GPO Access Service, Is Now Accessible Via the Internet's World Wide Web At

Total Page:16

File Type:pdf, Size:1020Kb

GPO Access Service, Is Now Accessible Via the Internet's World Wide Web At ADMINISTRATIVE NOTES Newsletter of the Federal Depository Library Program Vol. 17, no. 08 GP 3.16/3-2:17/08 June 15, 1996 Federal Bulletin Board Now Has World Wide Web Access The Federal Bulletin Board (FBB), a featured component of the U.S. Government Printing Office's (GPO) award-winning GPO Access service, is now accessible via the Internet's World Wide Web at: http://fedbbs.access.gpo.gov The Federal Bulletin Board is an electronic bulletin board service (BBS) that enables Federal agencies to provide immediate, self-service access to Government information in a variety of electronic formats and subject areas. Currently, more than 25 agencies representing all three branches of the Federal Government provide more than 7,500 files of Government information via the FBB. FBB files include information from the White House and Executive Branch agencies (ranging from the Departments of State and Treasury to the Office of Foreign Assets Control, the Merit Systems Protection Board and the Federal Labor Relations Authority). Supreme Court opinions and files from other Judicial Branch agencies are also available. The FBB Web server also contains information on the Federal Depository Library Program at: http://fedbbs.access.gpo.gov/fdlp01.htm FTP, Telnet and dial-in access are also available to the FBB: FTP and Telnet: fedbbs.access.gpo.gov Dial-in:(202)512-1387 (Settings: BAUD 300-14,400 bps, 8 bits, no parity, and 1 stop bit, full duplex) The FBB is but one component of the GPO's award-winning GPO Access service. Users of GPO's almost two-year-old online service are now downloading and retrieving documents at a rate of more than two million per month. GPO Access received the 1994 Federal Technology Leadership Award and the 1995 James Madison Award. In addition to access to the FBB, GPO Access features access to key, daily-updated Federal databases, including the Federal Register, Congressional Bills, the Congressional Record, GILS Records, GAO Reports, the U.S. Code and a growing list of additional databases. 1 AN-v17-#08-06/15/96 GPO Access databases are available for searching at: World Wide Web: http://www.access.gpo.gov/su_docs/aces/aaces001.html Telnet: swais.gpo.gov (login as guest) Dial-in: (202) 512-1387 (type swais; login as guest) For further information or assistance, contact the GPO Access User Support Team at: E-mail: [email protected] Phone: (202) 512-1530 Fax: (202) 512-1262 List of Classes Now Available Online The List of Classes in now available in electronic format on the Federal Bulletin Board, by anonymous FTP and through the World Wide Web. The Web address for the List of Classes is: http://fedbbs.access.gpo.gov/libs/class.htm The FTP address is: fedbbs.access.gpo.gov Select the subdirectory CLASS. There are two files available in this "file library" (subdirectory): APPENDIX.DOC01/13/95 24350 bytes (downloads 67) Listing of Government Authors Keywords: government authors gpo lps depository libraries LISTCLAS.TXT05/03/96 873189 bytes (downloads 371) List of Classes, May, 1996 This is an ASCII, comma delimited file that lists the classes offered depository libraries. The List of Classes is usually uploaded on the first Friday of each month. Keywords: depository libraries gpo lps classes For assistance, contact the GPO Access User Support Team, as shown above. 2 AN-v17-#08-06/15/96 3 AN-v17-#08-06/15/96 Spaces Available for GPO Access Training In New York and Indianapolis Space is still available at the GPO Access training sessions in New York City and Indianapolis, IN in July. The training sessions are scheduled in conjunction with the annual conferences of ALA in New York and AALL in Indianapolis. New York Schedule Monday, July 8 and Tuesday, July 9 New York Public Library Science, Industry and Business Library Electronic Training Center 188 Madison Avenue (34th & 35th Streets and Lexington Ave.). two sessions each day: 8:30 a.m.- 11:30 a.m. 1:00 p.m.- 4:00 p.m. Indianapolis Schedule Thursday, July 18 Indiana University-Purdue University at Indianapolis University Library, Room 0106 755 West Michigan St. Indianapolis, IN two sessions: 9:00 a.m.- noon 1:30 p.m.