LabMice.net - The Windows 2000\XP\.NET Resource Index
Home | About Us | Search |

Last Updated December 10, 2003

LabMice Link of the Day Archive - November 2002
As we surf the web in our pursuit of additional content for LabMice, we occasionally stumble upon a really cool, humorous, unusual, or very useful link that we think should stand out from the hundreds we add every week. So we developed a small section on our front page to highlight these, and will archive the rest here.
 
This Month:

Next Microsoft operating system will be radical change from XP
Windows XP has been on the market for a year now, so naturally everyone is clamoring for details on the next version of the world's most popular operating system -- or so Microsoft Corp. hopes. Details are dribbling out, but Microsoft won't say a word on the record, declining to comment for this story. Analysts and software developers haven't been briefed, either. But here's what has leaked out so far. Source: SeatllePI.com

Careers: Is It Time to Move On?
It's no secret that times have been tough©and jobs increasingly scarce©in IT. Research company Meta Group Inc. recently reported that 500,000 IT jobs disappeared last year alone. The study also found that IT employee turnover rates have risen at most companies Tired of the industry downturn, some IT professionals consider job Plan B.

Recovering a Customer from an Active Directory 'Denial of Service'
As your organization grows and evolves, technologies like Active Directory will become more and more critical to the smooth running of the operations - and any loss of availability will mean greater consequences for your business. Consider the risk of losing your Active Directory for an hour, or a day - what will happen if people can©t read their email, or gain access to those ©single sign-on© business applications, or even sign on to their workstations? In such an environment, you really can©t afford not to protect your technological investments. In this article, you'll get a chance to view an attack scenario, and the steps taken to restore working order to the attacked system
. Source: Microsoft.com

Security Certifications: Which Will You Aim For?
The demand for professionals certified in security technologies and methodologies is on the rise. Security certified individuals earned some of the highest pay increases last year. Along with this growth in demand has come a rapid increase in the number of security certification programs. CertMag©s 2002 Salary Survey shows that the average Certified Information Systems Security Professional (CISSP) made $83,333 this year. Are you ready to get a piece of the action? Source: CertMag.com

Open-Source Security Comes Under Fire
Thanks to several high-profile vulnerabilities and an overall increase in the number of flaws, open-source software has taken over Microsoft Corp.'s position at the bottom of the security heap. A recent research note from two analysts at the Aberdeen Group calls open-source software and Linux distributions the "2002 poster children for security problems." Of the 29 advisories issued through October by the CERT Coordination Center at Carnegie Mellon University in Pittsburgh, 16 of them addressed vulnerabilities in open-source or Linux products. Seven of the advisories were related to Microsoft products. Source: eWeek

Top 11 Little-Known Facts About Oracle CEO Larry Ellison
As our regular readers already know, we always try to have a little fun with the link of the day every Friday. And with all the Bill Gates bashing going around the web, we thought it was time to spread the wealth and highlight an article that takes a crack at another high profile tech CEO - Oracle's Larry Ellison. Larry is the 4th richest man in the world and lives in a mini-Japanese-village estate in Woodside. He's famous for his expensive suits, rapier comments, and a number of exploits including conspiring with the Clinton gang to go after Microsoft (now Clinton is hitting him up to help pay for his library), offering to buy cars for company secretaries who were willing to, ahem, "date" the boss, and of course a number of Machiavellian business tactics that make Bill Gates look like a Boy Scout. Source: Network Computing

Microsoft Licensing: Pay Now or Pay More Later
With Microsoft's new Licensing Program 6.0 in effect, Yankee Group warns that corporations that fail to perform due diligence and grasp the intricacies of the new program risk losing significant IT dollars. Source: CIO.com

New Security Hole in Internet Explorer
BugTraq has published a posting written by Andreas Sandblad detailing a new hole in Internet Explorer.
The vulnerability exists in Microsoft Internet Explorer versions 5.5 or 6.0 and could let a remote attacker execute script on the victim's hard drive. Microsoft was initially contacted 2002-10-04. After several mail exchanges, their final response were that the technique used to run programs with parameters from the "Local computer zone" was no security vulnerability. No patch is available at this time. Source: BugTraq 

IntelliMirror Trick and Tips
Many IT professionals start by experimenting with the actual product before having a chance to review the materials. Use these tips and tricks to help you make the best use of IntelliMirror features. But because each environment is unique, use the links provided throughout this article to find further information. Source: Microsoft TechNet

