|
||||||||||||
Three new IE vulnerabilities discovered
[SearchWindowsSecurity.com]
Attackers can exploit Internet Explorer holes to bypass a security feature in XP SP2, tricking users into downloading malicious files.
Sun, Microsoft to outline alliance
[CNET News.com]
Sun Microsystems and Microsoft will provide an update on the progress of their product integration project next month, according to Sun CEO Scott McNealy. Microsoft chairman Bill Gates and Sun's CTO will provide details on efforts such as integrating single sign-on software.
More headlines
[From around the Web]
XML complexity introduces security risks (SearchWebServices.com)
Web hosting through Windows (InternetNews.com)
Microsoft accused of destroying e-mails (Associated Press)
MS warns Asian governments of Linux suits (Reuters)
TIP OF THE DAY: Analyzing your SQL Server log files
Your SQL Server transaction log file is used for a broad variety of purposes. The transaction log stores data modifications to your database which includes all inserts, deletes and updates. Data in the transaction log is used to commit data when a multistep change is approved, or rollback changes when you need to deal with a disaster recovery situation where you need to prevent data loss.
OOPS! TRUE IT BLOOPERS: Share a laugh and win $100!
We have more than 150 amazing but true IT Bloopers for your enjoyment in our Blooper archive. But that's not enough - we want to hear YOUR best story! Surely, you've witnessed - or perhaps been the main character of - a tale so funny and/or absurd it must be shared. Now is the time to send it in! We're giving away a $100 Amazon.com gift certificate to the best submission between now and November 30, 2004.
CHAPTER OF THE WEEK: 'Managing desktop configs'
Need to keep your system safe from clumsy or malicious users? This chapter examines the environment variables that can be directly or indirectly manipulated through the Registry to minimize Windows vulnerability.
Mommy's little plaintiff -- kid sues welcher mom over PC
[SearchCIO.com]
A case in Hong Kong is a prime example of why you should never ever let your kids watch Judges Judy or Wapner. When a boy's mother welched on a deal to buy him a PC, he didn't take the law into his own hands -- he took her to court.
|
|
|||||||||||||||||||||||||
|
This e-newsletter is published by SearchWin2000.com, a targeted Web site from TechTarget, the most targeted IT media and events company. Copyright 2004 TechTarget. All rights reserved. To unsubscribe from "Today's News": Go to unsubscribe: http://searchWin2000.techtarget.com/u?cid=497313&lid=430722&track=NL-118 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.
Contact Us: |
||||
