Title: SearchWin2000.com
Published by SearchWin2000.com 
searchWin2000This Week
June 28, 2004 >> Receive this e-mail as text  >> About this e-mail 
 In this Issue

>> From the Editor:
  • Find help for spyware infestation
  • >> Featured Topic:
  • Crash Course: Spyware
  • >> Expert Technical Advice:
  • Featured Expert: Tony Northrup, IIS and Web Administration
  • Site Exclusives:
    >>Expert Advice: When should I back up users' private keys?
    >>Expert Advice: Problems printing e-mail after Norton uninstall
    >>SQL Server counters - Part 2
  • Tip of the Week: To delegate or not to delegate
  • >> Site Highlights:
  • Chapter Download: 'ODSOLE'
  • Webcast Alert: Outsourcing Exchange
  • New! White paper alert

  •  From the Editor:

    by Brent Sheets, Editor

    Apparently, Uncle Sam loathes spyware as much as the rest of us. The "Safeguard Against Privacy Invasions Act" has been substituted with a more formidable anti-spyware bill called the SPY ACT, or "Securely Protect Yourself Against Cyber Trespass." Who says congress is wasting the taxpayer's money? Thinking up clever acronyms like that doesn't come cheap, you know? The SPY ACT will provide penalties up to a whopping $3 million and prohibit key-stroke logging, hijacking and advertisements that can't be closed by the user. It also requires "clear and conspicuous notice" of spyware hidden within downloads. The bill gained recent approval from a House of Representatives subcommittee and is one step closer to becoming law. You can track the bill's progress here.

    If you're looking for a more immediate solution, I've assembled an arsenal of best-of-breed applications that will eliminate spyware and other sneaky miscreants from your system. Powerful, yet free, these software applications scan, detect, clean up and even provide immunization to prevent these covert pests from ever returning. Rid your system of spyware and other pests -- here's how.

    Whether you're had problems with spyware or just wish to opine, feel free to send us your feedback, thoughts or comments. Thanks.


     Featured Topic:

    Crash Course: Spyware
    by Jennifer Luscomb

    Spyware is often considered a malicious thief, but it can have legitimate uses. It can yield vital information used in investigations. For example, spyware can determine whether an employee is stealing confidential company information. Check out this compilation of tips and expert advice to help you weigh the pros and cons of spyware, and learn how to best protect yourself.

    Read more about this topic

     Expert Technical Advice:

    Featured Expert: Tony Northrup
    Category: IIS and Web Administration

    Dear Tony,
    I installed and started IIS in my home network. I can access index.html on this server from other PCs. The problem is my home network accesses the Internet via TDSL. That means I get a new IP address every 24 hours. IIS Server doesn't identify the new IP and the old IP is invalid. Is there a way to have IIS automatically update the IP?
    Read Tony's expert answer.

    Site Exclusives:
    >> Expert Advice: When should I back up users' private keys?
    Dear Roberta Bragg,
    We are currently looking to support encryption on the laptops of our home-based users. I'm looking to find out when I should back up users' private keys. Can you help?

    >> Expert Advice: Problems printing e-mail after Norton uninstall
    Dear Bernie Klinder,
    My license for Norton Antivirus ran out, so I uninstalled it. Now I can't print e-mails, and when I try Windows Update, IE6 goes through the motions, but returns a blank page. What's going on?

    >> SQL Server counters - Part 2
    In a previous tip we looked at the Performance Monitor and discussed its default behavior. In Part 2, we will look further at some of the specific counters that you need to pay attention to.

    Tip of the Week:
    Being able to offload menial or low-level tasks to properly trained and eager (or conscripted) users is a bonus to any admin. However, there are numerous operations, tasks and functions that should never be delegated. Delegating certain forest level or domain level capabilities to non-admin users can place your entire forest or domain at serious risk. Find out which tasks can pose the most risk.
    >> To delegate or not to delegate

     Site Highlights

    Chapter Download: 'ODSOLE'
    From this week's chapter download, learn the basics of COM threading models and concurrency, then dive into the nitty-gritty of object automation.
    Download this chapter excerpt today.

    Webcast Alert: Outsourcing Exchange
    In-depth comparison of the outsourced Exchange Server vs. in-house solution.
    Join this webcast and address your day-to-day concerns such as complex management of an Exchange Server, weakened quality/delayed problem fixes and more.
    New! White paper alert
    Microsoft Office Live Communications Server 2003 Architecture and Deployment
    Enabling information workers to connect with peers, business processes and information in real-time raises productivity and reduces maintenance costs. This white paper discusses a solution that allows information workers to take advantage of real-time communications without compromising the security and manageability of enterprise networks.


    Administrator Tip
    Enter your e-mail and start receiving Administrator Tips.
    E-mail
      
    Not a member? We'll activate your membership with your subscription.


    ASP.NET Resource Kit
    The ASP.NET Resource Kit is an essential resource for any Web developer, whether you are already using ASP.NET today, or looking to learn ASP.NET.
    Download today.


    SearchSmallBizIT.com
    Activate your subscription to our new sister site SearchSmallBizIT.com's "Small Business IT Tech Tip" and receive hands-on advice and how-to info on Windows Small Business Server, Exchange and more.
    Sign up now.

    Stop spam now
    Learn Chick-fil-A's secret recipe for eliminating spam and viruses while improving e-mail security and productivity with a managed services solution.
    Sign up now.

      A B O U T   T H I S   N E W S L E T T E R
    TechTarget
    Contact us:
    SearchWin2000
    MemberServices
    117 Kendrick Street, Suite 800
    Needham, MA 02494

    This e-newsletter is published by SearchWin2000.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
    TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals.
    Copyright 2004 TechTarget. All rights reserved.

    To unsubscribe from "Updates on new site content":

    Go to unsubscribe: http://searchWin2000.techtarget.com/unsubscribe?track=NL-119&ad=485695

    Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

    Reply via email to