Privacy expert finds issue with Word
A leading privacy expert released a report Wednesday suggesting a feature in Microsoft©s Word product allows users of the word processing software to be tracked the same way Internet surfers are. Richard Smith, Chief Technology Officer of the Privacy Foundation, says so-called ?Web
Bug© tracking images can be embedded in Word documents.
Microsoft polishes look of Windows
It's not a radical change, but Microsoft is clearly altering the look of Windows. Microsoft Corp. may still be more than a month away from releasing the first beta build of its Windows 2000 successor. But the latest alpha build of "Whistler" shows how
Microsoft is changing the look and feel of Windows.
Service Pack 1 for Windows 2000 stops the useful 'Run As' trick from working
A bug in Windows 2000 Service Pack 1 cripples the useful "Run As" tool that allows administrators to be logged on with a regular account, but run applications with another account's privileges. Here's how to work around the problem.
Learn to Subnet.com
A free lecture based tutorial on IP addressing and subnetting. It combines audio with a slide presentation using Windows Media Player and is split into specific topics for easy downloading. The site also includes a DNS primer in the same format, and both lectures are available on
Terminal Services Advanced Client
The Terminal Services Advanced Client (TSAC) is available on the Windows 2000 SP1 CD in the 'valueadd' directory, and is not a component of SP1 itself. As such, the TSAC is not included in the SP1 Web download, but it can be downloaded separately from the TSAC
download page. The TSAC is a Win32©-based ActiveX? control (COM object) that can be used to run Terminal Services sessions within Microsoft Internet Explorer.
Microsoft Active Directory Problems Linger
Fundamental design problems with Microsoft's Active Directory (AD) that will affect early adopters of Windows 2000 (W2K), will not be fixed until next year, a senior analyst has warned. Ed Thompson, an analyst at Gartner, said the design problems,
which involve network performance and the stability of directory services when deployed to over 300 sites, are not fixed by the recent release of Service Pack 1 for W2K.
Malformed GMT Header in Outlook
A vulnerability has been discovered in Outlook and Outlook Express (all versions) which would permit a remote attacker to send an email to a target recipient and, when *received*, cause the recipients computer to execute arbitrary code. Source: NT BugTraq (Aug 18, 2000)
Microsoft DLL Help Database
Getting an error with a particular DLL and can't figure out what the file does, and where it came from? Just enter the file name into Microsoft's searchable database, and it will give you basic information about the file including a description of the DLL's function, what Microsoft
product installed the file, whether the file is self registering, and other details.
CERT urges installing IE patch
Carnegie Mellon University's CERT is urging users to install a recently issued Microsoft Corp. patch
relating to a previously discovered vulnerability in the Internet Explorer (IE) browser. The advisory from CERT was prompted by concerns that users may not understand the full scope of the problem
created by the hole -- or of implementing a work-around previously issued by Microsoft to fix it. The so-called IE Script hole allows attackers to embed malicious code on a victim's computer without the victim having to open any attachments or executable files. Source: ComputerWorld
(Aug 15, 2000)
The Windows 2000 Administration Tools package (Adminpak.msi) has been updated to include various fixes from Service Pack 1 (SP1). If you have already installed the Adminpak.msi package on your Windows 2000-based computer, its components are updated when you install
SP1. If you decide to install the Adminpak.msi package after you install SP1, use the Adminpak.msi package that is located in the I386 folder on the SP1 media.
Best Practices for Enterprise Security
A collection of white papers by Microsoft focusing on the different aspects of security in enterprise networks. The white papers are grouped into three general categories that reflect the different levels of knowledge needed to create and implement a successful security
concept. These include security backgrounders, primers, and best practices that discuss a series of real-life scenarios and implemented solutions.
Video Game Characters denounce randomly swinging blades
A coalition of video-game characters representing the nation's leading systems appeared before Congress Monday to decry "the pointless, deadly presence" of spinning blades in video-game landscapes. "We are here to demand an end to the shockingly casual placement of
dangerous blades in our places of work," said Tomb Raider star Lara Croft. Source: The Onion (Aug 11, 2000)
The Encyclopedia Mythica
An online encyclopedia of mythology, folklore, and legend with over 5,700 definitions of gods and goddesses, supernatural beings and legendary creatures and monsters from all over the world. Makes a great reference for generating computer/server names, project codenames, hard to
guess passwords, and a unique test user list for computer labs.
A comprehensive resource for DSL information including daily news, reader reviews of DSL services, assistance in locating ISP's, technical resources, FAQ's, list of providers, personal firewall testing, speed tests, and more. One of our favorite sites!
The myth of the Borg
Some sane thoughts on conspiracy theories about Microsoft and media coverage: "There is no giant, singleminded conspiracy at Microsoft, just thousands of people trying to get through the day." Be sure to check out the hilarious
follow up comments to this article!
Competency Requirements for Migrating IT Operations to Windows 2000
Competency migration requirements and a roadmap for the operations groups of IT organizations to prepare for transitioning resources from maintaining the Windows NT 3.51/4.0, Unix, or Novell NetWare 5.0 network operating system(s) to maintaining Microsoft Windows 2000.
IPV6 is the new Internet Protocol that will be replacing the current IPV4 Protocol within the next couple of years. Find out more about IPV6 and what it offers. The site includes a FAQ, general overviews, and a downloadable practical to guide IPV6
Penguin© Caffeinated Peppermints
Have you ever wondered how those northwest software giants keep their edge? Is it the lucrative stock options? Crushing business tactics? 160 bpm drum and bass music pumping through the office intercom system? It's none of the above, actually. The secret lies in Penguin©
Caffeinated Peppermints.Here's the high level pitch, for those without much time: Mints. Caffeinated mints.
Microsoft knew about, ignored SP1 personal firewall issues
According to Paul Thurrott, Microsoft knew about the problems caused when installing Windows 2000 Service Pack 1 (SP1) on a system with a personal firewall, such as ZoneAlarm, BlackIce, and other similar programs. But Microsoft declined to fix the problem, telling beta testers that
these products were using undocumented features that could change.
Step inside the World of Hacking
The world of computer hackers is a constant cat-and-mouse game between ©white hats? and ?black hats.? Some white hats use ?honeypots? that look like normal Web servers, but are really traps with special software that allow white hats to track every
step a computer vandal takes. Check out this page to see, step by step, a full-blown attack by a black hat aimed at a honeypot, through both the eyes of the hacker and the white hat stopping her.