![]()
| LEAD STORY |
| Microsoft updates baseline security tool (SearchWin2000.com) |
![]() |
| |
![]() |
Redmond has released a new version of its Microsoft Baseline Security Analyzer software. Although version 1.2 of MBSA is free, the security tool's usefulness is limited, according to some Windows experts.
|
|
SPONSORED BY: Stalker Software
![]()
CommuniGate Pro - Advanced Messaging & Collaboration White Paper
Outlook support in 'Workgroup' mode
Access e-mail, calendar and contacts from the Webmail client
Flexible - over 30 hardware/operating systems supported
Scalable - allows for server consolidation
Reduce licensing, maintenance and support costs
![]()
Click here for your free white paper.
|
|
NEWS
Experts puzzled about Bagle's spreading (SearchSecurity.com)
The spread of Bagle-A is declining but experts wonder why the worm gained so much traction to become the first major worm of the year.
NEWS
Vendors press groupware below Exchange rate (ENT)
A number of third-party vendors are hoping to cash in on expected migrations this year off of older versions of Microsoft's Exchange messaging platform. Some industry watchers say that if those smaller vendors provide compatibility with Microsoft's Outlook client, they can position their products as cheaper alternatives to Microsoft's new Exchange Server 2003.
DAILY HEADLINES
All headlines, including those below, are available from our news page.
![]()
IT SURVIVAL KIT
Partitioning your tables
There are many good reasons for partitioning the data in your database into smaller, separate tables. The reasons include: improved performance, reduced backup windows, better data protection and support for special needs of a particular set of users with their own data set.
Read this helpful tip to find out more about partitioning your data and how to do it.
SPONSORED BY: CipherTrust
![]()
FREE WEBINAR: "Spam - A Security Issue" with Gartner's Arabella Hallawell
Spam e-mail is no longer just a nuisance for companies. Malicious
code, Trojan horses, "phishing" attacks -- all are serious security
threats that use spam techniques to exploit email systems. Corporate
IT managers and e-mail administrators have some important and
complicated issues to contend with. Join Gartner research director
Arabella Hallawell for this free webinar, "Spam As A Security Issue,"
sponsored by CipherTrust, the leader in enterprise e-mail security.
![]()
Click here to register.
|
ASK THE EXPERT
Securing a network through wireless APs
Dear Roberta,
In a Windows Server 2003 Active Directory domain, how would you secure wireless access by domain users connecting through wireless access points, which are of a different make/model, throughout the enterprise?
Click here to read Roberta Bragg's expert answer.
CHAPTER OF THE WEEK
Probing common Windows services
This chapter from the book HackNotes Windows Security Portable
Reference, by Michael O'Dea, provides some chilling insights to
which Windows services are the "meatiest" in the eyes of an attacker.
Fortunately, the authors provide a number of simple but effective
measures to plug the leaks and discourage intrusion. Take the steps
outlined here, and you'll be way ahead of the crowd.
EXPERT WEBCAST
Calculating the cost of network downtime
In this expert webcast Laura Chappell, Founder and Senior Protocol Analyst, Protocol Analysis Institute, LLC discusses how to determine the cost of network downtime/outages on a per-minute, hourly, daily, monthly and yearly basis using the Return on Investment (ROI) Analysis calculator.
Click here to watch and listen to this expert webcast.
TIP CONTEST
Win a new 256 MB digital audio player!
Get your Windows related IT tips submitted now! In addition to being
included in our Hall of Fame, the user who submits this month's
winning tip will receive an iRiver iFP-190T 256 MB digital audio
player!
Click here to submit and read more about this month's prize.
THE MISSING LINK
Surfin' on a mouse and a prayer
![]()
Orthodox Jews who visited adult Web sites didn't have a prayer -- until now. A rabbi in Israel has come up with a prayer to help those Semitic surfers who can't resist the seedy (and steamy) side of cyberspace: "Please, God, help me cleanse the computer of viruses and evil photographs which disturb and ruin my work ... so that I shall be able to cleanse myself [of sin]." The rabbi who came up with the prayer said that Jews
should say it when they log on, or maybe use it as a screensaver. Oh, and it works for someone who stumbles into an adult site by mistake, too. Now if he could only fashion a prayer for those who bravely face a daily deluge of spam!
|
|
![]() |
![]() |
|
Sign up for our white paper alerts today!
|
![]() |
| Enter your e-mail and start receiving White Paper Alerts. |
![]() |
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
![]()
NEWS EDITOR
John Hogan
[EMAIL PROTECTED]
Send me your news, press releases and product announcements.
![]()
SENIOR SITE EDITOR
Marilyn Cohodas
[EMAIL PROTECTED]
Send me your original articles and best practices.
![]()
SITE EDITOR
Christine Polewarczyk
[EMAIL PROTECTED]
Send me your bloopers and Featured Topic ideas.
![]()
SENIOR NEWS WRITER
Margie Semilof
[EMAIL PROTECTED]
Send me your news and story ideas.
![]()
ASSOCIATE EDITOR
Matt Danielsson
[EMAIL PROTECTED]
Send me your ideas for webcasts and discussion day topics.
![]()
ASSISTANT EDITOR
Jennifer Luscomb
[EMAIL PROTECTED]
Send me your favorite Web sites and white papers.
![]()
ASSISTANT EDITOR
Vandana Sharma
[EMAIL PROTECTED]
Send me your tips and your true IT bloopers.
![]()
SENIOR SITE SALES MANAGER
Gabrielle Derussy
[EMAIL PROTECTED]
Contact me to sponsor this or any other TechTarget newsletter.
|
|
|
|
|