LabMice.net - The Windows 2000\XP\.NET Resource Index
Home | About Us | Search |

Last Updated December 10, 2003

LabMice Link of the Day Archive (July 2001)
As we surf the web in our pursuit of additional content for LabMice, we occasionally stumble upon a really cool, humorous, unusual, or very useful link that we think should stand out from the hundreds we add every week. 
 

What end users hate about you
Have you ever wondered what end users think about you, the net professional? Network World asked more than a dozen users about their biggest IT pet peeves. Check out this article to find out if you're guilty of committing these most-hated offenses. 

'Code Red': Patch now or else
Security experts are publicly urging businesses worldwide to guard themselves against the Code Red worm--set to reactivate Tuesday at 5PM PT. Guarding against the worm is a relatively straightforward matter of installing a Microsoft software patch that prevents any malicious program from taking advantage of the IIS hole.

Inside Certification, Part 1: Creating the Certification Exam
This article is the first in a series that examines how a certification exam comes into being. This series serves two purposes: first, to provide a blueprint for companies and organizations creating exams; second (and more importantly), to illustrate for the test taker how complex the process actually is. Source: 8Wire

Sircam virus eludes Symantec anti-virus scanning update
The Sircam computer virus eluded Symantec's corporate and consumer Norton Anti-Virus products, because the first software update Symantec created to combat Sircam failed to detect the virus through e-mail scanning at the gateway and desktop. Source:  Network World Fusion (July 27, 2001)

The truth about low prices
The Web is brimming with lots of tech bargains, but it's also rife with dark alleys and seamy storefronts. To explore the danger zones, PCWorld went on an Internet shopping spree sniffing out the best prices for tech goodies and separating the deals from the ordeals. They concluded that the best price doesn't always mean the best deal. Here's how to avoid trouble and locate the real deals online.

Information on Bogus Microsoft Security Bulletin
Microsoft has learned that a malicious user is circulating an e-mail that claims to be Microsoft Security Bulletin MS01-037. However, the issue it describes is fictitious and it provides a link to a web site whose URL looks like the Microsoft web site, but in reality is not. The "patch" hosted on the site is a piece of hostile code that could enable an attacker to remotely control another user©s system.

SirCam worm puts secrets at risk
The fast-spreading virus hits corporate e-mail with a double-whammy: It could be sending out company secrets as well as clogging up mail servers. Source: ZDNet (July 23, 2001)

Security experts question release of 'Code Red' worm's exploit data
When word of the 'Code Red' worm first came out a month ago, a security firm released details on the worm's exploit code on the same day that Microsoft released a patch. But did the company release too much information on the vulnerabity? Source: ComputerWorld

Anti-virus software vendors warn against Sircam
Anti-virus software vendors are raising the alarm about a Windows-based e-mail computer virus dubbed Sircam that can potentially wipe out files on a hard drive or make a computer crash, although it doesn't appear to do so consistently. Source: Network World Fusion (July 20, 2001)

Copy-protected CDs quietly slip into stores
Consumers in ordinary record stores are unwittingly buying CDs that include technology designed to discourage the making of digital copies. According to Macrovision, the company that has provided the technology to several major music labels, the test has been going on for four to six months. Although it's not disclosing just which titles have been loaded with the technology, at least one has sold close to 100,000 copies, the company said.

Kerberos: Computer Security's Hellhound
Kerberos is a tried and true open source security standard, but will interoperability problems dog the Microsoft implementation?
Source: Network Computing

Windows NT/2000 Password Recovery Secrets
You've just been hired as the new sysadmin at a small company. On your first day, you find out the last admin bailed to a big tech services firm and no one knows the administrator passwords to the company's computing systems. To solve our problem, we will use two tools to gain access to the locked systems and then change their passwords. Source: 8Wire.com 

Personal Firewalls under fire 
If you're considering a personal firewall solution for your users who telecommute or own laptops, check out this lab test of three popular personal firewalls. The article explains how to counter many hacking attempts through native configuration changes and other host-hardening techniques. Source: Information Security Magazine.

The SmartCard Deployment Cookbook
Typically, a cookbook is a collection of recipes, or instructions, that explain how to do something and what you need to do it. This "cookbook" is a set of "recipes" for deploying smart cards in an enterprise that is deploying Microsoft Windows 2000 Active Directory.The white papers in this series will help you understand the principal smart card concepts and guide you through the planning tasks.

The War over 802.11 Security
Not long ago, when wireless networking was new and rare, security was an afterthought. The reason? The scarcity of 802.11b cards acted as a form of back-handed security. If no one had an 802.11b card, outsiders couldn't very well scan your setup, right? Now, however, that's changed. Wireless gear is readily available--and cheap--so that almost anyone with a PC can afford a Wi-Fi network card, making security more vital.

Top 10 security mistakes
The reason is unclear, but observers agree that end users - and even some IT departments - can be pretty dumb when it comes to protecting computers and their contents. Source: ComputerWorld (July 9, 2001)

Hackers learning to can spam
Security experts fear that a new hacker tool is in the works. It's a Trojan horse that causes the infected machine to generate spam without the owner's knowledge. Source: ZDNet (July 3, 2001)

Computer passwords reveal workers' secrets
Many office workers give themselves away with easily guessable passwords. Choosing a PC password has largely become a psychology test, with most office workers choosing a word that they believe to sum up their personality. Only the  smallest group (about 9 percent of the total) are the most security conscious and select passwords which mix lower and upper case letters, numbers and punctuation, to create cryptic passwords.

This site and its contents are Copyright 1999-2003 by LabMice.net. Microsoft, NT, BackOffice, MCSE, and Windows are registered trademarks of Microsoft Corporation. Microsoft Corporation in no way endorses or is affiliated with LabMice.net. The products referenced in this site are provided by parties other than LabMice.net. LabMice.net makes no representations regarding either the products or any information about the products. Any questions, complaints, or claims regarding the products must be directed to the appropriate manufacturer or vendor.