Title: Lockergnome's IT Professionals ~ December 22, 2004
Lockergnome
Lockergnome's IT Professionals ~ December 22, 2004   




Google Lockergnome

Click here to make a donation and get your name & link listed here!

Feedback  |  Contribute  |  Archives  |  Send to Friends  |  Subscription Options

Where's Your Web Site? Get it done through GnomeDOMAINS! Register a new .biz .com .info .net .org or .us domain name for as little as $15 a year with a ten-year registration or $22 for one year. Registration fee includes all registry fees and includes free domain parking. Renew your Network Solutions registered domain for only $17 (over 50% off Network Solutions $35 rate). No more worries about someone stealing your domain via insecure forms. All domain management is via secure SSL encrypted and password protected web forms. Register a domain today!

Here a WLAN, there a WLAN, everywhere a WLAN! (Network)

Direct & Related Links  |  Send Link to Friends  |  Posted by Chris Pirillo

Scribbled by Matt of JustCallMatt.net. I find myself sitting in a Starbucks in between clients on a chilly day in Chi-Town... I had just completed a residential Wireless LAN installation consisting of an Airport Extreme Base Station and Airport Express Adapter to stream to the client's home stereo, a brand new 14" iBook (gift from the client to her husband), and a Dell Inspirion 600m laptop. The home was already Cat-5 Wired, so I had... [Continued]

^TOP^

The Explosion of Phishing... (Security)

Direct & Related Links  |  Send Link to Friends  |  Posted by Lockergnome

This practice is a problem of monumental proportions. No, not fishing, but phishing. The incidents of this fraud are perpetrated by what I would consider losers of the worst kind: people that prey upon unsuspecting strangers. I had my first encounter with phishing several years ago in the form of an official-looking eBay e-mail. I, being the suspicious type, reported it immediately and the copycats joined in with PayPal, etc. Phishing is getting much more... [Continued]

^TOP^

The Ten Commandments of Computer Ethics (Aunty Spam's Net Patrol)

Direct & Related Links  |  Send Link to Friends  |  Posted by Aunty Spam's Net Patrol

The Computer Ethics Institute is part and parcel of the Brookings Information Technology Services, a division of the world-famous Brookings Institution in Washington D.C.. Tracing its origins back to 1916, the Brookings Institution is often at the fore of public policy research and discourse. Back in 1992, Dr. Ramon Barquin, both founder and head of the Computer Ethics Institute, as well as President and CEO of Barquin International, and formerly an executive at IBM, presented... [Continued]

^TOP^

Information Security Magazine Determines Top 39 Security Products (Aunty Spam's Net Patrol)

Direct & Related Links  |  Send Link to Friends  |  Posted by Aunty Spam's Net Patrol

Information Security Magazine, following extensive review, has published its list of the top security products for 2004. Evaluating products in a baker?s dozen of categories, and with a first, second, and third place in each (gold, silver, and bronze, respectively), this is one extensive and thorough cross-product comparison! Aunty particularly likes that they provide not only a blurb about each gold-winning product, but provide user comments for the silver and bronze winners. The thirteen categories... [Continued]

^TOP^

Even Unpatched, Linux Most Secure OS (Aunty Spam's Net Patrol)

Direct & Related Links  |  Send Link to Friends  |  Posted by Aunty Spam's Net Patrol

You may recall that last week Aunty reported that an advanced computer class at Chicago University had found 44 security holes in Unix. Well, its kissing cousin, Linux, the people who brought you that adorable penguin, Tux, is more secure, even unpatched, than are other computer systems, and specifically Windows, even when patched. And that?s with the 985 bugs recently found in the Linux kernal (but to put it in perspective, that?s in 5.7 million... [Continued]

^TOP^

Still Looking for a Good PC (Feedback)

Direct & Related Links  |  Send Link to Friends  |  Posted by Chris Pirillo

Scribbled by Warren Ward Let me tell you a funny story about IBM. In the 80s I was the chief R&D engineer working for a Coopervision division. We had designed a new fancy laser-based system and decided to use the new IBM XT for the controlling software. So I dutifully called IBM's sales department looking to buy 1000 PCs. They never returned my call. I called again. No answer. Then I wrote a letter to... [Continued]

^TOP^

TechRepublic Guided Tour: A look At Windows Server 2003's Active Directory Users And Computers (Tech Toolshed)

Direct & Related Links  |  Send Link to Friends  |  Posted by TechRepublic

One of the utilities that a Windows Server 2003 network administrator will use most frequently is Active Directory Users And Computers. However, new network administrators and network administrators who've only used Windows NT may find themselves confused by the new utility. Here's a look at Active Directory Users And Computers in W2K3, what it does, how it differs from utilities in Windows NT Server and Windows 2000 Server, how it works, and how to perform... [Continued]