- 4:30 p.m. If you are interested please register as soon as possible by contacting: John Berger, Marketing Specialist Office of Electronic Information Dissemination Services [email protected] Fax: (202) 512-1262 Tel: (202) 512-1525 4 AN-v17-#08-06/15/96 Updated Depository Library Directory Now Available on the Federal Bulletin Board An updated depository library directory is available on the Federal Bulletin Board. The profile information was compiled from data supplied by the nearly 1,400 Federal depository libraries on the 1995 Biennial Survey. Each profile contains the depository library number, congressional district, name, address, city, state, and zip code. The depository type (selective or regional); library type (land-grant, public, law, etc.); and year of designation are included. Each record also contains the names of the library director and documents librarian, the documents librarian's and public service phone number, and the fax number. This free file is available in both ASCII and database formats. The file is updated irregularly as additions and changes are reported to the Library Programs Service. To access the FBB, dial: (202) 512-1387 ( 8 N 1 full duplex) Telnet to: fedbbs.access.gpo.gov FTP: ftp://febbbs.access.gpo.gov From the FBB main menu, key: <I> (Federal Depository Library Information) From the Federal Depository Library Program files, key: <1> (Depository Library files) From that screen, press: <D> At the prompt, key in: <profile.dbf> or <profile.txt> At the next prompt, key in download option. Via GPO's Web site, type: http://fedbbs.access.gpo.gov Click on Federal Depository Library Information Click on Depository Library Profiles Click on either profile.dbf or profile. txt. (To update the record for your depository library, please use the form on the next page.) 5 AN-v17-#08-06/15/96 Depository Directory Update Form Depository Library Number: Congressional District: Institution Name: Library Name: Street Address: City: State: Zip+4: Library Director's Name: Documents Librarian's Name: Documents Librarian's Phone Number: Public Service Phone Number: E-mail address: Mail, fax, or e-mail this form to: Chief, Depository Services Library Programs Service (SLLD) U.S. Government Printing Office Washington, DC 20401 Fax: 202-512-1432 e-mail: [email protected] Fax Machine Phone Number: 6 AN-v17-#08-06/15/96 GPO Provides Web Access to U.S. Federal GILS Records Do you need help in finding U.S. Government information for yourself or others? The U.S. Government Printing Office (GPO) Superintendent of Documents has created a Government Information Locator Service (GILS) Web site as part of its award-winning GPO Access service. The GPO Access GILS site can help you identify sources of Federal information, learn more about the information available from these sources, and provide assistance in obtaining the information. It allows you to search and retrieve GILS records for 25 Federal agencies. It also contains records that point to other GILS sites, records designed to serve as pathways to sources of information in all cabinet-level and major independent Federal agencies, and Privacy Act Notices for all Federal agencies. Each GILS record presents a thorough description of the information resource, including: - - What information is available and why it was created; - - How the information is made available for use; - - Whom to contact for further information; - - In some cases, a direct electronic link to the information itself is provided. The GPO Access GILS site was designed to allow for searches of all records on the site or individually by agency. Browse options are also available for the Pathway and Pointer records. Using the default selection to search all GILS records on the GPO Access GILS site allows you to locate information resources even if you do not know which agency may produce the information you need. All individual GILS records and Pointer records on the GPO Access GILS site were created by the agencies themselves and will be updated by those agencies. The Pathway records were created by the Superintendent of Documents Library Programs Service and will be maintained by that organization. To use the GPO Access GILS site, point your browser to: http://www.access.gpo.gov/su_docs/gils/gils.html If you do not have World Wide Web access, this site can also be reached through: - - WAIS client software directed to Host: wais.access.gpo.gov Port: 210 Database: GILS - - Telneting to swais.access.gpo.gov (login as guest) - - Dialing in to (202) 512-1661 (login as guest) 7 AN-v17-#08-06/15/96 This GILS site is one of many information retrieval applications available through GPO Access. To find out more about what is available: - - Try the Superintendent of Documents Home Page at http://www.access.gpo.gov/su_docs - - Contact the GPO Access User Support team via e-mail: [email protected] telephone: (202) 512-1530 FAX: (202) 512-1262 GPO Access: 1996 Unified Agenda Database Now Available Online The first issue of the 1996 Unified Agenda (also known as the Semi-Annual Regulatory Agenda) was published in the May 13, 1996 issue of the Federal Register. It went up simultaneously as a GPO Access database with documents available in both ASCII text and Adobe Acrobat PDF files. The Unified Agenda database is a wonderful tool for identifying future regulatory actions, by the issuing agency, topic or CFR part affected. Executive Order 12291 (46 FR 13193) and the Regulatory Flexibility Act (5 U.S.C.
