Securing a Public Workstation Under Windows 9x VUGM-1999 Rider University Libraries Edward Corrado & Dr. Sharon YangSlide 2
Edward M. Corrado, MLS Unix Administrator/Library Systems Manager - Rider University Libraries MLS, Rutgers University-1997 BA, Mathematics, Caldwell College-1992 firstname.lastname@example.orgSlide 3
Sharon Yang Systems Librarian at Rider University DLS, Columbia University-1997 MS, Columbia University-1988Slide 4
Outline of the Presentation Purpose of the Presentation Batsh System Policy Editor TweakUI NetscapeSlide 5
Outline of the Presentation Fortres 101 Winselect Everybodyâs Menu Builder Ghost ConclusionSlide 6
Just a Reminder! The presentation speaks the truth the security of a workstation, not that of a server. The presentation speaks the truth our involvement with Rider. It is not planned to be an inside and out instructional meeting on security programming. This is an outline of the devices we utilize. What we do to secure a Voyager OPAC may be not the same as what you do. What we do may not be essentially the âbestâ route for your circumstance .Slide 7
The Presentation\'s Purpose Present the issue of security on an open workstation Share our involvement with Rider Introduce new apparatusesSlide 8
This is our main event for a Voyager OPAC Workstation Batsh Program Windows System Policy Editor NetscapeSlide 9
Bios (CMOS) secret key settings To anticipate changing of framework settings to keep the setting of (obscure to you) passwords can be utilized with settings to keep booting from floppySlide 10
Bios (CMOS) watchword - boot Prevent unapproved booting of PCSlide 11
Autoexec.bat Can be utilized to naturally duplicate records that supporters may have changed when the PC is begun bookmarks wallpaper and so onSlide 12
What is BATSH.EXE for? To run WINDOWS charges from a content document. Line by Line. Like BATCH (.BAT) records in DOS, however with a few WINDOWS particular charges, and not every one of the DOS highlights.Slide 13
What O/Sâs does BATSH.EXE keep running on? Windows 3.1 Windows 95 Windows NT Windows 98 ?Slide 14
How and why Rider University utilizes BATSH.EXE? BATSH.EXE replaces EXPLORER shell on OPAC PCs (both Windows based Voyager and Netscape) This diminishes the potential security perils that the Explorer shell has. Can likewise be utilized to guide system drives The Price is Right - Freeware!Slide 15
Why not simply utilize the application as the shell? Harder to change between applications Windows won\'t close down effectively with most applications as a shellSlide 16
Batsh on Voyager Workstation Batsh scripts are utilized to consequently dispatch any project we picked on startup The batsh script does not permit supporters from leaving a system. In the event that they attempt, they will be incited for a secret word. On the off chance that the wrong secret word is entered, or a watchword isnât entered in a set measure of time, batsh will naturally re-dispatch the project.Slide 17
Where is BATSH.EXE? Composed by Thomas Nyffenegger http://www.fmi.ch/bunches/ThomasNyffenegger/Group.html On different freeware destinations on the Net: http://www.winsite.com Our batsh scripts will be made accessibleSlide 18
What is System Policy Editor? Framework Policy Editor is a program that goes ahead the Windows 95/98 CD-ROM when you purchase the OS. It is utilized to control a userâs desktop environment. In Rider library we utilize it to secure a free workstation, for example, a voyager OPAC terminal. It does the occupation effectively.Slide 19
Where is System Policy Editor? Framework Policy Editor for Windows 95 is situated on Windows 95 CD-ROM in D:\admin\apptools\poledit. Framework Policy Editor for Windows 98 is on Windows 98 CD-ROM in d:\tools\reskit\netadmin\poledit. Framework Policy Editor for Windows NT comes in the server programming bundle.Slide 20
h ttp://www.microsoft.com/Windows95/downloads/substance/WUAdminTools/S_WUManagementTools/W95PolicyEditor/Default.asp System Policy Editor for Windows 95 Or you can download System Policy Editor for Windows 95 from the Microsoft site at the above URL. It is less demanding on the off chance that you seek the decisive words âsystem strategy editorâ at the site.Slide 21
ht tp://www.microsoft.com/items/msoffice/Project/PRK/content/appa.htm System Policy Editor for Windows 98 You can download it for Windows 98 at the above URL. It is less demanding in the event that you seek the site by essential words âsystem arrangement editorâ.Slide 22
Workstation security Customize your desktop as per your wishes Hide different symbols as required Hide the DOS provoke Not permit clients to change any settings and setups Only permit clients to utilize open workstations for assigned library purposes What Do We Use It for?Slide 23
How would we utilize Policy Editor? For Windows 95 Create an index on C:\ drive Copy every one of the records from the Windows CD to that registry Start the project c:\directory\Poledit.exe Delete the catalog where all the strategy documents are found Or you can run it from a CD drive or system drive as you needSlide 24
How would we utilize Policy Editor? For Windows 98 Go to Control Panel and introduce System Policy Editor in Add/Remove Programs Run Poledit from Windows Run Box Set up the framework approaches Either evacuate the System Policy Editor or conceal it after the setupSlide 25
How would we utilize Policy Editor? Incapacitate Display Icon in the Control Panel This is the thing that you may do on the off chance that you donât need clients to change your presentation settings in the control board, for example, shading plans, invigorate rates, determination. You may not need clients to change the foundation, screen savers, Window textual style, either.Slide 26
