Title: searchWin2000.com - Today's News: Headlines, trends and technical advice for Windows pros
A newsletter published by TechTarget 
 January 28, 2004 >> Receive this e-mail as text   >> About this e-mail 
ISSUE SPONSORED BY:
>>  SiteScope: Cost-effective systems monitoring - Free white paper
 Today's Highlights  

>>  LEAD STORY:  Longhorn may bridge the thin, fat client worlds
>>  NEWS:  Potent Mydoom worm flooding inboxes
>>  IT SURVIVAL KIT:  Designing AD security through risk analysis
>>  THE MISSING LINK:  Clinton legacy -- Eight years, two e-mails
 News and Top Stories  

LEAD STORY
Longhorn may bridge the thin, fat client worlds  (SearchWin2000.com)
If all goes as planned, Microsoft's Longhorn will offer a compromise for those mired in the debate over thin versus fat clients.
More on this topic:
Desktop decisions: A special report
Face-off: Thin clients vs. fat clients
SPONSORED BY: SiteScope

Keep your IT systems & applications up & running 24x7

Need to keep your IT systems, applications and Web sites up and running 24x7, but can't break the bank? SiteScope agentless systems monitoring software lowers the TCO of systems monitoring, and because you don't need to install agents on production systems, you'll be up and running in 20 minutes.


Click here to download your free white paper, Agentless Monitoring, Reduce the TCO of Systems Monitoring
NEWS
Potent Mydoom worm flooding inboxes (SearchSecurity.com)
A new mass-mailing worm called Mydoom-A is infecting one in every 41 e-mail messages.

NEWS
Best practices for cleaning up Mydoom mess (SearchSecurity.com)
Updated antivirus signatures will write off the virile Mydoom-A worm. In the meantime, network administrators should follow best practices to prevent further infection.

DAILY HEADLINES
All headlines, including those below, are available from our news page.
  > Mydoom-A: Is it a Mimail variant?
  > Microsoft bulks up security R&D budget
  > Microsoft patches latest Word
  > Microsoft steers away from object orientation
 VIEW ALL NEWS AND TOP STORIES

 Announcements & Links  


IT SURVIVAL KIT
Designing AD security through risk analysis
The first step toward establishing a security solution for AD is to identify threats. The second step is to identify the sources of those threats. You then need to establish a proactive or reactive strategy for dealing with the threats.
Read this tip to find out how.


ASK THE EXPERT
Books vs. classes for certification
Dear Ed,
Do a lot of people read books to educate themselves to get certified or do you find most attend a classroom setting to learn?
Click here to read Ed Tittel's expert answer.


CHAPTER OF THE WEEK
Windows Terminal Services
This chapter from the book Citrix MetaFrame Access Suite for Windows Server 2003: The Official Guide, by Steve Kaplan, Franny Kelly, Tim Reeser and Alan Wood, is the perfect resource for you if you are looking to bone up on Windows 2000 and 2003 Terminal Services. Terminal Services is required for server-based computing whether you use Citrix MetaFrame or not. The topics include migration, domain and application considerations, Remote Desktop Client, Remote Desktop Protocol and various licensing issues.

EXPERT WEBCAST
Effective security management
In this webcast, security expert Scott Blake discusses some best practices for effective security management, including how to minimize security threats and ensure optimal uptime.
Click here to watch and listen to this expert webcast.


TIP CONTEST
Win a new 256 MB digital audio player!
Get your Windows related IT tips submitted now! In addition to being included in our Hall of Fame, the user who submits this month's winning tip will receive an iRiver iFP-190T 256 MB digital audio player!
Click here to submit and read more about this month's prize.



THE MISSING LINK
Clinton legacy -- Eight years, two e-mails

Evidently, former President Bill Clinton was like any other chief executive -- he didn't send e-mails, but his handlers sure did. The archives of the Clinton library will house a whopping 40 million electronic dispatches. The prez actually sent two of them, and one of those was a test to see whether he knew how to push the buttons. Who was the lucky recipient of that sole e-mail? No, not her! It was former Sen. John Glenn -- a space pioneer for man, and a cyberspace pioneer for Mr. Clinton, who prefers the old-fashioned phone and the older-fashioned hard-copy note. So Al Gore may have helped "invent" the Internet, but that doesn't mean his boss used it.



Sign up for our white paper alerts today!
Enter your e-mail and start receiving White Paper Alerts.
E-mail
  
Not a member? We'll activate your membership with your subscription.


  Contact Us  

NEWS EDITOR
John Hogan
[EMAIL PROTECTED]
Send me your news, press releases and product announcements.


SENIOR SITE EDITOR
Marilyn Cohodas
[EMAIL PROTECTED]
Send me your original articles and best practices.


SITE EDITOR
Christine Polewarczyk
[EMAIL PROTECTED]
Send me your bloopers and Featured Topic ideas.


SENIOR NEWS WRITER
Margie Semilof
[EMAIL PROTECTED]
Send me your news and story ideas.


ASSOCIATE EDITOR
Matt Danielsson
[EMAIL PROTECTED]
Send me your ideas for webcasts and discussion day topics.


ASSISTANT EDITOR
Jennifer Luscomb
[EMAIL PROTECTED]
Send me your favorite Web sites and white papers.


ASSISTANT EDITOR
Vandana Sharma
[EMAIL PROTECTED]
Send me your tips and your true IT bloopers.


SENIOR SITE SALES MANAGER
Gabrielle Derussy
[EMAIL PROTECTED]
Contact me to sponsor this or any other TechTarget newsletter.


A B O U T   T H I S   N E W S L E T T E R
This newsletter is published by TechTarget, the most targeted IT media.
Copyright 2004 TechTarget. All rights reserved.
To unsubscribe from "Today's News":
  -  Reply to this e-mail with REMOVE in the Subject line
OR
  -  Go to unsubscribe and enter your e-mail address to cancel your subscription

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Reply via email to