Recommended publications
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • Bulletin Board System (BBS) for a VAX/VMS Multi-User Environment
    - Bulletin Board System (BBS) for a VAX/VMS Multi-User Environment An Honors Thesis (HONRS 499) by J. Kevin Cooper Advisor: Dr. Earl H. McKinney Ball State University Muncie, Indiana May 1995 Graduation Date: May 6, 1995 - Abstract Overview The BBS (Bulletin Board System) software is a client/server model running on a VAX/VMS com puter system, which allows both interactive, user-friendly access to file bases and online discussion groups, and a versatile database environment with comprehensive security features. This system has been tailored to be platform-independent in its information transfer protocol, while using the specifics of the operating system to benefit both the appearance of the user interface and the efficiency of database m anagem ent. I have attempted to interweave as much functionality as feasibly possible into this project, as to demonstrate what I have learned through the Computer Science program here at Ball State University, as well as through my internship position as a VAX system technician and programmer S.t University Computing Services. Tools Used This project was written using the following software on University-owned VAX machines: DEC Pascal v4.2 for VMS DEC set Module M anagem ent System v2.5 MultiNet -v3.2 shareable TCPIIP network library Open VMS VAX Operating System v6.0, v6.1 This system makes use of system resources such as the VMS Command Language Interpreter (CLI), VMS Message Utility, Run-time Screen Manager Library (SMG), Record Management Services (RM8), and MultiNet's linkable TCP/IP socket library. Acknowledgem ents I would like to thank Dr.
    [Show full text]
  • Guide to Protecting Your Computer &Your Identity for Students
    INFORMATION SECURITY THREATS Identity theft • a form of stealing another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft can suffer adverse financial and criminal consequences if they are held accountable for the perpetrator's actions. Keylogger • software that records everything you type while simultaneously sending it to a covert, remote listening agent. GUIDE TO PROTECTING YOUR Malware • a general term used to describe malicious software designed to trick a computer user or infiltrate or damage a computer. Pharming • a hacker's attack aiming to redirect a website's traffic to fraudulent site, COMPUTER & YOUR IDENTITY often used to mimic legitimate and authoritative sites (e.g. banking, anti-virus). Phishing • deceptive attempt to acquire sensitive information (i. e. usernames, passwords, and credit card details) by an agent masquerading as a trustworthy @ CCNY entity in an email or instant message, or via a web site or telephone call. Rootkit • a stealthy type of malicious software designed to hide the existence of certain processes or programs from normal methods of detection and enables continued FOR STUDENTS privileged access to a computer, uses adaptive behavior to avoid detection and remediation. Spam • the use of electronic messaging systems to send unsolicited bulk messages indiscriminately. Basically junk email. Spyware/ Adware • malware or marketing software whose principal aim is to surreptitiously collect information by “spying” on the user. Trojan • disguised malware that appears to perform a benign or normal action but in fact performs a malicious action, such as transmitting a computer virus.
    [Show full text]
  • Yubikey OS X Login
    yubico YubiKey OS X Login Via Yubico-PAM Challenge-Response Version 1.5 October 12, 2015 YubiKey OS X Login © 2015 Yubico. All rights reserved. Page 1 of 18 yubico About Yubico As the inventors of the YubiKey®, Yubico sets new world standards for secure login across the Internet. Our unique USB and NFC key offers one-touch strong authentication supporting multiple authentication protocols for all devices and platforms - with no driver or client software needed. With successful enterprise deployments in 140 countries, including 7 of the top 10 Internet companies, Yubico is adding the consumer market to its list of strong authentication converts. Founded in 2007, Yubico is privately held with offices in Palo Alto, Calif., Stockholm, and London. For more information visit yubico.com Disclaimer The contents of this document are subject to revision without notice due to continued progress in methodology, design, and manufacturing. Yubico shall have no liability for any error or damages of any kind resulting from the use of this document. The Yubico Software referenced in this document is licensed to you under the terms and conditions accompanying the software or as otherwise agreed between you or the company that you are representing. Trademarks Yubico and YubiKey are trademarks of Yubico Inc. Contact Information Yubico Inc 459 Hamilton Avenue, Suite 304 Palo Alto, CA 94301 USA yubi.co/contact YubiKey OS X Login © 2015 Yubico. All rights reserved. Page 2 of 18 yubico Contents About Yubico ......................................................................................................................................
