Title: searchWin2000.com - Win2000 and Industry News
![]()
| LEAD STORY |
| Massachusetts budget czar bullish on open-source (SearchWin2000.com) |
![]() |
| |
![]() |
Massachusetts' top budget official says he wants the state to become a leader in government IT practices. To demonstrate its commitment, the Bay State will give top consideration to open-source software and standards whenever possible, said Eric Kriss, the state's secretary for administration and finance.
|
|
SPONSORED BY: IntelliReach
![]()
Eliminate spam, viruses and porn from your organization once and for all. This paper discusses current anti-spam technologies and how spammers are getting around them. Learn how Exchange administrators can protect themselves using truly effective filtering techniques that catch over 95% of spam, viruses and explicit content.
![]()
Download your free white paper.
|
|
NEWS
Microsoft official rebuts Windows report (CNET)
Microsoft CTO Craig Mundie refuted claims made in a recent software security report that were critical of Microsoft's market dominance. Mundie said 100% secure software is an impossible near-term goal, but he said a good alternative is an IT "immune system" consisting of a collaboration of machines and networks. Mundie also said the controversial security report could be the work of anti-Microsoft groups.
NEWS
Early Whidbey, Yukon code set for PDC (CRN)
Early beta code for Microsoft's next versions of its Visual Studio platform (Whidbey) and SQL Server database (Yukon) will be made available at its Professional Developers Conference at the end of the month. The software giant also plans to provide a technical outline of the next version of its Windows client, code-named Longhorn.
DAILY HEADLINES
All headlines, including those below, are available from our news page.
![]()
CHAPTER OF THE WEEK
Active Directory schema
To really understand the inner workings of Active Directory, it helps to have a thorough understanding of the Active Directory schema. This chapter from "Managing Enterprise Active Directory Services" by Robbie Allen and Richard Puckett gives a brief introduction to schema concepts, then covers the tools and programmatic interfaces that can be used to manage the schema. The second half focuses on the steps necessary to extend the schema and includes a schema verification and extension program.
SPONSORED BY: SearchWin2000.com
![]()
Visit the new Desktop Deployment Info Center on SearchWin2000.com. You'll find tips, webcasts, expert advice and other key resources focused on all aspects of managing Windows desktops -- direct from SearchWin2000.com and Microsoft. Topics covered include desktop deployment and migration strategies, performance, disk management, hardware administration, application management, security -- and much more!
![]()
Click here to explore the info center today!
|
MEMBER POLL
Software release dates
Some people mark product release dates on their calendars -- others couldn't care less about them. How important are software release dates to you?
IT SURVIVAL KIT
Some help with RunAs
It is possible to run a program from another user's context, but the way Windows 2000 and XP Professional implement this feature requires that the user know the password for the other account. This makes it difficult to run the program securely. Learn about the solution, which involves the use of Windows Script Host to create a script that can run the program in the appropriate context and provide the password non-interactively.
ASK SCOTT SCHNOLL
Hiding addresses from global address list
Dear Scott:
I've seen this question referenced before but have not found an answer. How do you hide an e-mail address from the GAL (Global Address List). I'm running Exchange 5.5?
BEST WEB LINKS
DNS
The domain name system (DNS) is the way that Internet domain names are located and translated into Internet Protocol addresses. DNS is a critical component in the latest versions of Windows -- learn it or you'll regret it!
THE MISSING LINK
Cell phones call out Italian cheaters
![]()
Talk about an affair to remember -- a cell phone's memory is one of the best friends a suspicious spouse can have. The wireless is exposing the faithless all across Italy.
|
|
![]() |
![]() |
|
Sign up for our white paper alerts today!
|
![]() |
| Enter your e-mail and start receiving White Paper Alerts. |
![]() |
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
![]()
NEWS EDITOR
John Hogan
[EMAIL PROTECTED]
Send me your news, press releases and product announcements.
![]()
SENIOR SITE EDITOR
Marilyn Cohodas
[EMAIL PROTECTED]
Send me your original articles and best practices.
![]()
SITE EDITOR
Catherine Ketcher
[EMAIL PROTECTED]
Send me your bloopers and Featured Topic ideas.
![]()
SENIOR NEWS WRITER
Margie Semilof
[EMAIL PROTECTED]
Send me your news and story ideas.
![]()
ASSOCIATE EDITOR
Christine Polewarczyk
[EMAIL PROTECTED]
Send me your ideas for webcasts and discussion day topics.
![]()
ASSISTANT EDITOR
Will Hurwitz
[EMAIL PROTECTED]
Send me your favorite Web sites and white papers.
![]()
SENIOR ACCOUNT EXECUTIVE
Kevin Nolan
[EMAIL PROTECTED]
Contact me to sponsor this or any other TechTarget newsletter.
|
|
|
|
|