Here is a wonderful article on Technet (found it via Larry Osterman’s WebLog) describing how a hacker can take over your network.
Especially interesting the
In this article, I’ve examined how a Windows-based network might be hacked. I hasten to point out that Windows-based networks are no less secure than any other network. While the specific attacks used in this article are unique to Windows, minor modifications to the techniques and a new tool set would make the same compromise possible on a network running a different platform. The problem is not the platform itself, but the practices. All platforms are securable, but all networks are exploitable if they are not architected and implemented carefully. Poor implementation is always poor implementation, regardless of the underlying platform.
Not a Windows problem, but a security problem.
Tags: carefully compromise conclusion hacker infiltrate minor modifications osterman platforms poor implementation security problem technet tool set weblog