    [Show full text]
  • Accessing Learning Applications Using a Personal Computer
    Pittsburgh Public Schools Accessing Learning Applications Using a Personal Computer Clever, Microsoft Teams and Schoology Pittsburgh Public Schools | 341 S Bellefield Ave Pittsburgh PA 15213 Support: 412-529-HELP (4357) | [email protected] Logging into Microsoft Teams You may use any browser to navigate to portal.office.com. 1. Enter your PPS email address and select ‘Next’. 2. You will then be prompted to enter in your PPS password. 3. Select the ‘Teams’ icon. *Note: There is also a link to Microsoft Teams inside of your Clever portal. View the next page to learn how to log into Clever. Page 2 Logging into Clever *Brower Requirement: Users must use Firefox, Edge or Chrome. 1. Download the Clever extension You will need to download the extension so that you will be able to access additional Clever resources once you get in. This is a one-time process. Instructions for Google Chrome Instructions for Mozilla Firefox Instructions for Microsoft Edge You will know that you have the Clever extension applied if you see a small Clever icon in the upper right-hand corner of the browser. *Note: If you fail to apply the Clever extension, you will be asked a second time when you attempt to log into any application that requires a district password. Do not update any passwords if prompted, just click on the Clever Extension link provided and download the extension. After you have downloaded the extension, return to the login page to resume accessing the application. Page 3 2. Navigate to www.pghschools.org and Select Clever in the Find it Fast menu You can also navigate directly to www.pghschools.org/clever Staff can also access Clever at mypps.sharepoint.com under the Web Tools menu.
    [Show full text]
  • Advanced Authentication 6.3 Mac OS X Client Installation Guide
    Advanced Authentication 6.3 Mac OS X Client Installation Guide Decemeber 2019 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see http://www.microfocus.com/about/legal/. © Copyright 2019 Micro Focus or one of its affiliates. 2 Contents About this Book 5 1 System Requirements 7 2 Offline Support for Mac OS X Client 9 3 Configuring the Preliminary Settings 11 Configuring the Mandatory Settings . .11 Setting-up a DNS for Advanced Authentication Server Discovery . .11 Using a Specific Advanced Authentication Server in the Non-DNS Mode . .15 Enabling Remote Login . .16 Configuring the Optional Settings . .16 Disabling 1:N . .17 Configuration Settings for Multitenancy . .17 Customizing a Logo . .18 Configuring Time-Out for Card Waiting . .18 Configuring Time-Out for the U2F Authentication . .19 Selecting an Event . .19 Configuring to Verify Server Certificates . .19 Enabling the Authentication Agent Chain . .20 Configuring the Enforced Cached Logon . .20 Binding Mac to Active Directory. .21 Enabling the Offline Mode . .22 Displaying Other User on the Login Screen in Non-Domain Mode . .22 Creating a Mobile Account for the Offline Mode . .23 Displaying the Authentication Window on Unlock Screen. .23 Configuring the TLS Version . .23 Disabling Linked Chains for Offline Login. .24 Enabling the Profiling Tool . .24 Localizing the Messages for Clients . .25 Configuring in Case of Advanced Authentication as a Service . .26 Configuring to Connect Via HTTP Proxy. .27 4 Installing and Uninstalling Mac OS X Client 29 Installing Mac OS X Client. .29 Uninstalling Mac OS X Client .
