LabMice.net - The Windows 2000\XP\.NET Resource Index
Home | About Us | Search |

Last Updated December 10, 2003

LabMice Link of the Day Archive -  May 2002
As we surf the web in our pursuit of additional content for LabMice, we occasionally stumble upon a really cool, humorous, unusual, or very useful link that we think should stand out from the hundreds we add every week. So we developed a small section on our front page to highlight these, and will archive the rest here.
 
May 2002

Roll Out Secure Servers
Need to build a secure Win2K server? Learn how to automatically preinstall numerous hotfixes without doing numerous reboots. Source: Windows & .NET Magazine 

Can IIS 6.0 take the heat?
Microsoft's IIS 5.0 was some fine dining for worms. The company needed to make the next version less tantalizing to intruders, and more appealing to customers. Krispy Kreme's IT department turned up the heat on its beta version of 6.0. They didn't glaze the results -- they say IIS "half dozen" is a bitter pill for hackers, and a better pill for customers. Source: SearchWin2000.com

Data Protection and Recovery in Windows XP
Windows XP provides many enhancements in the area of data protection-especially Encrypting File System (EFS). This article provides a technical walkthrough that illustrates how to use important data recovery and protection features in Windows XP. Also included are best practices and the steps you need to take to build an effective data recovery and protection strategy. Source: Microsoft.com

Controlling What Users Install on Their Office Computers
Many users don't get the point of why systems administrators have a zero-tolerance policy about installing harmless applications on office computers. What are you doing to educate users and counteract the antivirus threat unapproved software causes? Source: Windows & .NET Magazine

Psst... I know your password
Using the 95 printable ASCII characters, it would take 13 years for today's fastest Pentium 4 to figure out all the possible combinations for an eight-letter password. Unfortunately, it often takes less than 6 hours to crack about 50% of the passwords on an average network. Is yours at risk? Source: ZDNet

Microsoft Responds to IE Patch Complaints
Microsoft ran into one of its classic security flaps this week over the latest Internet Explorer cumulative patch.
An Israeli security firm, GreyMagic Software, accused Microsoft on Thursday and Friday of failing to address the underlying issues that led to some of the 6 new vulnerabilities that Microsoft patched on Wednesday in MS02-023. Source: ENT Online

The Beauty and Grace of a Worm
The code that makes up malicious e-mail viruses and worms is not only a beautiful thing, but instrumental to growing Internet culture. Hence, an art exhibit in Germany glorifying the little buggers. Source: Wired

Combating non-viral malware
Most people assume that AntiVirus software protects us from malicious code, and, by and large, it does. But
there's a huge category of unwanted code, against which it is powerless: nonreproducing malware. Overburdened IT security departments may consider these threats insignificant compared to other priorities. But the problem of nonviral malware is growing, and defending against it is a nontrivial task. Source: InfoSecurity Magazine

May the Shorts be with you
Twenty-five years ago, one man changed the face of filmmaking with his epic science-fiction tale. That man is not who you think it is. Source: Wired

Windows XP Updates: More Trouble Than They're Worth?
For many users, downloading updates for Microsoft's latest and greatest operating system, Windows XP, means crashed systems, devices that do not work and and sometimes an inability to boot up at all. Source: OSopinions

PCs: For Whom the Decibels Toll
Add this to the list of complaints against personal computers: The noise they make annoys some people to no end. But it's not like noise is going to affect purchasing decisions. Or is it? Source: Wired

Best Practices for Applying Service Packs, Hotfixes and Security Patches
This paper recommends a series of best practices for deploying Microsoft service packs, hotfixes and security patches. The information contained in this document has been derived from Microsoft Technical Account Managers, Microsoft Product Support Services (PSS) engineers, and well-known Microsoft subscription products like Microsoft TechNet and Microsoft Developer's Network (MSDN). Source: Microsoft.com

Fighting back against spam
There's no silver bullet, but a coordinated strategy that includes usage policies, anti-spam tools and services can greatly reduce unwanted e-mails clogging your network. Source: Network World Fusion

7 Things You Should Know About AV
When it comes to fighting viruses, don't assume the "standard" way is the best way.
  Source: Information Security Magazine

Windows .NET Server Security Handbook Just Released
Security News Portal is offering a free sample chapter of the Windows .NET Server Security Handbook for download in PDF format. This book is a practical, step-by-step guide to maximizing Windows .NET security. 

A Challenge to Dissect Some Code
A big glop of evil code showed up one day on a server run by a group that tries to trap miscreants. The first person to figure out what makes the code tick, wins. Source: Wired

The Computer Virus of the Future
Researchers say that the current Klez.H virus outbreak only vaguely resembles how viruses of the future might work. They point, instead, to last fall's Nimda virus as an example of how future security threats could behave. Source: OsOpinions.com

Hard drive failure
While manufacturers would like you to believe hard drive failures are a rare event, the reality is quite different. When Survey.com polled 1,293 IT staff and business executives, the majority had experienced computer downtime in the previous year due to disk drive failure. Also, 30.3 percent of the time the computer was down for more than 24 hours. Storage explosions, unsinkable drives and disk crashes © hard drive reliability still leaves a lot to be desired. What can you do about it? Source: ServerWorld

Do You Need to Succumb to a Computer Virus Attack?
Learn what to do about automated emails from scanning robots that tell you that a virus has infected your machine when in fact, you know your computer doesn't have that virus. Source: Windows & .NET Magazine

Consolidate Exchange 2000 Organizations
Merging multiple Exchange organizations is a trickier proposition with Exchange 2000 than with previous versions of Exchange. A phased approach can minimize the risks and provide a smooth transition for your users. Source: .NET Magazine

Virus Advancements
There is no questioning that the world of viruses is evolving. 2001 has generally been noted as the turning point by many in the anti-virus industry, revealing new technology and infection techniques that will continue to imperil corporations of all sizes in coming months... Source: InfoSecurity Magazine


Past Archives

2002
January February March
April May June
July August September
October November December
2001
2000
This site and its contents are Copyright 1999-2003 by LabMice.net. Microsoft, NT, BackOffice, MCSE, and Windows are registered trademarks of Microsoft Corporation. Microsoft Corporation in no way endorses or is affiliated with LabMice.net. The products referenced in this site are provided by parties other than LabMice.net. LabMice.net makes no representations regarding either the products or any information about the products. Any questions, complaints, or claims regarding the products must be directed to the appropriate manufacturer or vendor.