key using an SHA1 hash of the password. This also improves the security of data encrypted with Encrypting File System. PKI support. Windows XP PKI supports cross-certification and Bridge CA scenarios. User-type certificates can be auto-enrolled and renewed.

  9. Windows Metafile vulnerability - Wikipedia

    en.wikipedia.org/wiki/Windows_Metafile_vulnerability

    The Windows Metafile vulnerability —also called the Metafile Image Code Execution and abbreviated MICE —is a security vulnerability in the way some versions of the Microsoft Windows operating system handled images in the Windows Metafile format. It permits arbitrary code to be executed on affected computers without the permission of their ...