    [Show full text]
  • Blue Prism 6.10 Login Agent User Guide
    Blue Prism 6.10 Login Agent User Guide Document Revision: 1.0 Blue Prism 6.10 | Login Agent User Guide Trademarks and Copyright Trademarks and Copyright The information contained in this document is the proprietary and confidential information of Blue Prism Limited and should not be disclosed to a third-party without the written consent of an authorized Blue Prism representative. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying without the written permission of Blue Prism Limited. © Blue Prism Limited, 2001 – 2020 ®Blue Prism is a registered trademark of Blue Prism Limited All trademarks are hereby acknowledged and are used to the benefit of their respective owners. Blue Prism is not responsible for the content of external websites referenced by this document. Blue Prism Limited, 2 Cinnamon Park, Crab Lane, Warrington, WA2 0XP, United Kingdom. Registered in England: Reg. No. 4260035. Tel: +44 870 879 3000. Web: www.blueprism.com Commercial in Confidence Page ii Blue Prism 6.10 | Login Agent User Guide Contents Contents TradeCo ntents ma rks andCo p y righ t Login Agent 1 Security policies 2 Ctrl + Alt + Del – Secure Attention Sequence 2 On-screen pre-login message 3 Display lock screen 3 Install Login Agent 4 Editions of Login Agent 4 Distributable files 4 Prerequisites 4 Install Blue Prism Login Agent 5 Command line installation 7 Advanced installation and configuration 8 Update or customize the Login Agent configuration 8 Set the Blue Prism connection
    [Show full text]
  • Mac OS X Server User Management for Version 10.4 Or Later Second Edition
    Mac OS X Server User Management For Version 10.4 or Later Second Edition K Apple Computer, Inc. Apple, the Apple logo, AirPort, AppleShare, AppleTalk, © 2006 Apple Computer, Inc. All rights reserved. FireWire, iBook, Keychain, LaserWriter, Mac, Mac OS, Macintosh, PowerBook, and QuickTime are trademarks The owner or authorized user of a valid copy of of Apple Computer, Inc., registered in the U.S. and other Mac OS X Server software may reproduce this countries. Extensions Manager, Finder, and SuperDrive publication for the purpose of learning to use such are trademarks of Apple Computer, Inc. software. No part of this publication may be reproduced or transmitted for commercial purposes, such as selling Adobe and PostScript are trademarks of Adobe Systems copies of this publication or for providing paid-for Incorporated. support services. Java and all Java-based trademarks and logos are Every effort has been made to ensure that the trademarks or registered trademarks of Sun information in this manual is accurate. Apple Computer, Microsystems, Inc. in the U.S. and other countries. Inc., is not responsible for printing or clerical errors. UNIX is a registered trademark in the United States and Apple other countries, licensed exclusively through X/Open 1 Infinite Loop Company, Ltd. Cupertino, CA 95014-2084 408-996-1010 Other company and product names mentioned herein www.apple.com are trademarks of their respective companies. Mention of third-party products is for informational purposes Use of the “keyboard” Apple logo (Option-Shift-K) for only and constitutes neither an endorsement nor a commercial purposes without the prior written consent recommendation.
    [Show full text]
  • Student Login Information
    Student Login Information • WebAdvisor • Student Email • Lab Login • Printing • Blackboard • Wi-Fi gaston.edu WebAdvisor Obtaining Your WebAdvisor User ID 1. Go to gaston.edu. 2. Click the WEBADVISOR link. 3. Click “What’s my User ID?”, then type in your Last Name, and enter either your Social Security Number or your College ID#, and click submit. Logging Into WebAdvisor 1. Go to gaston.edu. 2. Click the WEBADVISOR link. 3. Click on Log In (upper right), provide your WebAdvisor User ID and password. Note: Your initial password is your birthday in the form of mmddyy. 4. If you forget your user name or password, click on “What is my User Name?” or “What is my Password?” and follow instructions. Obtaining your 7 Digit College ID# 1. Log into WebAdvisor. 2. Click the Student icon. 3. Select “My Profile” under Academic Profile. Note: Your 7 digit College ID# is located under Personal Information. Password Management for Student Email, Lab, Printing, Wi-Fi and Blackboard One password will access student email, lab, printing, Wi-Fi and Blackboard. Your initial password will be a capital GC# and your personal 7 digit Gaston College ID number (e.g., GC#0123456). Password Management - gcpass.gaston.edu When logging into a lab for the first time you will be required to set up the GC Password Management profile for password recovery. You may access your profile management by selecting QUICK LINKS on gaston.edu, then password reset GC Pass under the Students heading. To use AD Self Password Reset you first need to enroll. Once enrolled you can reset your password and unlock your account by answering several personal security questions.
