=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
Nov. 26, 2003
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSOR:
SearchNetworking.com Career Center
http://searchNetworking.com/r/0,,18808,00.htm?track=NL-314
___________________________________________________________________
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Today's Featured Tip: The shutdown event tracker 
   - Secure incoming connections on XP 
   - What's involved in risk assessment?

2. ESSENTIAL LINKS
   - Networking Column: Making sense of your technology plan
   - New frontiers of network and systems management
   - Planning key to Army's award-winning combat network
   - Featured Topic: The evolution of intrusion detection
___________________________________________________________________ 
*******>> Sponsored by SearchNetworking.com Career Center <<******* 

Searching for career resources? Visit the recently launched
SearchNetworking.com Career Center powered by Dice and find training,
certification and resume resources along with over 27,000 IT job
openings to search through. Get e-mails when a listing matches your
search criteria, have your profile automatically sent to Dice.com
member companies, access a host of career resources and tips and much
more. http://searchNetworking.com/r/0,,18808,00.htm?track=NL-314

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

THE SHUTDOWN EVENT TRACKER 
Barrie Sosinsky
 
Windows Server 2003 has added a feature, called the Shutdown Event
Tracker, that can be useful to you should your server crash. The
Shutdown Event Tracker is also useful for diagnosing the state of
your server at the time of shutdown, to determine both the events
occurring as services are turned off, and perhaps more importantly,
their sequence.
 
Read the entire tip here: 
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci938600,00.html?track=NL-314
  

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SECURE INCOMING CONNECTIONS ON XP 
by Barrie Sosinsky
 
There may come a time that you want to set up remote access to a
location that doesn't have a Windows 2000 or 2003 server. If that's
the case, you can use Windows XP as a Remote Access Server, accepting
incoming calls from outside clients. XP doesn't offer the same level
of security that Windows RRAS does; you can't use call-back to
authenticate a user for example. However, even simple incoming
connections can be made a little more secure by using the encryption
feature in XP's Incoming Connection Properties dialog box.
 
Read the entire tip here:
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci918222,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
WHAT'S INVOLVED IN RISK ASSESSMENT? | Rick Cook 

Backing up so that you can recover in the event of untoward events,
be they simple hardware failure or disasters, starts with assessment.
A thorough risk assessment should point out vulnerabilities you can
fix now, possibly heading off trouble, as well as providing a
starting point for disaster recovery planning for the risks you can't
fix.

Click here to find out more about disaster recovery planning:
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci888468,00.html?track=NL-314

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
MAKING SENSE OF YOUR TECHNOLOGY PLAN | Carrie Higbie

It's that time again when your IT budgets are taking form. Added to
this already mundane, but necessary task, is a new buzzword in the
industry. OK, well it's not brand new, but it is getting a lot more
exposure than ever before. The buzzword of the day is "Technology
Planning." This entire process involves predicting anything and
everything that has to do with your company's technology. In an
effort to demystify this process, it is important to understand the
key elements and considerations for a technology plan, and how it
differs from an IT budget. This column sheds light on the entire
process:
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci938573,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NEW FRONTIERS OF NETWORK AND SYSTEMS MANAGEMENT |
SearchNetworking.com

To reduce operational costs, customers look to network and system
management systems that will diagnose and report on problems, and
also fix problems without requiring constant IT staff intervention. 

This PowerPoint presentation from Jean-Pierre Garbani's session at
Networking Decisions 2003 provides you with the value proposition of
network and systems management systems and how they provide effective
services that increase the business productivity and improve
operation staff efficiency.
http://searchnetworking.techtarget.com/searchNetworking/downloads/ng_Garbani.ppt?track=NL-314

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
PLANNING KEY TO ARMY'S AWARD-WINNING COMBAT NETWORK

The U.S. Army's 335th Theater Signal Command deployed the military's
largest combat network in 120 days, a feat that earned it
SearchNetworking.com's Networking Innovator Award. 
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci937978,00.html?track=NL-314
  

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
EVOLUTION OF INTRUSION DETECTION | SearchNetworking.com

Intrusion detection systems have come under scrutiny as intrusion
prevention systems take the spotlight. Which one is best for your
network? Decide with these resources.
http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci938035,00.html?track=NL-314
 


___________________________________________________________________
****************  CONTACT SEARCHNETWORKING.COM   *****************

E-mail us at mailto:[EMAIL PROTECTED]

Click here for specific contact information and to meet our editorial
team:
http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314

To sponsor this or any other TechTarget newsletter e-mail Gabrielle
DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED]

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media.  http://www.techtarget.com?track=NL-314

Copyright 2003 TechTarget. All rights reserved.
____________________________________________________________________

To unsubscribe from "Network and Systems Management Tip":

Reply to this e-mail with REMOVE in the Subject line
 - OR -
Go to unsubscribe:
http://SearchTechTarget.com/u?cid=472790&track=NL-314
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.


Reply via email to