Title: SearchWin2000.com
Published by SearchWin2000.com 
searchWin2000This Week
June 14, 2004 >> Receive this e-mail as text  >> About this e-mail 
 In this Issue

>> From the Editor:
  • New Learning Guide: Migrating to Windows Server 2003
  • >> Featured Topic:
  • Crash Course: Passwords
  • >> Expert Technical Advice:
  • Featured Expert: Laura Hunter, Network Management
  • Site Exclusives:
    >>Pace of identity adoption picks up
    >>DNS aging and scavenging simplified
    >>Patch management is a shared burden, research finds
  • Tip of the Week: Blocking spyware via the ActiveX kill bit
  • >> Site Highlights:
  • Tracking user activities in the enterprise
  • Vendor webcast: Managing Exchange Storage with the Windows Storage Server 2003
  • Welcome to SearchSmallBizIT.com

  •  From the Editor:

    by Matt Danielsson, Associate Editor

    Considering Windows Server 2003? You're not alone. But how do you approach such a complex migration? How can you be sure you're getting the most use out of your investment and avoid the pitfalls, all while keeping your system secure? We have gathered a wealth of helpful information to assist you through the process, from planning to post-implementation troubleshooting.

    Our new Learning Guide, "Migrating to Windows Server 2003," features term definitions, relevant news articles, user-submitted tips, third-party tools and advice from some of the best experts in the field. Need an overview of the new features? Tune into one of the webcasts. Looking for an in-depth walkthrough of AD implementation and management? Yup, we've got that too. We even have dedicated sections for sticky areas like licensing and troubleshooting.

    Simply put, this is your one-stop-shopping spot for anything related to a Windows Server 2003 migration. All advice is categorized for your browsing convenience, so check it out today!

    --Matt


     Featured Topic:

    Crash Course: Passwords
    by Vandana Sharma, Assistant Editor

    In his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off vulnerabilities and attacks. Download this free chapter and find out how easily hackers can gather password information from your network. Also, get the scoop from our tipsters and site experts, and learn how to be a password pro.

    Read more about this topic

     Expert Technical Advice:

    Featured Expert: Laura Hunter
    Category: Network Management
    Dear Laura,
    I am running two Windows XP PCs at home in a workgroup. Both are 2.5 GHZ Celeron with 760MB Ram. One is hosting two shared apps. One is database lookups and the other app is Web based. If I try to access this app from a non-hosting machine, it is very slow. What could be causing this?
    Read Laura's expert response.

    Site Exclusives:
    >> Pace of identity adoption picks up
    Identity management software can be a challenge to deploy, but that hasn't deterred a lot of IT organizations. New research finds that the market for these products is hotter than previously anticipated.

    >> DNS aging and scavenging simplified
    Have you ever pinged a machine by name, got a reply, but when you attempted to connect to it, you connected to a different machine name or could not connect at all? If you nodded your head in agreement or mumbled something about this happening to you, then this article may shed some light.

    >> Patch management is a shared burden, research finds
    A new age of worms and malicious virus attacks has the patch management software market moving at a feverish pace, but new research from the Burton Group cautions that the patch is by no means a be-all, end-all "magic pill" for enterprise security.

    Tip of the Week:
    Administrators trying to come up with a proactive way to block spyware from infesting workstations often have to make difficult choices. Restricting the functionality of IE to prevent spyware from taking root can be cumbersome. Third-party programs require installation and maintenance to be useful. Switching to another browser doesn't always resolve the problem, either, as there are now breeds of spyware that operate through Netscape/Mozilla as well. Check out this registry hack which solves the problem without IE changes.
    >> Blocking spyware via the ActiveX kill bit

     Site Highlights

    Tracking user activities in the enterprise
    This white paper describes how to monitor user activities in a Windows environment. Learn what events you need to monitor and the intelligence to derive basic user activities reports.
    Download this white paper today!

    webcast: Managing Exchange Storage with the Windows Storage Server 2003
    Join Microsoft, EMC and LEGATO for a joint webcast and learn how to safely consolidate your Exchange data to EMC NetWin NAS devices built on Windows Storage Server 2003.
    This webcast is now available on demand -- view today.
    Welcome to SearchSmallBizIT.com
    Sign up now!
    Activate your subscription to our new sister site SearchSmallBizIT.com's "Small Business IT Tech Tip" and receive hands-on advice and how-to info on Windows Small Business Server, Exchange and more.


    Active Directory Tip
    Enter your e-mail and start receiving Active Directory Tip.
    E-mail
      
    Not a member? We'll activate your membership with your subscription.


    Win2000 careers
    Visit the SearchWin2000.com Career Center, powered by Dice and find more than 27,000 tech jobs. Search for jobs by region, skills or titles!
    Visit today.


    Fax integration
    This guide outlines how fax works together with Office to deliver clear and substantial benefits to users. See usage examples of Office-to-Fax integration and benefits to your organization.
    Download now.

    Message security
    Unlike in-house solutions that need daily fine-tuning, FrontBridge enterprise message security solutions are fully managed, perimeter-based and proactive. Find out more in this white paper.
    Read now.

      A B O U T   T H I S   N E W S L E T T E R
    TechTarget
    Contact us:
    SearchWin2000
    MemberServices
    117 Kendrick Street, Suite 800
    Needham, MA 02494

    This e-newsletter is published by SearchWin2000.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
    TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals.
    Copyright 2004 TechTarget. All rights reserved.

    To unsubscribe from "Updates on new site content":

    Go to unsubscribe: http://searchWin2000.techtarget.com/unsubscribe?track=NL-119&ad=484762

    Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

    Reply via email to