    [Show full text]
  • Simpboard –A Mongodb Implementation of a Simplified Online Bulletin Board System for Information Dissemination in Tertiary Institutions
    Nigerian Journal of Technology (NIJOTECH) Vol. 36, No. 3, July 2017, pp. 897 – 903 Copyright© Faculty of Engineering, University of Nigeria, Nsukka, Print ISSN: 0331-8443, Electronic ISSN: 2467-8821 www.nijotech.com http://dx.doi.org/10.4314/njt.v36i3.32 SIMPBOARD –A MONGODB IMPLEMENTATION OF A SIMPLIFIED ONLINE BULLETIN BOARD SYSTEM FOR INFORMATION DISSEMINATION IN TERTIARY INSTITUTIONS A. E. Ibor1,*, K. E. Eyong2 and E. B. Edim3 1,2 DEPARTMENT OF COMPUTER SCIENCE, CROSS RIVER UNIVERSITY OF TECHNOLOGY, CALABAR, NIGERIA 3 DEPARTMENT OF COMPUTER SCIENCE, UNIVERSITY OF CALABAR, CALABAR, CROSS RIVER STATE. NIGERIA Email addresses: 1 [email protected], 2 [email protected], 3 [email protected] ABSTRACT Information dissemination is a key concern for most tertiary institutions. While information is relevant for the day-to-day running of a tertiary institution, the rightful information, sometimes, is not available for the appropriate decisions to be taken. The practice, in some institutions, is the use of wooden notice boards for making information available to the academic community. In many cases, such means of information broadcasting has been found to be inefficient, and largely a component of physical presence. However, electronic presence is becoming more and more acceptable for spreading information. To this effect, this paper will discuss the design and implementation of a simplified online bulletin board system called SIMPBOARD that can be accessed through the web browser of a computer or smart phone. Furthermore, the system will allow for anywhere access to bulletins, and possible archiving of same, for reference purposes, through the use of Mongo DB with Meteor JS Framework.
    [Show full text]
  • More Than You Ever Wanted to Know About NT Login Authentication
    A Perspective On Practical Security 2000 More Than You Ever Wanted to Know about NT Login Authentication SystemExperts Corporation Philip C. Cox & Paul B. Hill Abstract Inside The login process is the user's entry-point to the computing • Under the covers for a local NT login environment, the best or perhaps only chance for real • NT & LAN Manager compatibility authentication. No authorization decision has any meaning absent authentication. Taking the rapid adoption of NT as a given, any • Password encryption within the Security Accounts Manager organization must understand exactly how NT login authentication (SAM) database works if it is to determine whether or not NT login can meet the organization's needs. Otherwise, the choices are faith and luck. • User Authentication Process This white paper describes an Interactive NT login and lays the • Use of the LsaLogonUser API groundwork for understanding the Network login. This information is current as of NT 4.0 Service Pack 5. • The groundwork for understanding network login. NT Login Authentication SystemExperts Corporation There are no less than 5 types of “logons” in Windows NT, but only three are commonly used: Interactive, Network, and Service. Boston New York Washington D.C Tampa San Francisco Los Angeles Sacramento 1. Interactive logons are for users logging onto the console and for processes that require “interactive” access. Interactive NT Toll free (USA only): +1 888 749 9800 user authentication itself takes several forms: From outside USA: +1 978 440 9388 - Login with a locally defined user account — no network access is required; the account is authenticated by the machine you are logging into and only by that machine www.systemexperts.com [email protected] Copyright 1997-2001 SystemExperts Corporation.
    [Show full text]
  • Dos and Don'ts of Client Authentication on the Web
    Dos and Don'ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster fubob, sit, kendras, feamster ¡ @mit.edu MIT Laboratory for Computer Science http://cookies.lcs.mit.edu/ Abstract the client authentication of two systems, gained unautho- rized access on eight, and extracted the secret key used Client authentication has been a continuous source of to mint authenticators from one. problems on the Web. Although many well-studied tech- This is perhaps surprising given the existing client niques exist for authentication, Web sites continue to use authentication mechanisms within HTTP [16] and extremely weak authentication schemes, especially in SSL/TLS [11], two well-studied mechanisms for provid- non-enterprise environments such as store fronts. These ing authentication secure against a range of adversaries. weaknesses often result from careless use of authentica- However, there are many reasons that these mechanisms tors within Web cookies. Of the twenty-seven sites we are not suitable for use on the Web at large. Lack of investigated, we weakened the client authentication on a central infrastructure such as a public-key infrastruc- two systems, gained unauthorized access on eight, and ture or a uniform Kerberos [41] contributes to the pro- extracted the secret key used to mint authenticators from liferation of weak schemes. We also found that many one. Web sites would design their own authentication mecha- nism to provide a better user experience. Unfortunately, We provide a description of the limitations, require- designers and implementers often do not have a back- ments, and security models specific to Web client authen- ground in security and, as a result, do not have a good tication.
    [Show full text]