Mapping Drives

  • Thread starter Thread starter David
  • Start date Start date
D

David

First of all here is my setup:

Host: XP Pro (connects to internet + Firewall)

Computer 1: XP Pro, (client to host)
Computer 2 ME, (Client to host)
Computer 3 NT4SP2 (Client to host)
Computer 4 98SE (Client to host)

All computers connect to the host via a 10/100 hub and all work perfectly.

What I would like to know is if i map drives to and from the 4 client
computers to each other but i dont map the host computer if some one does
manage to get thru the firewall will they be able to access the other
computers and will a virus be able to transfer itself around the network
 
First of all here is my setup:

Host: XP Pro (connects to internet + Firewall)

Computer 1: XP Pro, (client to host)
Computer 2 ME, (Client to host)
Computer 3 NT4SP2 (Client to host)
Computer 4 98SE (Client to host)

All computers connect to the host via a 10/100 hub and all work perfectly.

What I would like to know is if i map drives to and from the 4 client
computers to each other but i dont map the host computer if some one does
manage to get thru the firewall will they be able to access the other
computers and will a virus be able to transfer itself around the network

David,

Hackers don't always require established network connections (mapped
drives) between computers to do their work. Neither do virii - some
virii transmit thru mapped drives, others make their own connections.

That said, keep established mapped drives / shares to a minimum, use
non-trivial userids and passwords on all computers, and don't
routinely login with administrative rights unless necessary.

Religiously use, and update, virus and spyware detection / protection
on all computers.

Harden your browser. See these websites for browser security
checking:
http://www.jasons-toolbox.com/BrowserSecurity/
http://bcheck.scanit.be/bcheck/sid-fd590083d396cca26ae66ad668620d0a/index.php
https://testzone.secunia.com/browser_checker/

Keep your operating systems up to date. Use Windows Update regularly.

A firewall on the host is a good start. Review the firewall logs
regularly, look for entries that don't belong.

Consider getting a NAT router to put between the host and the
internet. A NAT router and software firewall is NOT excessive
protection. NAT routers are available for dialup as well as broadband
internet access, and are just as necessary.

Cheers,

Chuck
I hate spam - PLEASE get rid of the spam before emailing me!
Paranoia comes from experience - and is not necessarily a bad thing.
 
Back
Top