- The Windows 2000\XP\.NET Resource Index
Home | About Us | Search |

Last Updated December 10, 2003

LabMice Link of the Day Archive - July 2002
As we surf the web in our pursuit of additional content for LabMice, we occasionally stumble upon a really cool, humorous, unusual, or very useful link that we think should stand out from the hundreds we add every week. So we developed a small section on our front page to highlight these, and will archive the rest here.
This Month:

Microsoft Windows .NET Server Deployment Guide
Microsoft has released beta chapters of the Microsoft© Windows? .NET Server Deployment Guide to help you deploy Microsoft Windows .NET Server family technologies easily and successfully. The chapters provide guidelines and recommended processes to design and deploy Windows .NET Server infrastructure solutions that meet your business needs and IT goals. Source:

Find a Bug? Don't E-Mail Microsoft
It may be the most-used vendor bug reporting address in history. This week Redmond put "" out to pasture in favor of a handy Web form. Source:

XP's Built-in, Automated Error-Reporting Functionality
As the Microsoft XP use has increased, Microsoft has used the error-reporting functionality to identify OS patches that the company needs to produce. Many of the automated updates that XP users download are the result of automated error reporting. Source: Windows & .NET Magazine

Keep the Computer Browser Service Humming
With a little patience, an understanding of Windows networking, and the right tools, you can ensure accurate, complete browse lists. Source: Windows & .NET Magazine

The Perils of UPnP
Learn how UPnP traffic from you XP machines can clog your firewall log and how to eliminate this traffic. Source: Windows & .NET Magazine

Innovation, Microsoft Style
The company that's often charged with crushing innovation actually seems poised to introduce some exciting new technologies later this year. Source: Windows & .NET Magazine

Purchasing a rackmount chassis is not just a commodity decision
Nothing is simple in this business © including the decision of which chassis to use for enclosing thin servers and server blades. Source: ServerWorld

CICS Benchmark scoring Tool for Windows 2000 and Windows NT
The Pentagon, the National Security Agency (NSA), the National Institute of Standards and Technology (NIST), and other government agencies, working with the Center for Internet Security (CIS) have devised standards for securing the Microsoft operating system against most known vulnerabilities and flaws. To make it easier for system administrators to adhere to the benchmark, CIS released a Security Scoring Tool -- freely available scan/analysis program which checks to make sure all those settings are in place, as well as checking whether all patches are up to date. 

Internal Security Breaches More Damaging
While external attacks are serious enough, the threat posed by one's own employees -- whether intentional or inadvertent -- can often be much worse. But a number of software management tools can help overburdened IT staffs reduce network vulnerabilities. Source: EarthWeb

Security Holes Pop Up in Unexpected Places
David Chernicoff alerts systems administrators about a security problem that occurs in a little-used but ubiquitous Windows application. Source: Windows & .NET Magazine

Get ready for Windows .Net Server
If you're still grappling with a Windows 2000 upgrade, here's a heads-up -- Microsoft is getting ready to release another server operating system. Source: NWFusion

Palladium: Safe or Security Flaw?
Microsoft's new project could offer virus protection, control over personal information, even spam blocking. Or maybe it's a giant boondoggle. Source: Wired

Administrator's Guide to Microsoft L2TP/IPSec VPN Client
The Microsoft L2TP/IPSec VPN Client is a free Web download that allows computers running Windows 98/ME, and Windows NT© Workstation 4.0 to use Layer Two Tunneling Protocol (L2TP) connections with Internet Protocol Security (IPSec). This article provides an overview of L2TP/IPSec VPN connections and includes instructions about how to deploy and troubleshoot Microsoft L2TP/IPSec VPN Client

SP3: More Rumors, More Delays
Just when Win2K SP3 will ship is anyone's guess, but when it does, it will contain nearly 1000 bug fixes. Paula Sharick takes a look at some known issues with the SP3 RC3 release.  As amazing as it sounds, Microsoft has already published 99 pre-SP4 bug reports; anything with a pre-SP4 status, by definition, is not included in SP3. Source: Windows & .NET Magazine

Unpatched IE vulnerabilities
If the unpatched vulnerabilities in IE are driving you nuts, take heart. Thor Larholm created this list of known IE bugs in order to put pressure on Microsoft to fix them. He also offers links to workarounds and if available, third party fixes.

Management: Rules of Engagement
Contractors, who used to make up 15% to 30% of IT departments, are now used mostly to get around hiring freezes. But smart technology managers know that will change, and they're using the lull to better plan how they'll deploy temporary workers once the economy heats up. Source: ComputerWorld

Faster, Stealthier... More Dangerous
From Web app manipulators to kernel-level rootkits, ingenious hacker tools challenge infosec's ability to thwart--or at least contain--attacks. Source: Information Security Magazine

Simplfy Windows 2000 Desktop Deployment
How do you quickly deploy 50 Windows 2000 Professional desktops loaded with all the necessary application software? Don Baker faced this challenge and decided to automate the process using Windows Script Host (WSH), and Sysprep. Source: Windows & .NET Magazine

Automating Exchange 2000 Management with Windows Script Host
This white paper illustrates how Exchange 2000 technologies can be helpful for management purposes. It examines existing scriptable COM technologies and provides server-centric samples developed under Windows Script Host (WSH) to help users with Exchange 2000 management tasks. Source:

Microsoft needs help for security plan to fly
Microsoft's latest project for creating a secure operating system is a complex undertaking that will require coordination with hardware and software manufacturers across the industry in order for it to be a success. Source: NetworkWorldFusion

Past Archives

This site and its contents are Copyright 1999-2003 by Microsoft, NT, BackOffice, MCSE, and Windows are registered trademarks of Microsoft Corporation. Microsoft Corporation in no way endorses or is affiliated with The products referenced in this site are provided by parties other than makes no representations regarding either the products or any information about the products. Any questions, complaints, or claims regarding the products must be directed to the appropriate manufacturer or vendor.