![searchWin2000]() ![This Week]() |
![]() |
![]() |
|
|
In this Issue |
![]() |
![]()
| >> |
From the Editor:
New Learning Guide: Migrating to Windows Server 2003 |
| >> |
Featured Topic:
Crash Course: Passwords |
| >> |
Expert Technical Advice:
Featured Expert: Laura Hunter, Network Management
Site Exclusives:
>>Pace of identity adoption picks up
>>DNS aging and scavenging simplified
>>Patch management is a shared burden, research finds
Tip of the Week: Blocking spyware via the ActiveX kill bit |
| >> |
Site Highlights:
Tracking user activities in the enterprise
Vendor webcast: Managing Exchange Storage with the Windows Storage Server 2003
Welcome to SearchSmallBizIT.com |
![]()
|
|
From the Editor: |
![]() |
![]()
by Matt Danielsson, Associate Editor
![]()
Considering Windows Server 2003? You're not alone. But how do you approach such a complex migration? How can you be sure you're getting the most use out of your investment and avoid the pitfalls, all while keeping your system secure? We have gathered a wealth of helpful information to assist you through the process, from planning to post-implementation troubleshooting.
Our new Learning Guide, "Migrating to Windows Server 2003," features term definitions, relevant news articles, user-submitted tips, third-party tools and advice from some of the best experts in the field. Need an overview of the new features? Tune into one of the webcasts. Looking for an
in-depth walkthrough of AD implementation and management? Yup, we've got that too. We even have dedicated sections for sticky areas like licensing and troubleshooting.
Simply put, this is your one-stop-shopping spot for anything related to a Windows Server 2003 migration. All advice is categorized for your browsing convenience, so check it out today!
--Matt
|
![]()
|
|
Featured Topic: |
![]() |
![]()
Crash Course: Passwords
by Vandana Sharma, Assistant Editor
![]()
In his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off vulnerabilities and attacks. Download this free chapter and find out how easily hackers can gather password information from your network. Also, get the scoop from our tipsters and site experts, and learn how to be a password pro.
Read more about this topic
|
![]()
|
|
Expert Technical Advice: |
![]() |
![]()
Featured Expert: Laura Hunter
Category: Network Management
Dear Laura,
I am running two Windows XP PCs at home in a workgroup. Both are 2.5 GHZ Celeron with 760MB Ram. One is hosting two shared apps. One is database lookups and the other app is Web based. If I try to access this app from a non-hosting machine, it is very slow. What could be causing this?
Read Laura's expert response.
|
![]()
|
Site Exclusives:
|
| >> |
Pace of identity adoption picks up
Identity management software can be a challenge to deploy, but that hasn't deterred a lot of IT organizations. New research finds that the market for these products is hotter than previously anticipated.
|
| >> |
DNS aging and scavenging simplified
Have you ever pinged a machine by name, got a reply, but when you attempted to connect to it, you connected to a different machine name or could not connect at all? If you nodded your head in agreement or mumbled something about this happening to you, then this article may shed some light.
|
| >> |
Patch management is a shared burden, research finds
A new age of worms and malicious virus attacks has the patch management software market moving at a feverish pace, but new research from the Burton Group cautions that the patch is by no means a be-all, end-all "magic pill" for enterprise security. |
![]()
| Tip of the Week: |
| Administrators trying to come up with a proactive way to block spyware from infesting workstations often have to make difficult choices. Restricting the functionality of IE to prevent spyware from taking root can be cumbersome. Third-party programs require installation and maintenance to be useful. Switching to another browser doesn't always resolve the problem, either, as there are now breeds of spyware that operate
through Netscape/Mozilla as well. Check out this registry hack which solves the problem without IE changes. |
| >> |
Blocking spyware via the ActiveX kill bit |
![]()
|
|
Site Highlights |
![]() |
![]()
![]() |
Tracking user activities in the enterprise
This white paper describes how to monitor user activities in a Windows environment. Learn what events you need to monitor and the intelligence to derive basic user activities reports.
Download this white paper today!
![]()
webcast: Managing Exchange Storage with the Windows Storage Server 2003
Join Microsoft, EMC and LEGATO for a joint webcast and learn how to safely consolidate your Exchange data to EMC NetWin NAS devices built on Windows Storage Server 2003.
This webcast is now available on demand -- view today.
|
![]() |
![]() |
![]() |
Welcome to SearchSmallBizIT.com
Sign up now!
Activate your subscription to our new sister site SearchSmallBizIT.com's "Small Business IT Tech Tip" and receive hands-on advice and how-to info on Windows Small Business Server, Exchange and more.
|
![]() |
![]()
|
![]() |
![]()
![]() |
|
Active Directory Tip
|
![]() |
| Enter your e-mail and start receiving Active Directory Tip. |
![]() |
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
| Win2000 careers |
| Visit the SearchWin2000.com Career Center, powered by Dice and find more than 27,000 tech jobs. Search for jobs by region, skills or titles! |
Visit today. |
|
![]()
![]()
| Fax integration |
| This guide outlines how fax works together with Office to deliver clear and substantial benefits to users. See usage examples of Office-to-Fax integration and benefits to your organization. |
Download now. |
|
![]()
| Message security |
| Unlike in-house solutions that need daily fine-tuning, FrontBridge enterprise message security solutions are fully managed, perimeter-based and proactive. Find out more in this white paper. |
Read now. |
|
![]()
|
![]() |
![]() |
|