Windows Security Basics: User Accounts
()
About this ebook
Computer security is of vital importance and knowledge of user accounts in Windows is fundemantal part of it. And many times, it is neglected. This book aims to fill a gap in the security and provides fundemental info about users, in both local user database and in domain database. You will see what a local user database is, its relation to the domain database, administrative groups in both databases. You will also see how to manipulate user accounts using classical commands and Powershell commands.
Murat Yildirimoglu
1964 yılında doğdum. 1988 yılında ODTÜ Elektrik/Elektronik Mühendisliği bölümünden mezun oldum. Mezuniyet sonrasındaki ilk iki yıldan sonra sürekli olarak bilgisayar alanında çalıştım. Bilgisayar alanında 7 kitabım var. Bir tanesi ("TCP/IP";) 15. baskısında bulunuyor. Cumhuriyet gazetesinin Bilim-Teknik ekinde, Bilim ve Gelecek dergisinde çok sayıda bilim konulu makalem yayınlandı. Uzmanlık alanımın, zor teknik konuları anlaşılır şekilde yazmak olduğunu düşünüyorum.
Read more from Murat Yildirimoglu
TCP/IP for Everyone Rating: 4 out of 5 stars4/5Windows Command Prompt Rating: 0 out of 5 stars0 ratingsInternet Information Services 8.5 Rating: 0 out of 5 stars0 ratingsInspiring Powershell Articles Rating: 0 out of 5 stars0 ratingsTwo Stories Rating: 0 out of 5 stars0 ratingsBilgisayar Dünyasından Portreler Rating: 5 out of 5 stars5/5
Related to Windows Security Basics
Related ebooks
20 Windows Tools Every SysAdmin Should Know Rating: 5 out of 5 stars5/5How to Setup a Windows PC: A Step-by-Step Guide to Setting Up and Configuring a New Computer: Location Independent Series, #4 Rating: 0 out of 5 stars0 ratingsMake Your PC Stable and Fast: What Microsoft Forgot to Tell You Rating: 4 out of 5 stars4/5LINUX FOR NOVICES: A Beginner's Guide to Mastering the Linux Operating System (2023) Rating: 0 out of 5 stars0 ratingsCompTIA Security+: Securing Networks Rating: 0 out of 5 stars0 ratingsHow to Cheat at Windows System Administration Using Command Line Scripts Rating: 0 out of 5 stars0 ratingsPractical Suggestions For Microsoft Windows Rating: 4 out of 5 stars4/5Comptia Network+ V6 Study Guide - Indie Copy Rating: 0 out of 5 stars0 ratingsSecuring Windows: How to Protect Your Computer Properly Rating: 0 out of 5 stars0 ratingsBash Command Line Pro Tips Rating: 5 out of 5 stars5/5PowerShell: A Comprehensive Guide to Windows PowerShell Rating: 4 out of 5 stars4/5The Complete Powershell Training for Beginners Rating: 0 out of 5 stars0 ratingsWindows 10 Rating: 5 out of 5 stars5/5Linux: A complete guide to Linux command line for beginners, and how to get started with the Linux operating system! Rating: 0 out of 5 stars0 ratingsAn Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5Computer Maintenance Hacks: 15 Simple Practical Hacks to Optimize, Speed Up and Make Computer Faster Rating: 5 out of 5 stars5/5Cisco Packet Tracer for Beginners Rating: 5 out of 5 stars5/5Practical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Basics with Windows Powershell Rating: 0 out of 5 stars0 ratingsSome Tutorials in Computer Networking Hacking Rating: 0 out of 5 stars0 ratingsA Big Security Fix and Performance Manual: The Essential Guide to Computer Security & Performance Rating: 0 out of 5 stars0 ratingsDebian: Try It; You'll Like It Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratingsWindows 10 errors All in One First Edition Rating: 3 out of 5 stars3/5Debian GNU/Linux : Guide to Installation and Usage Rating: 0 out of 5 stars0 ratingsThe Windows Command Line Beginner's Guide: Second Edition Rating: 4 out of 5 stars4/5
Security For You
Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratings
Reviews for Windows Security Basics
0 ratings0 reviews
Book preview
Windows Security Basics - Murat Yildirimoglu
Windows Security Basics:
User Accounts
By Murat Yildirimoglu
Copyright 2021 Murat Yildirimoglu
User accounts and databases are generally ignored when it comes it security. But it is vital to understand user accounts and databases from the security point of view.
Security is mainly about users: User definitions, user rights, permissions all mean security.
Because security is mainly about users, the number one requirement for a secure system is entering a valid username and password in order to use a computer system.
Windows 95-98-Me operating systems were not secure because entering a username and password was not compulsory on the logon screen; you could juts press the Cancel key on the logon screen and voila, you were in.
On the other hand, in NT series operating systems (NT, 2000, XP, 2003, Vista, 2008, 7, 2012, 8, 10, 2016,2019) you can press Cancel on the logon screen but when you do so, you cannot enter into to the system.
Local User Database
If NT series operating systems make it a requirement to enter a valid username-password then there must be a user database where those valid username-password info is stored. So, all NT series have a local bir user database. The name of the local user database is SAM (Security Accounts Manager) and it is stored in a file named again SAM. SAM
file resides under \Windows\System32\Config folder and it is a very small