Title: searchWin2000.com - Today's News: Headlines, trends and technical advice for Windows pros
A newsletter published by TechTarget 
 January 06, 2004 >> Receive this e-mail as text   >> About this e-mail 
ISSUE SPONSORED BY:
>>  The Desktop Deployment Info Center: Everything you need to know about managing business desktops
 Today's Highlights  

>>  LEAD STORY:  Jarring jargon -- IT never at a loss for words
>>  NEWS:  Protection vulnerability found in Word
>>  FEATURED TOPIC:  Bizarre IT stories
>>  THE MISSING LINK:  You, me and baby NetWare makes three
 News and Top Stories  

LEAD STORY
Jarring jargon -- IT never at a loss for words  (SearchWin2000.com)
If IT were to be charged with one crime, it should be abuse of the English language. Who is to blame for these "words" -- words that should be kept at the bottom of an extensible repository rather than at the top of one's mission-critical vocabulary? These bad words leave many of us speechless.
More on this topic:
That's (geek) entertainment!
Can I quote you on that? The top IT quotes of 2003
SPONSORED BY: The Desktop Deployment Info Center

The Desktop Deployment Info Center is your one-stop shop for everything you need to know about managing business desktops. You'll find tips, expert advice and other key resources focused on all aspects of managing Windows workstations. Topics covered include desktop deployment and migration, performance, disk management, backup and recovery, interoperability, security -- and much more!

Explore the Desktop Deployment Info Center today.
NEWS
Protection vulnerability found in Word (Windows & .NET Magazine)
A newly discovered protection-bypass vulnerability in newer versions of Microsoft Word could allow a malicious user to unprotect a protected document without the use of a password cracker or other special tools.

NEWS
Spammers top Microsoft hit list (Wired)
Driven by user complaints, Microsoft says that it will not rely solely on the new filtering features of its messaging software to combat spam. Redmond says that this year, it will also track down and sue spammers, regardless of where they are based.

DAILY HEADLINES
All headlines, including those below, are available from our news page.
  > 2004 is the year of messaging and collaboration
  > Tried, tested methods still work for virus writers
  > If content is king, IBM wants the crown
  > Cisco in 2004: Network intel, WLANs, VoIP to rule
 VIEW ALL NEWS AND TOP STORIES

 Announcements & Links  


FEATURED TOPIC
Bizarre IT stories
Still unwinding from all the family, food and frenzy? Sit back, relax and take in a few of these amusing IT tales. They're sure to help you loosen up after the hectic holiday season. Enjoy!

IT SURVIVAL KIT
Two ways to update MS Office for security
As you are aware, it is extremely important to keep up strong security on your operating system to protect your corporate data, Web sites and networks secure from the threat of hackers, viruses, competitors and disgruntled employees. Packages such as Microsoft Office also need regular checks to see if they're current and up-to-date, as the operating system does. Click here to find out two ways to check on the concurrency of specific Office installations.

WEBCAST
Migrating VPN leased lines to IP
In this expert webcast, Jeffrey Posluns, founder of SecuritySage Consulting, explains the trend of enterprises migrating their VPN infrastructures from leased lines to IP using protocols such as IPsec, MPLS and SSL. Find out more about the options and choose the best option.

ASK THE EXPERT
Setting the paging file size in Windows 2000
Dear Serdar,
I have a question about virtual memory on Windows 2000 desktop machines. What are the standards for setting the paging file size? For instance, if my initial paging file size is 768, what should the maximum size area be set to?
Click here to read Serdar Yegulalp's expert answer.


MEMBER POLL
Windows 2000 Server phase-out
What do you think of Microsoft's plans to phase out Windows 2000 Server? Is it too soon? Not a big deal? Or is it time for us to rename our site SearchLonghorn.com? Cast your vote in our current poll.


THE MISSING LINK
You, me and baby NetWare makes three

If you're expecting a child and you work in IT, forget names like Caitlin, John and Madison. How do Dot Netta, Kernel Tom, A.D. and SQL Sue grab you? A psych professor in Nebraska found that more and more parents in the U.S. are naming their progeny after products. He found that moms and dads call their boys Camry and Dodge and their girls Armani and Courvoisier. So how long before geeks start getting into the act? Years from now, your son might marry a girl named WiFiona. Or your daughter could fall in love with a nice Italian boy named Vinny "Chip" Centrino.

Sign up for our white paper alerts today!
Enter your e-mail and start receiving White Paper Alerts.
E-mail
  
Not a member? We'll activate your membership with your subscription.


  Contact Us  

NEWS EDITOR
John Hogan
[EMAIL PROTECTED]
Send me your news, press releases and product announcements.


SENIOR SITE EDITOR
Marilyn Cohodas
[EMAIL PROTECTED]
Send me your original articles and best practices.


SITE EDITOR
Christine Polewarczyk
[EMAIL PROTECTED]
Send me your bloopers and Featured Topic ideas.


SENIOR NEWS WRITER
Margie Semilof
[EMAIL PROTECTED]
Send me your news and story ideas.


ASSOCIATE EDITOR
Matt Danielsson
[EMAIL PROTECTED]
Send me your ideas for webcasts and discussion day topics.


ASSISTANT EDITOR
Jennifer Luscomb
[EMAIL PROTECTED]
Send me your favorite Web sites and white papers.


ASSISTANT EDITOR
Vandana Sharma
[EMAIL PROTECTED]
Send me your tips and your true IT bloopers.


SENIOR SITE SALES MANAGER
Gabrielle Derussy
[EMAIL PROTECTED]
Contact me to sponsor this or any other TechTarget newsletter.


A B O U T   T H I S   N E W S L E T T E R
This newsletter is published by TechTarget, the most targeted IT media.
Copyright 2004 TechTarget. All rights reserved.
To unsubscribe from "Today's News":
  -  Reply to this e-mail with REMOVE in the Subject line
OR
  -  Go to unsubscribe and enter your e-mail address to cancel your subscription

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Reply via email to