![]() |
|
|
In this Issue |
![]() |
![]()
| >> |
From the editor:
How far will your IT knowledge take you? |
| >> |
Featured Topic:
Top 10 book downloads |
| >> |
Expert Technical Advice:
Featured Expert: Paul Hinsberg, Active Directory and/or Migration
Site Exclusives:
>>Microsoft updates baseline security tool
>>MS quiet as SCO goes nuclear on Novell
>>Oops! True IT blooper #123: The cleaning caper
Tip of the Week: Removing service packs and hotfixes that leave Win2k unbootable |
| >> |
Site Highlights:
White Paper: Is your monitor taking up too much space?
White Paper: Slash fax charges by 20-80%
Webcast: Mastering IT service reporting |
![]()
|
|
From the Editor: |
![]() |
![]()
by Christine Polewarczyk, Site Editor
![]()
It's time to play ... IT Jeopardy! That's right. So wake up those neurotransmitters and get ready to take a little IT quiz. The summaries below describe three well established computer technologies, which are listed from easiest to most difficult. Give them a go and see how far your Windows and networking knowledge takes you.
- This is a text file that contains a sequence of commands for a computer operating system. It packages into a single file a set of commands that would otherwise have to be presented to the system interactively from a keyboard one at a time. It is usually created for command sequences for which a user has a repeated need. (Answer)
- This is a secure method for authenticating a request for a service in a computer network. This technology was developed in the Athena Project at the Massachusetts Institute of Technology (MIT). The name is taken from Greek mythology; it is a three-headed dog that guarded the gates of Hades. This authentication method lets a user request an encrypted "ticket" from an authentication process that can then be used to request a particular service from a server. The user's password does not have
to pass through the network. (Answer)
- This is a technology used by some Intel microprocessors that allows a single microprocessor to act like two separate processors to the operating system and the application programs that use it. It is a feature of Intel's IA-32 processor architecture. With this technology, a microprocessor's "core" processor can execute two (rather than one) concurrent streams (or threads) of instructions sent by the OS. Having two streams of execution units to work on allows more work to be done by the
processor during each clock cycle. To the operating system, this appears to be two separate processors. (Answer)
I hope you enjoyed this week's fun fact challenge. You can learn more IT terms by browsing through our SearchWin2000.com IT Glossary. During your travels, if you don't see a word that you think should be there, please let us know and we will promptly add it.
Have a great week, everyone!
|
![]()
|
|
Featured Topic: |
![]() |
![]()
![]()
|
|
Expert Technical Advice: |
![]() |
![]()
Featured Expert: Paul Hinsberg
Category: Active Directory and/or Migration
Dear Paul:
Ever since I implemented AD on my domain, local machines cannot access each other's shares, nor can their administrative ($) shares be accessed over the network. It doesn't matter if I attempt to access the share as a domain admin or as local machine admin, both of which can log into the machine locally with full rights. As soon as I move away from the local machine and attempt the access from either neighborhood browser or the command line, access is denied.
Click here to read Paul Hinsberg's expert response.
|
![]()
|
Site Exclusives
|
| >> |
Microsoft updates baseline security tool
Redmond has released a new version of its Microsoft Baseline Security Analyzer software. Although version 1.2 of MBSA is free, the security tool's usefulness is limited, according to some Windows experts. |
| >> |
MS quiet as SCO goes nuclear on Novell
Everyone thought Microsoft's Martin Taylor was going to be the big party-crasher at LinuxWorld this week. As it turned out, Taylor's "get the facts" anti-Linux routine paled in comparison to the SCO Group's bombshell: a big, fat lawsuit against Novell. Click here to read more about the bomb dropped on Novell. |
| >> |
Oops! True IT blooper #123: The cleaning caper
Which is more hazardous to your computers -- dust bunnies or Windex? You might be surprised at the answer. Here's systems administrator Kevin MacKinnon's tale about how hiring the best cleaning company led to a squeaky clean yet inoperable office. |
![]()
| Tip of the Week: Removing service packs and hotfixes that leave Win2k unbootable |
| If a system has been left unbootable due to a service pack or hotfix, the first course of action would be to boot to safe mode and remove the SP or hotfix. But sometimes even safe mode is not accessible, and even the "Boot From Last Known Good Configuration" does not work. In cases like this, the best next step (short of a repair operation or a parallel install) is to use the Recovery Console to manually restore the
files that were replaced by the SP or hotfix. Here is the procedure. |
| >> |
Click here for the full tip. |
![]()
|
|
Site Highlights |
![]() |
![]()
![]() |
White Paper: Is your monitor taking up too much space?
Learn why more companies are transitioning from legacy CRT to LCD flat-panels with this white paper, "Industry Transition to LCD Flat-Panel Monitors."
Click here to download this report and learn about this new trend.
![]()
White Paper: Slash fax charges by 20-80%
Get an overview of fax industry terms like V.34 and JBIG Document Compression and learn how to slash your long distance fax phone charges.
Read this white paper.
|
![]() |
![]() |
![]() |
Webcast: Mastering IT service reporting
Register and join us for this live webcast, January 29.
At this webcast, you'll learn about how to master IT reporting and leverage different reports to help set essential standards and guidelines for maximum value and return.
|
![]() |
![]()
|
![]() |
![]()
![]() |
|
Use our one-click signup to start receiving our free Exchange tips and advice!
|
![]() |
| Enter your e-mail and start receiving Exchange Advisor. |
![]() |
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
| Don't miss the boat! |
| Register for Enterprise Messaging Decisions 2004. At this free conference, you'll see and hear industry expert Mark Minasi discuss Longhorn; he'll also teach you how to achieve a more secure e-mail server. |
Apply today! |
|
![]()
![]()
| Office 2003 upgrade |
| Considering an upgrade to Office 2003? Check out our new section on making the Office 2003 upgrade decision. |
Check it out. |
|
![]()
| Visual Studio .NET |
| Get unlimited trial access to Microsoft Visual Studio .NET 2003 running on Windows Server 2003, as well as a library of other valuable Microsoft tools. |
Find out more. |
|
![]()
|
![]() |