Desktop is the entry point to the organization's information resources. If the security of the desktop is weak, potential intruders can easily by-pass the first obstacle. This document describes the defense mechanism for security of desktops (including notebooks or laptops) in a network computing...