REPOST: A simple way of distributing a VPN client installation is to create one with CMAK (Found on your WIndows 2003 CD), even though this is mostly aimed at Microsofts ISA server VPN it should work fine with other providers (supports L2TP and PPTP). Its fairly easy to get started and you end up with a single .exe file you can distribute to your users. One minor glitch seem to be in regard to DNS, you may need to configure a script to deal with this (to ensure that the PPP adapter is the first in the search path. There is a lot more on this in the links below. Anyway, here is a few links to get you started; http://blog.msfirewall.org.uk/2008/06/using-cmak-to-configure-isa-server-vpn.html http://blog.msfirewall.org.uk/2008/06/using-cmak-to-configure-isa-server-vpn_10.html http://www.carbonwind.net/ISA/VPNQ2006/vpnq2006_4.htm https://207.46.19.190/windows/windows2000/en/advanced/help/cmak_ops_65.htm http://www.isaserver.org/img/upl/vpnkitbeta2/cmak.htm

UAC

Many people are tired of the UAC (what is UAC) warnings that pop up ever so often in Windows Vista, every time administrator privileges are required you will be prompted if its ok..  Safer than XP, yes for sure, but also annoying – why can’t it learn like the firewall that only prompts once..  I thought about turning UAC off (which is fairly easy) but again I like the added security.

Well Norton to the rescue, Norton is developing a UAC replacement (free for now) that actually will give you the option to answer “Always allow” to those UAC questions, and if you have a shortcut you launch often its annoying like hell to have to approve it EVERY time – but Norton allegedly solves this by letting you “Always allow” and hence only considder the threat once.  Neat..

More info and free download at;
http://www.nortonlabs.com/inthelab/uac.php

If you are at all interested in IT-Security then YOU NEED to get a load of this, Paul Craig’s omnibus experience (a podcast from Kiwicon) brought to you by Patrick Gray http://www.it-radio.com.au/, its awesome and extremely funny.

Paul Craig is a security consultant whom in his Omnibus experience explain how he created 1) A kiosk attack tool 2) Hacked a botnet (and got a lot of interesting and funny information) 3) Wrote his own WMI trojan (yes he actually utilized WMI for this one – scary – PLUS it will verbally insult you, you really MUST hear the podcast its so funny).

Makes you think, hmm WMI very usefull but maybe a bit overlooked in regard to security.

Links;
http://itradio.com.au/security/?p=98
http://ha.cked.net/projects.html

http://www.mls.id.au/