![]() |
![]() |
![]() |
Issue Sponsored By:
>
SearchWin2000.com Webcasts
IN THIS ISSUE:
>
Top News of the Week
>
Week in Review
>
Survival Tips for the Windows Manager
>
Out of the Loop
| |
![]() |
| |
![]() |
SearchWin2000.com Webcasts
Sign up to receive the Webcast Alerts newsletter from SearchWin2000.com to hear about our latest webcasts with top experts. Webcast topics include Securing Computers Using GPOs, How to Stop Directory Harvest Attacks, Anti-Spam Best Practices, Exchange 2003 Migration Best Practices and more.
Subscribe now and you'll be notified of upcoming events!
|
| |
|
| |
![]()
![]()
> Microsoft to release enterprise version of its firewall
> Chip advances blowing up software price assumptions
> Too many users needlessly given admin privileges
> Microsoft releases free tool for Dell servers
> Storage appliance, the server alternative
![The Week In Review]()
![]()
How will Bill Gates' antivirus cliffhanger play out?
[by John Hogan, Managing Editor]
Will he or won't he? The suspense over whether Bill Gates will take the wraps off a Microsoft antivirus product at RSA's security conference this month is building to a crescendo.
All right, so it's mostly the media that are getting lathered up about this, but there are others with a keen interest in what Microsoft's co-founder has up his signature-sweater sleeve. Despite their practiced nonchalance about a giant entering their turf, AV vendors have to be feeling a little anxious these days. After all, Microsoft has already come up with antispyware and a malware removal tool that hits perilously close to their sweet spot.
> Click here to read more about Microsoft and antivirus software, as well as a wrap-up of the week's Windows news.
![]()
![Survival Tips for the Windows Manager]()
![]()
Chapter of the Week: Planning, implementing and maintaining routing and remote access
Remote network access isn't always just a technical headache -- it can also be a security nightmare. Learn how to dodge the bullets in this information-packed chapter. The topics include routing protocols, remote security and access policies, authentication, IPSec policy and troubleshooting.
Checklist: Preparing to deploy Active Directory
Brien M. Posey, MVP and technology consultant, provides a preparation checklist to help you plan for a trouble-free Active Directory deployment.
Learning Center: Open source a red hot issue
With companies like IBM and Sun initiating open source projects and Linux making inroads in enterprise administration, open source apps are becoming the first solid competition to Microsoft's firm hold on enterprise computing.
![Out of the Loop]()
![]()
Oops! True IT Blooper #169: The printer paradox
The IT department is the first to be called when a printer goes on the blink, but as reader G.H. explains, sometimes the problem is simply unintentional employee sabotage.
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!
|
SearchWin2000: Windows IT Software Downloads |
|
![]()
|
| Not a Member? We'll activate your membership with your subscription. |
|
![]() |
![]() |
![]() |
|
![]() |
|
![]() |
|