Assorted Bookmarks of MSDN, MSKB and TechNet Articles and Pages Me, myself & IT Assorted Bookmarks ofĪrticles and Pages TechNet Articles MSDN Articles MSKB Articles KB100010 KB200001 KB300000 KB416351 KB504593 KB810012 KB900004 KB2000007 KB3000055 KB4000734 KB5000226 TechNet Articles and Pages TechNet Library Home Security Advisories Security Bulletins Security Bulletin Summaries TechNet Flash Archive Windows Platform Common Criteria Certifications Windows Embedded POSReady 2009 Windows Server 2003 Windows Server 2003 Product Help Windows Server 2003 Resource Kit Registry Reference Windows Server 2003 Technical Reference Windows Server 2003 TCP/IP Implementation Details TCP/IP Fundamentals for Microsoft Windows How IPv6 Works How TCP/IP Works How Unicast IPv4 Routing Works How IPv4 Multicasting Works - Multicast Routing How Windows Firewall Works How DHCP Works - Dynamic Host Configuration Protocol How DNS Works - Domain Name System How WINS Works - Windows Internet Name Service How Computer Browser Service Works How SNMP Works - Simple Network Management Protocol How NAT Works - Network Address Translation How VPN Works - Virtual Private Network How ATM Works - Asynchronous Transfer Mode How QoS Works - Quality of Service NetBIOS Over TCP/IP How the Kerberos Version 5 Authentication Protocol Works How TLS SSL Works - Logon and Authentication How Windows Time Service Works How Network Printing Works How Shutdown Event Tracker Works How Core Group Policy Works How Group Policy Object Editor Works How Group Policy Management Console Works How Resultant Set of Policy Works How Administrative Templates Extension Works How AppLocker Works How Plug and Play Works How Device Drivers Works How PAE x86 Works How 4GT Works How FAT Works How NTFS Works How DFS Works How FRS Works How Disk Quotas Works How Basic Disks and Volumes Works How Dynamic Disks and Volumes Works How Virtual Disk Service Works How Removable Storage Works How Remote Storage Works How Volume Shadow Copy Service Works How Shadow Copies for Shared Folders Works How Backup Works How Disk Defragmenter Works How Emergency Management Services Works How ImageX Works How Deployment Image Servicing and Management Works How Package Manager Works How Windows Setup Works How Windows OOBE.XML Works How Windows PE Works How Windows RE Works How Booting into a Boot Image Works How Setup Works How Unattended Installation Works How Remote Installation Services Works How Sysprep Works Windows PE Windows PE - Install on a hard drive (Flat boot or Non-RAM) Windows PE - Create Apps Windows PE - Using start scripts Preserving OEM Pre-Activation when Re-installing Windows Server 2003 R2 Preserving OEM Preactivation when Reinstalling Windows Server 2003 R2 The Windows NT Command Shell IExpress Technology and the IExpress Wizard Windows Sysinternals Windows XP Windows XP Resource Kit Evaluate Windows XP Testing Applications with AppVerifier Technical Details on Microsoft Product Activation for Windows XP Preserving OEM Pre-Activation when Re-installing Windows XP How to Configure Memory Protection in Windows XP SP2 How to create a separate system partition for dual booting Windows XP or Windows 2000 with Windows 7 Boot Configuration Data Editor Frequently Asked Questions Encrypting File System in Windows XP and Windows Server 2003 The Encrypting File System Digital Certificates How Certificates Work How CA Certificates Work Certificates Certificate Support and the Update Root Certificates Component Microsoft Root Certificate Program Script Center Home Page Troubleshooting Problems with WMI Scripts and the WMI Service A New Utility for Diagnosing and Repairing Problems with the WMI Service User Rights User Rights Using a Least-Privileged User Account Understanding and Configuring User Account Control in Windows Vista How Security Descriptors and Access Control Lists Work How Access Tokens Work How Permissions Work How Security Principals Work How Security Identifiers Work Security Identifiers Technical Overview Security Principals Technical Overview Definition of a Security Vulnerability How to Shoot Yourself in the Foot with Security, Part 1 How to Shoot Yourself in the Foot with Security, Part 2: To ACL or Not to ACL Help I Got Hacked.