Chapter 23. Secure Computing Practices

In this chapter

Social Engineering

Trojan Programs

Switching Between Privileged and Non-Privileged Contexts

Other Secure Practices

In this chapter, you'll look at some global secure computing practices. Many of these "best practices" are not unique to Windows NT/2000, but rather global to computer security in general. In each section, you'll look at a threat class, common exploits, and what you can do to protect yourself.

Get Microsoft® Windows® 2000 Security Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.