Title: Windows Week that Was
SPONSORED BY: VeriSign -- The Value of Trust
![]()
Get the strongest server security-128-bit SSL encryption! Download VeriSign's FREE guide, "Securing Your Web Site for Business" and learn everything you need to know about using SSL to encrypt your e-commerce transactions for serious online security.
![]()
Click here!
|
|
SPONSORED BY: SearchWin2000.com
![]()
If you're looking for security solutions, then be sure to visit our new SearchWin2000.com Product and Vendor Guide. This guide covers a wide range of areas for you to thoroughly research including "anti-virus solutions," "network security," "firewalls" and much more.
![]()
Click here to browse the product and vendor guide.
|
|
|
Survival Tips for the Windows Manager |
|
![]()
Webcast: Mark Minasi live! NT 4.0 -- hold 'em or fold 'em?
It's the beginning of the end for Windows NT. Or at least Microsoft says so. But in the wake of the release of Windows Server 2003 -- and with nearly half of the installed enterprise Windows base still running NT4 -- we asked supreme Alpha geek Mark Minasi to share his views on when an operating system as popular as NT 4.0 truly becomes obsolete. In this live webcast, Sept. 16 at 2 p.m, Minasi will discuss how to decide when -- or if -- to leave NT 4.0; the security hole that might just FORCE you to leave NT 4.0; and pointers for making upgrades cheaper and easier (if you decide to move).
Click here to pre-register.
Chapter of the Week: Microsoft SQL Server 2000
In this chapter from A Guide to Enhancements and New Features, Rahul Sharma outlines the feature sets that have been enhanced since SQL Server 7.0 and the new feature sets that have been added to SQL Server 2000. Topics include XML capability, indexed views and distributed partitioned views.
IT Toolkit: Blocking worms
More than 500,000 users, by Symantec's estimate, failed to follow the trivial steps required to patch their computers. Again and again, these derelicts give hackers the tools they need to create mischief. Clearly, users protecting company desktops aren't enough. Learn about the advantages and disadvantages of Access Control Lists, which many organizations are using on the back end to protect the security of their entire networks.
|
![]() |
![]() |
|
|
Vent! |
|
Take our weekly poll
Some people mark product release dates on their calendars -- others couldn't care less about them. How important are software release dates to you?
Click here to vote.
Check out the results of our previous poll on Windows patch installation services.
Previous poll results |
![]() |
![]() |
|
Free white paper alerts
|
![]() |
| Enter your e-mail and start receiving White Paper Alerts. |
![]() |
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
![]()
NEWS EDITOR
John Hogan
[EMAIL PROTECTED]
Send me your news, press releases and product announcements.
![]()
SENIOR SITE EDITOR
Marilyn Cohodas
[EMAIL PROTECTED]
Send me your original articles and best practices.
![]()
SITE EDITOR
Catherine Ketcher
[EMAIL PROTECTED]
Send me your bloopers and Featured Topic ideas.
![]()
SENIOR NEWS WRITER
Margie Semilof
[EMAIL PROTECTED]
Send me your news and story ideas.
![]()
ASSOCIATE EDITOR
Christine Polewarczyk
[EMAIL PROTECTED]
Send me your ideas for webcasts and discussion day topics.
![]()
ASSISTANT EDITOR
David Pye
[EMAIL PROTECTED]
Send me your tips and your true IT bloopers.
![]()
ASSISTANT EDITOR
Will Hurwitz
[EMAIL PROTECTED]
Send me your favorite Web sites and white papers.
|
|
|