virus targets and encrypts .exe files
Antivirus vendor Central Command has detected a new worm that, disguised as a
warning from Microsoft, mass e-mails itself to users and, once launched,
encrypts all executable files, rendering them unuseable.
Routing in RIP Environments
Even with a routing protocol as common as RIP, things can go wrong, especially
when mixing Windows 2000 Server routers. This article looks at some potential
problems with RIp, explains the causes and how to correct them. Source: 8wire
Colleges and universities increase their money-making IT
certification offerings as more workers find the need to augment their degrees
with practical training. Source: InfoWorld
Posts IIS Lockdown Tool
Microsoft has a new tool designed to help administrators secure and harden
Windows NT 4.0 and Windows 2000 systems running the software giant's IIS 4.0
and IIS 5.0 Web servers. Source: ENT Online
Companies Blowing Money on App Servers
Analyst firm Gartner took a look at corporate buying of application servers.
The conclusion? Corporate America is throwing away money. Microsoft, which
bundles application server technology free with other products, was quick to
highlight the study. Source: ENT Online
It's a hot summer day, and the citizens of this small unsuspecting
virtual city are puzzled by the sudden appearance of a large magnifying glass
over downtown. You can use the magnifying glass to look around the city, or you
can use your mouse button to be a bit more mischievous....
It is time to say goodbye to Bluetooth,
the much-marketed technology standard for connecting mobile devices wirelessly.
Such a drastic statement is likely to draw criticism, especially from companies
still hard at work on Bluetooth-related products. But the sooner those
companies end their efforts, the better off they will be.
Inside Track to Japan-Only Goodies
Want to get your hands on the latest and greatest hardware from Japan. Dynamism Inc. buys gadgets
unavailable in the U.S., replaces their software, and sells them to you.
Cool! Source: Business Week
buyers suffering from upgrade fatigue
For the first time in 15 years, worldwide PC
sales will likely be lower this year than last. Blame it on
upgrade fatigue and a dearth of innovation. Source: ZDNet (Aug 23, 2001)
Last Microsoft Upgrade
What? Infamous Microsoft-basher Eric Grevstad urging readers to rush out and
buy a Microsoft product right away? Yes indeed -- to get Windows 2000 before XP
ushers in a new era of out-of-control greed.
Directions in Intrusion Detection
Problems with false positives?
Traffic bottlenecks? Distinguishing serious attacks from nuisance alarms? If
so, new IDS technologies and services are coming to the rescue. Source: Information
Code Red winner--Pepsi
Last month, two Orange
County, Calif., computer programmers named a computer virus they had discovered
"Code Red," after the cherry soda they had been chugging, giving
PepsiCo's new soft drink global brand recognition money can't buy. Pepsi's
little-advertised Code Red drink is now the 5th most popular beverage sold at convenience
stores. Source: ZDNet (Aug
Almost a month after the first outbreak of the Code Red worm
spread across the Internet by attacking vulnerable Microsoft servers, Microsoft
announced Wednesday the release of two new security tools aimed at helping
systems administrators and users keep their systems up to date and protected.
IIS: Unsafe at any Settings?
Is Microsoft's Internet Information Server still a viable Internet-facing Web
server? Should Microsoft pull their product from the market until they can
assure us our Web sites and internal systems will not be put at risk simply
because we chose IIS over some other? Or is IIS no more insecure than any other
Web server that is left unhardened, unpatched, unmaintained and
unmonitored? Source: 8Wire
launches an incentive for Win2k MCSEs
In an effort to recognize those studious individuals who have completed
their Windows 2000 MCSE before October 31, 2001(and to motivate those that
haven't), Microsoft is offering a special limited edition Early Achiever
card. What's next, a toy in very box of Win2k Server?
free training really a bargain?
There's boatload of free technical training out there for the asking. And in
these days of shrinking IT budgets, the temptation to partake - some might say
the necessity - can appear compelling. Source: NetworkWorldFusion
Cost of Certification
Certification can be an expensive goal. Both
direct and indirect costs must go into your training budget. Certification magazine
breaks down the cost of several different training options and shows
you how to get the most for the least. Source: Certification Magazine
security is even flakier than we thought
The root cause of the gaping security holes derive from flaws in the
key-scheduling algorithm used by the Wired Equivalent Privacy (WEP) protocol,
which is part of the 802.11 wireless networking standard. Wireless security
vulnerabilities have been widely publicized before but the difference with this
flaw is that it might be far easier to exploit. Source:
Active Directory Easier
Network administrators won't see the full benefits of
a Windows 2000 upgrade until the last domain controller is cut over - and that
can take a year or more. Here's what users such as Eric Kornau at Cincinnati
State Technical and Community College are doing to speed the transition and
ease administration headaches of running a mixed environment. Source: ComputerWorld
(Aug 6, 2001)
Man Who Debunks Virus Myths
Rob Rosenberger runs a website that rails against the
hysteria surrounding Internet diseases. He's funny, biting, takes no prisoners,
and has top CIA security clearance to boot. Source: Wired
Beyond DSL and cable
DSL and cable modems still too slow for you? Fiber-optic technology could be
the answer, offering super-high-speed Internet access and easily variable
bandwidth at a fraction of the cost of service on traditional copper lines.
Normally viruses peak then fade out gradually. SirCam isn't
going away--it's actually infecting more and more people. We've been flooded
with Sircam infected e-mail from administrators who have visited our site via a
compromised workstation. Check out this ZDNet article to find out more about
Sircam and what you can do to protect yourself.