- The Windows 2000\XP\.NET Resource Index
Home | About Us | Search |

Last Updated December 10, 2003

LabMice Link of the Day Archive - October 2000
As we surf the web in our pursuit of additional content for LabMice, we occasionally stumble upon a really cool, humorous, unusual, or very useful link that we think should stand out from the hundreds we add every week. So we developed a small section on our front page to highlight these, and will archive the rest here.

Companies don't learn from previous IT snafus
Hazy goals and a culture of hiding problems lead to more multimillion-dollar disasters. But now that most companies are only as stable as their bits and bytes, the consequences of information technology screwups aren't easily disguised - they show up in earnings reports. Source: ComputerWorld (Oct 31, 2000)

Windows 2000 Tech Enthusiast
The essential resource for hard-core Windows 2000 enthusiasts! A new web page from Microsoft featuring tips, power features, articles, and a Geek of the Week contest.

Inside Europe's Cybersleuth Central
Hunched over a computer inside a building that once served as Gestapo headquarters, Paulo Felix hunts down clues that he hopes will lead him to Europe©s most hardened criminals. The cybercriminals he pursues are hardly blue-haired, teen-aged hackers or Web pranksters. Felix puts it this way: ©Along with their computers, they also have guns.©

MCSE Emergency Room
The home of Tom and Deb Shinder, who have authored or contributed to fifteen books on the Windows 2000 operating system, and are regular columnists at and

High Stakes Hacking - Euro Style
In the United States, a hacker is usually viewed as a teen-age, blue-haired nuisance who defaces Web sites. Maybe he ends up in court, and even in handcuffs © but he doesn?t end up hanging from a tree. Not the case in Europe, where a legendary 27-year-old German computer hacker was found hung by his own belt in a Berlin park two years ago. On that side of the Atlantic, a place where stealing Internet access is sometimes a necessity and computer hardware is often archaic, hacking is hardly a game.Source:MSNBC

Is the Tech Industry out of ideas?
A funk has settled over the U.S. technology industry. It's not just the little matter of crashing market values of so many tech companies. Not even the palpable sense that a fantastic and thrilling financial bubble has burst. Money is only part of the trouble. Source: USA Today

VMWare Virtual Machines
It's been a while since someone made a new "killer app" Well, this is it. VMWare lets you run multiple operating systems on the same computer (at the same time) by emulating a virtual PC for each. This is so cool, you have to see it to believe it.

Uncle Sam wants (to serve) you...on the Web
A look at how three federal agencies - the Air Force, Securities and Exchange Commission and Treasury - are building networks to make it more convenient to get information, submit required business documents or make tax and loan payments to Uncle Sam. Source: NetworkWorld Fusion (Oct 19, 2000)

DNS security upgrade promises a safer 'Net
An emerging technology promises to improve the security of the Internet's infrastructure by preventing hackers from hijacking Web traffic and redirecting it to bogus sites. Source: Source: NetworkWorld Fusion (Oct 18, 2000)

Mitnick: I don't want to be notorious
In this extensive interview, the -- yes, notorious -- hacker talks about social engineering, ID theft, 60 Minutes, and his 12-step program for computer addiction. Source: ZDNet (Oct 11, 2000)

Romanian scientist plans 10T-byte optical disc
Unlike conventional CD-ROMs, which are written only on the surface, data can be written on over 10,000 levels within the 'hyper-CD-ROM' disk, meaning a single disk can hold the equivalent of 10 million standard printed books. Source: (Oct 12, 2000)

Windows 2000 PKI: Contender or Pretender?
Why contemplate Windows 2000 PKI when we have vendors like Baltimore Technologies, Verisign, and Entrust? Consider the power of choosing your own blend of public and private authorities. Source: Network Magazine (Oct 5, 2000)

Microsoft's Funny Money
It's hardly a secret that Microsoft is the fifth-biggest contributor of "soft money" to politicians but where, exactly, is all the money going? A spunky shareholder resolution demands that the company account for its political campaign contributions. Source: (Oct 10, 2000)

Forefathers of IT share Nobel prize
The prestigious Nobel Physics prize goes to three men who laid the foundations for the computer revolution -- including the inventor of the microchip.

Sneak peek at the next Microsoft Office
Every two years or so, Microsoft tries to sell the world on a new version of Office. Its next salvo, Office 10, has some key enhancements. Source: PCWorld

Learning IT right from wrong
To earn the Computer Science Accreditation Board seal of approval, a university's computer science curriculum must include "sufficient coverage of social and ethical implications of computing" -- a significant evolution since the first computer science curriculum taught in 1968

The art of war meets the business of IT
A martial arts expert (and CTO at Web development company iXL) explains how the principles of the battlefield can apply to technology projects. Source: Darwin Magazine

New domain name bids unveiled
The non-profit Internet governing body that will select new domain names later this year revealed Tuesday that 47 groups have submitted more than 200 proposals for new names, including bids for a child-safe Net zone labeled ©.kids? and an adult entertainment area dubbed ?.xxx?.

Debut of the Microsoft Security Essays
The size and scope of Microsoft's security response effort has been a well-kept secret -- until now. In the inaugural issue of a new article series, take a tour of the Microsoft Security Response Center and learn how the people on the front lines of security at Microsoft help ensure our customers' security.

Office politics imitate 'Survivor'
Opinion article from CIO Magazine with some advice for managers: One by one, the tribe shrinks until the sneakiest, scrappiest, backstabbingest survivor remains to claim the bounty. (Oct 2, 2000)

This site and its contents are Copyright 1999-2003 by Microsoft, NT, BackOffice, MCSE, and Windows are registered trademarks of Microsoft Corporation. Microsoft Corporation in no way endorses or is affiliated with The products referenced in this site are provided by parties other than makes no representations regarding either the products or any information about the products. Any questions, complaints, or claims regarding the products must be directed to the appropriate manufacturer or vendor.