![searchWin2000]() ![This Week]() |
![]() |
![]() |
|
|
In this Issue |
![]() |
![]()
| >> |
From the Editor:
Find help for spyware infestation |
| >> |
Featured Topic:
Crash Course: Spyware |
| >> |
Expert Technical Advice:
Featured Expert: Tony Northrup, IIS and Web Administration
Site Exclusives:
>>Expert Advice: When should I back up users' private keys?
>>Expert Advice: Problems printing e-mail after Norton uninstall
>>SQL Server counters - Part 2
Tip of the Week: To delegate or not to delegate |
| >> |
Site Highlights:
Chapter Download: 'ODSOLE'
Webcast Alert: Outsourcing Exchange
New! White paper alert |
![]()
|
|
From the Editor: |
![]() |
![]()
by Brent Sheets, Editor
![]()
Apparently, Uncle Sam loathes spyware as much as the rest of us. The "Safeguard Against Privacy Invasions Act" has been substituted with a more formidable anti-spyware bill called the SPY ACT, or "Securely Protect Yourself Against Cyber Trespass." Who says congress is wasting the taxpayer's money? Thinking up clever acronyms like that doesn't come cheap, you know? The SPY ACT will provide penalties up to a whopping $3 million and prohibit key-stroke logging, hijacking and advertisements
that can't be closed by the user. It also requires "clear and conspicuous notice" of spyware hidden within downloads. The bill gained recent approval from a House of Representatives subcommittee and is one step closer to becoming law. You can track the bill's progress here.
If you're looking for a more immediate solution, I've assembled an arsenal of best-of-breed applications that will eliminate spyware and other sneaky miscreants from your system. Powerful, yet free, these software applications scan, detect, clean up and even provide immunization to prevent these covert pests from ever returning. Rid your system of spyware and other pests -- here's how.
Whether you're had problems with spyware or just wish to opine, feel free to send us your feedback, thoughts or comments. Thanks.
|
![]()
|
|
Featured Topic: |
![]() |
![]()
Crash Course: Spyware
by Jennifer Luscomb
![]()
Spyware is often considered a malicious thief, but it can have legitimate uses. It can yield vital information used in investigations. For example, spyware can determine whether an employee is stealing confidential company information. Check out this compilation of tips and expert advice to help you weigh the pros and cons of spyware, and learn how to best protect yourself.
Read more about this topic
|
![]()
|
|
Expert Technical Advice: |
![]() |
![]()
Featured Expert: Tony Northrup
Category: IIS and Web Administration
Dear Tony,
I installed and started IIS in my home network. I can access index.html on this server from other PCs. The problem is my home network accesses the Internet via TDSL. That means I get a new IP address every 24 hours. IIS Server doesn't identify the new IP and the old IP is invalid. Is there a way to have IIS automatically update the IP?
Read Tony's expert answer.
|
![]()
|
Site Exclusives:
|
| >> |
Expert Advice: When should I back up users' private keys?
Dear Roberta Bragg,
We are currently looking to support encryption on the laptops of our home-based users. I'm looking to find out when I should back up users' private keys. Can you help?
|
| >> |
Expert Advice: Problems printing e-mail after Norton uninstall
Dear Bernie Klinder,
My license for Norton Antivirus ran out, so I uninstalled it. Now I can't print e-mails, and when I try Windows Update, IE6 goes through the motions, but returns a blank page. What's going on?
|
| >> |
SQL Server counters - Part 2
In a previous tip we looked at the Performance Monitor and discussed its default behavior. In Part 2, we will look further at some of the specific counters that you need to pay attention to. |
![]()
| Tip of the Week: |
| Being able to offload menial or low-level tasks to properly trained and eager (or conscripted) users is a bonus to any admin. However, there are numerous operations, tasks and functions that should never be delegated. Delegating certain forest level or domain level capabilities to non-admin users can place your entire forest or domain at serious risk. Find out which tasks can pose the most risk. |
| >> |
To delegate or not to delegate |
![]()
|
|
Site Highlights |
![]() |
![]()
![]()
|
![]() |
![]()
![]() |
|
Administrator Tip
|
![]() |
| Enter your e-mail and start receiving Administrator Tips. |
![]() |
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
| ASP.NET Resource Kit |
| The ASP.NET Resource Kit is an essential resource for any Web developer, whether you are already using ASP.NET today, or looking to learn ASP.NET. |
Download today. |
|
![]()
![]()
| SearchSmallBizIT.com |
| Activate your subscription to our new sister site SearchSmallBizIT.com's "Small Business IT Tech Tip" and receive hands-on advice and how-to info on Windows Small Business Server, Exchange and more. |
Sign up now. |
|
![]()
| Stop spam now |
| Learn Chick-fil-A's secret recipe for eliminating spam and viruses while improving e-mail security and productivity with a managed services solution. |
Sign up now. |
|
![]()
|
![]() |
![]() |
|