Title: Today's News
![]() |
![]() |
![]() |
Issue Sponsored By:
> HP
![]()
IN THIS ISSUE:
>
Administrators prove to be spam pragmatists
>
Workplace Web use: Give 'em an inch ...
>
Hackers target Microsoft's .jpg flaw
>
More headlines
>
Changes in Windows XP SP2 for handling USB block storage devices
>
'Planning, implementing and maintaining a security infrastructure'
>
How sweet it is!
>
The Missing Link: Mass mail mountebanks alive and spamming
![Headlines]()
![]()
Administrators prove to be spam pragmatists
[SearchExchange.com]
IT organizations watched the recent controversy over the proposed Sender ID standard with only a passing interest. They've got bigger phish to fry.
MORE INFO:
> What exactly is DNS?
> See the going price for zombie PCs
Workplace Web use: Give 'em an inch ...
[SearchWindowsSecurity.com]
Good policy enforcement can prevent Internet misuse and lawsuits.
Hackers target Microsoft's .jpg flaw
[Associated Press]
Exploits of the recently announced .jpg vulnerability that affects a number of Microsoft products have been limited and relatively harmless so far, but security experts fear that it's only a matter of time before they become more widespread and damaging.
More headlines
[From around the Web]
Munich set to approve Linux despite patent worries (Reuters)
AV-disabling Bagle variant may take off (SearchSecurity.com)
Microsoft targets SMBs with RFID pilot (eWEEK)
Microsoft, Amazon team up in online fraud action (AFP)
![]()
TIP OF THE DAY:
Changes in Windows XP SP2 for handling USB block storage devices
Microsoft has introduced some changes into Windows XP Service Pack 2 that allow an administrator slightly more granular control over how USB removable drives are handled. A new storage device policy named WriteProtect makes it possible to prevent all removable USB drives from being written to. They will still act as readable devices, but they cannot be written to.
![]() |
![]() |
| |
![]() |
![AD]() |
![]() |
Exchange 2003 Migration Best Practices
This session outlines some of the best practices that HP has learned with hundreds of customer engagements. The session will describe some of the fundamental approaches that organizations should take for migrations both intra-organization and inter-organization.
Click here to register.
|
| |
|
![]() |
![]() |
CHAPTER OF THE WEEK:
'Planning, implementing and maintaining a security infrastructure'
Good security begins with careful planning, followed by careful implementation, and it stays current by vigilant maintenance. Fail any of these three steps and you're asking for serious trouble. Is your system as safe as you think it is? Follow the walk-through in this chapter from the book "MCSE Planning a Windows Server 2003 Network Study Guide," by Diana Huggins, to find out.
WINDOWS WORD CHALLENGE:
How sweet it is!
This is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security.
What is it?
![The Missing Link]()
![]()
Mass mail mountebanks alive and spamming
[Reuters]
Hope you're sitting down for this shocker -- some of your spicy spam is a sham. British scientists have determined that most of the brand-name (ahem) "performance" medication sold on the Internet -- you probably get liberal doses of it in your inbox -- isn't the real deal. More than half the time, you're not getting the famous little blue pill; you're getting the little bogus pill. Researchers who analyzed the stuff found that more
than half of these mass mail meds don't come from the mother ship (Pfizer Inc.) and are instead watered-down versions of the genuine article. In other words, buying this stuff is akin to buying a Rolex off the street for $20. And you wouldn't want to swallow either of them.
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!
|
SearchWin2000: Tips from our experts |
|
![]()
|
| Not a Member? We'll activate your membership with your subscription. |
|
![]() |
![]() |
![]() |
|
![]() |
|
![]() |
|