^TOP^

One Needle, Many Haystacks (Tips)

Direct & Related Links  |  Send Link to Friends  |  Posted by Marc Erickson

Don Jones of Redmond Magazine writes about easing your event log viewing chores... Minimize the laborious task of searching for specific events with Event Comb. Configuring auditing on your Windows servers is a great idea: You?ll catch events for successful logons, account lockouts, file access and more. What?s a bad idea is trying to use the captured events! Browsing through servers? event logs is perhaps the most tedious task in the administrative universe, even with... [Continued]

^TOP^

Windows Server 2003 Special Permissions (Network)

Direct & Related Links  |  Send Link to Friends  |  Posted by Diana Huggins

NTFS permissions include standard permissions and special permissions. The standard permissions are actually a combination of specific special permissions. The Standard NTFS permissions are as follows: Read - Allows a user to view the contents of a folder, of the contents of a file. The user cannot view the contents of subfolders. Write - Allows a user create files and folders, but not read the contents of any files and folders he did not create.... [Continued]

^TOP^

Certification Success - Understanding Network Monitor Part II (Certification)

Direct & Related Links  |  Send Link to Friends  |  Posted by Diana Huggins

Once Network Monitor is installed, it can be accessed through any of the Administrative Tools methods, or by typing NETMON on the run line, which will open the Explorer folder, where you can double-click on NETMON.EXE, and quickly navigate to any capture logs from that point. Once Network Monitor is up and running, it can get confusing very quickly. First of all, you won't be able to view data until you tell Network Monitor to... [Continued]

^TOP^

It's starting to taste a lot like Christmas! (Report)

Direct & Related Links  |  Send Link to Friends  |  Posted by Matt Hartley

Tell me, what do toys, overeating, and sitting around with family watching the kids tear into wrapping paper like it is going out of style, have to do with Christmas? The one holiday when gluttony, commercialism and all the other stuff that gives me warm fuzzies is accepted without question. Yes folks, Christmas is almost upon us and I for one hope that everyone gets what they want this year. As for myself, I am... [Continued]

^TOP^

Strange errors, anoying prompts, what gives? (Just Ask Matt!)

Direct & Related Links  |  Send Link to Friends  |  Posted by Matt Hartley

Welcome to Just Ask Matt! - The IT industry's answer to the help column, only slightly more medicated. Today, Sam writes: I am losing my mind and I need help. Matt, every time I start my computer, I keep getting 'checksum error' during the computer's startup. What the heck does this mean? And why can't they just tell me in plain English? If you can answer this, I will be forever in your debt. Thanks.... [Continued]

^TOP^

Latest White Papers From TechRepublic

Yahoo! News - Search Results for it professionals

Desktop Pipeline

kbAlertz - - All Microsoft Products -

Enhance Your Mobile Lifestyle! - Palm devices, Pocket PCs, cell phones, and other assorted gadgets and gizmos - whatever makes you go, on the go, this is where you need to go. We don't just talk about mobile tech - we live it!

Administrivia

Windows Fanatics
Linux Fanatics
OS X Fanatics
IT Professionals
Web Developers
Problem Solvers
Tech News Watch
RSS & Atom Tips
Hot Downloads
Exclusive Focus
Bargain Hunter
DVD Deal Center
Technobabble
Game Invasion
Hardware Help
Media Center
Mobile Lifestyle
Net Connections
Search Engineer
Political Geeks


Click Here for a Larger View!


» 3D Christmas Cookies
» Here a WLAN, there a WLAN, everywhere a WLAN!
» Italicise your unread firefox tabs and other bits
» Insider eBook on RSS Coming Soon
» Apple Gets Serious; Hands Out Lawsuits
» Red Hat pulls out a profit
» How to Get Attention
» Digital Camera Hottest Gift for 2004
» Free Video Conferencing for the Holidays
» Convert PAL DVD to NTSC
» Telling Time with .NET: Build your own Internet time component
» Call of Duty: United Offensive Map Pack
» Microsoft plan lets subscribers download away
» Research Buddy - Saves References To WebPages in Bibliographical Reference Form
» Spam, Spim, Spit?Achtooey!
» Improve and zoom low-quality images with Cleanerzoomer


EcoBall
Feeding Frenzy
3D Runaway Sleigh
Cute Reminder v2.1
Christmas 3D Screensaver

Laptops
System Components
Hard Drives
PDAs
Flash Cards
UPSs
WebCams
Printers
Scanners
Cables / Adapters
Video Capture
Training
Computer Books
Printer Paper
Flat Panels / LCD
Ink & Toner
Wireless Stuff
USB / FireWire
Computer Memory
Video Memory
Video Cards
Soundcards
DVD / DVD-RW
Speakers
CDR / CD-RW


Reply via email to