![]()
| LEAD STORY |
| Altiris acquires Wise Solutions (SearchWin2000.com) |
![]() |
| |
![]() |
Systems management vendor Altiris on Tuesday announced that it has acquired Wise Solutions, a maker of software packaging tools, in a cash-and-stock deal valued at about $43 million.
|
|
SPONSORED BY: NetIQ
![]()
Download NetIQ's Group Policy Catalog to Unleash the Power of AD
In Windows Server 2003 and Windows XP, there are more than 900 individual Group Policy object settings. For new Active Directory users, leveraging Group Policy effectively in their environment is becoming increasingly difficult. Ease your pain and download NetIQ's free Group Policy Catalog. This simple step-by-step guide will help you increase your Group Policy knowledge and identify key areas for an immediate ROI.
![]()
Click here to download.
|
|
NEWS
Microsoft concerned about IE disclosure (SearchSecurity.com)
Microsoft said it is investigating public reports of new flaws in Internet Explorer, and expressed concern the details were disclosed to the public. The Chinese researcher who found the flaws said he did not report them first to Microsoft because he felt cheated that Redmond did not credit him for finding a previous flaw.
NEWS
Microsoft Speech Server enters final beta (eWEEK)
On Tuesday, Microsoft released beta versions of its Speech Server and a developer kit for building speech applications. The products, which will spearhead Redmond's push into the market for enterprise speech technology, are expected to be released in their final form in the spring.
DAILY HEADLINES
All headlines, including those below, are available from our news page.
![]()
CHAPTER OF THE WEEK
PKI deployment issues and decisions
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, including the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. This chapter from the book Understanding PKI, Second Edition discusses issues you need to consider before deploying PKI, such as trust models, in-sourcing vs. out-sourcing; build vs. buy and standard vs. proprietary solutions.
SPONSORED BY: Stalker Software
![]()
CommuniGate Pro -- Advanced Messaging & Collaboration White Paper
Outlook Support in 'Workgroup' mode
Access e-mail, calendar and contacts from the Webmail client
Flexible -- over 30 hardware/operating systems supported
Scalable -- allows for server consolidation
Reduce licensing, maintenance and support costs
![]()
Click here to learn more.
|
MEMBER POLL
Will Microsoft reward money help catch hackers?
Do you think Microsoft's new plan to offer reward money will help catch hackers? Yes? No? Not sure? Cast your vote in our current reader poll.
IT SURVIVAL KIT
Power to the user (well, just a little)
The only way to allow Windows 2000 and XP users to change power schemes is to grant them administrator access. However, many administrators balk at doing this, since the whole point of having user-level access vs. administrator-level access is to segregate things administrators can do, such as install programs or make system-wide changes. Fortunately there's a solution to this problem that does not involve putting users into the administrator group. You can edit permissions in the registry that control which users can have access to the keys that govern power management.
ASK THE EXPERT, JERRY HONEYCUTT
Stop apps from starting during boot-up
Dear Jerry:
With Windows 98 I could go to Tools and use a configuration tool that would turn on or off different applications from automatically starting during boot-up. How do I do this with Windows 2000?
Click here to read Jerry Honeycutt's expert response.
BEST WEB LINKS
Remote management
Discover and explore some remote management options for maintaining and troubleshooting your Windows PCs.
THE MISSING LINK
An ATM card under your skin
![]()
When Frank Sinatra sang about having "you under my skin," it's a good bet that he wasn't talking technology. But a company based in Florida has created an RFID tag that can be surgically implanted in your arm. After you get "chipped," all you have to do is hold up your arm where you might otherwise swipe your credit or debit card. Critics say the RFID implant poses a unique problem. ?When your bank card is compromised, all you have to do is make a call to the issuer. In this case, you have to make a call to a surgeon," said one privacy advocate.
|
|
![]() |
![]() |
|
Sign up for our free weekly Exchange Administration Tip with just one click!
|
![]() |
| Enter your e-mail and start receiving Exchange Administration Tips. |
![]() |
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
![]()
NEWS EDITOR
John Hogan
[EMAIL PROTECTED]
Send me your news, press releases and product announcements.
![]()
SENIOR SITE EDITOR
Marilyn Cohodas
[EMAIL PROTECTED]
Send me your original articles and best practices.
![]()
SITE EDITOR
Christine Polewarczyk
[EMAIL PROTECTED]
Send me your bloopers and Featured Topic ideas.
![]()
SENIOR NEWS WRITER
Margie Semilof
[EMAIL PROTECTED]
Send me your news and story ideas.
![]()
ASSOCIATE EDITOR
Matt Danielsson
[EMAIL PROTECTED]
Send me your ideas for webcasts and discussion day topics.
![]()
ASSISTANT EDITOR
Jennifer Luscomb
[EMAIL PROTECTED]
Send me your favorite Web sites and white papers.
![]()
ASSISTANT EDITOR
Vandana Sharma
[EMAIL PROTECTED]
Send me your tips and your true IT bloopers.
![]()
SENIOR SITE SALES MANAGER
Gabrielle Derussy
[EMAIL PROTECTED]
Contact me to sponsor this or any other TechTarget newsletter.
|
|
|
|
|