How would we utilize Policy Editor? Cripple Network Icon in the Control Panel This is the manner by which you impair Network symbol in the control board. System symbol has all the correspondence settings for the system. You ought not permit clients to play with them uninhibitedly.Slide 27
How would we utilize Policy Editor? Debilitate Password Icon in the Control Panel This is the way you cripple Password Icon in the Control Panel. Clients can change windows secret word here.Slide 28
How would we utilize Policy Editor?Slide 29
How would we utilize Policy Editor? Cripple Printing settings It is vital to incapacitate printing arrangements.Slide 30
How would we utilize Policy Editor? Handicap System Icon in the Control Panel This is the way you impair System Icon in the Control Panel. Framework Icon contains vital data about equipment and related settings. You ought not permit clients to have admittance to it.Slide 31
How would we utilize Policy Editor? Modify your desktop surroundings by supplying your own tweaked settingsSlide 32
How would we utilize Policy Editor? Some different arrangements that you can set up Those are a setup\'s portion parameters in System Policy Editor that we utilize regularly.Slide 33
How would we utilize Policy Editor? In Rider Library Electronic Computer Lab we utilized a solitary framework approach record from a focal area for all the customer PCs. Initially we made a solitary strategy document on one PC. At that point we put that strategy record on our server. We arranged every customer PC to indicate the approach\'s area document on the server. At the point when clients sign on to the system, the framework arrangements from the record will produce results.Slide 34
What is Power Toy TweakUI? TweakUI is a program that you can download from Microsoft site at http://www.microsoft.com/windows95/downloads/. It is a piece of Windows Power Toys Set. Some of its elements empower us to do things that System Policy Editor can\'t help us to do. We utilize it in mix with System Policy Editor to secure a PC.Slide 35
How would we utilize TweakUI? TweakUI is a valuable device to help us naturally logon to our system. It spares us a great deal of time as we have more than thirty open terminals to turn on every morning.Slide 36
How would we utilize TweakUI? Framework Policy Editor can conceal every one of the drives in My Computer, however that is not what we need. We just need to conceal system drives. TweakUI can help us to do it. You should simply to set up System Policy Editor first and after that set up TweakUI as appeared on this slide.Slide 37
Netscape SecuritySlide 38
Netscape Security Preferences Most settings are under Preferences Controlled by Prefui32.dll C:\Program Files\Netscape\Program\ Communicator\Program\Prefui32.dll Delete or RenameSlide 39
Netscape Security Netscape Client Customization Kit (CCK) Preset inclinations including bookmarks, landing page, and so on while doing an introduce lock in inclination settings (landing page, reserve, intermediary settings, and so on.) http://home.netscape.com/accomplices/dissemination/custom/product.htmlSlide 40
Netscape Security Misson Control Dektop Third Party Security programming: IkioskSlide 41
A Rider Voyager Workstation To compress: Batsh: Launch Netscape and Webvoyage or Voyager Windows Client on startup and keep any unapproved way out Netscape: Webvoyage and Internet assets Policy Editor: confine access to Windows settingsSlide 42
Other programming for securitySlide 43
What is Fortres 101? Fortres 101 is a desktop security programming for Window NT, Windows 95, and Windows 98. You can discover data about it at http://www.fortres.com. It is anything but difficult to utilize and all around archived. It offers numerous choices that System Policy Editor and TweakUI donât have.Slide 44
Fortress 101Slide 45
How does Fortres 101 work? Eradicate a userâs name from logon handicap any symbols on desktop Put a secret word on symbols Central Control Service Restrict URLs Protect records and drives oversee bunch securitySlide 46
What is Winselect Kiosk? Winselect Kiosk is another security programming. We utilize it to secure Netscape and Internet Explorer.Slide 47
Where is Winselect Kiosk?Slide 48
How would we utilize it?Slide 49
What is Everybodyâs Menu Builder? Everybodyâs Menu Builder is a menu f
Windows 7 – Is it truly better? HELIX 2010 Tom Cupples, Ed.D., CISSP Friday, Walk 19, 2010 Pre ...
IPv6 and Microsoft Windows Bill Cerveny Windows 2000 Windows 2000 with Administration Pack 1 int ...
Main 10 Controls to Review in Windows Server Randy Franklin Smith, CISA, SSCP, Security MVP Mont ...
WINDOWS Inserted Understudy CHALLENGE Rivalry Juan E. Vargas, Ph. D. ( email@example.com ) Sch ...
Area client account. Made on a space controller utilizing
7. Select Windows 98 and Press [Next>] 8. Search legitimate area and ... (1) The 4-digit 7-porti ...
Against Virus Business Optimal for CheckPoint Node. Business Optimal ... Against Virus Business ...
Programming still intended for single client no security. Must run programming as administrator. ...
The BIOS finds the first part of the first hard commute which contains the Master Boot ... On th ...
Associate with corporate email with Outlook on the Phone, keep individual and business email sep ...
3. Windows XP Network Overview. Most adaptable Windows working framework ... MCSE Guide to Micro ...
7/13. Windows Vista Ultimate. Every one of the components in Vista Home Premium ... Can buy over ...
Can buy overhaul duplicate for Windows 2000 Professional and Windows XP ... XP Pro. 64-bit. No. ...
Track the majority of your wellness movement and screen your advancement with ... workouts. Outl ...
Design for Elderly and Disabled Environments: . Windows Part 3 of 10. Making Homes More Com ...
Understanding the Goals of Workstation Arrangement. ComfortProductivityNeutral But Changing Post ...