Researcher says Win2000 certification means little
Microsoft has made much of the fact that its Windows 2000 operating system achieved Common Criteria certification at Evaluation Assurance level 4 towards the end of October. But what is this certification really worth? Source: smh.com.au

Back to the Insecure Future
Web services, such as Microsoft's .NET platform, represent a return to centralized computing. They also pose some serious security issues. Source: SecurityFocus.com

Greeting card virus licensed to spread
When is a virus not a virus? When it comes with a license agreement. The FriendGreetings electronic greeting card has all the hallmarks of a mass-mailing computer virus as the e-mail misleads a victim into downloading an application--ostensibly to view a Web card--and then sends itself to every e-mail address in the victim's Outlook contacts file. Yet the creators -- will be hard to prosecute: The viral card is protected by a license agreement that tricks unsuspecting users into clicking "Yes" and consenting to have the program send itself to all their e-mail contacts. Source: CNET

Yikes! Information Overload
Having too many e-mails to answer, or too many voice mail messages, or insufficient time to properly research a solution is a problem of insufficient time and resources -- not a problem of too much information. Source: Network Magazine

Lessons from the road Controlling your mobile workforce
Laptops, handheld computers, smartphones: the average professional or government official totes any © number of these mobile devices around on a daily basis. However, these same people generally give the security of these devices little to no thought at all. Source: SCMagazine

CompTIA©s Server+ certification ensures top skills, enhances productivity
Until recently there was no global standard for server technical competency. Two years ago, that changed when a number of leading companies sponsored the development of a new foundation-level certification: CompTIA Server+. Source: ServerWorld

What nasty little things lurk in your data center?
After $100,000 and a year of frustration, a Toronto organization discovered that hazardous micron-sized culprits were causing a mysterious series of server failures. Source: ServerWorld

Microsoft Windows 2000 Security Configuration Guide -- Introduction
This document provides guidance to allow for the secure installation and configuration of Windows 2000 in accordance with the Windows 2000 Common Criteria Security Target (ST) which provides a set of security requirements taken from the Common Criteria (CC) for Information Technology Security Evaluation. Source: Microsoft.com

Microsoft Looks to Office 11 Beta 2 
With Beta 1 kits out the door to thousands of Office 11 testers who are eagerly hunting for bugs, Microsoft has begun preparations for a second beta phase that is set to begin in Spring 2003. Office 11 Beta 2 will be larger than the first beta, and Redmond is currently accepting nominations from those interested testing the next-generation Office suite. Source: BetaNews

Explore How You Can Use DFS
Dfs is an incredibly useful feature that lets you point all your physical network shares on any machine that runs the NTFS file system to one virtual share point. Source: Windows & .NET Magazine

802.11 Gets A Replacement for WEP
The non-profit Wi-Fi Alliance, the consortium behind interoperability standards and testing for 802-11based networks, has announced an official replacement for the much derided Wired Equivalent Privacy (WEP) (define) encryption. The new solution, called Wi-Fi Protected Access (WPA), is a subset of the still unfinished IEEE (define) 802.11i security specification and will be usable by both home and enterprise wireless networks. Best of all, it may just take a firmware update to upgrade your gear. Source: 802.11 Planet

How to get certified security for Win2k, by Microsoft
Windows users whose spirits lifted at this week's announcement of Common Criteria certification* for Microsoft's Windows 2000 would do well to take a look at some of the assumptions and restrictions associated with the tested system. While perhaps not as extreme as when NT passed Orange book certification so long as it wasn't connected to a network, these do seem just a little restrictive and artificial. Source: SecurityFocus
.com

Wireless LAN attacks grow in sophistication
During the past year, wireless LAN security threats have multiplied, according to users, vendors and consultants. There are more attack applications available, the applications are more sophisticated and highly automated and the weaknesses of various wireless hardware and software products are documented more extensively and precisely. Source: Network World Fusion


Past Archives

This site and its contents are Copyright 1999-2003 by LabMice.net. Microsoft, NT, BackOffice, MCSE, and Windows are registered trademarks of Microsoft Corporation. Microsoft Corporation in no way endorses or is affiliated with LabMice.net. The products referenced in this site are provided by parties other than LabMice.net. LabMice.net makes no representations regarding either the products or any information about the products. Any questions, complaints, or claims regarding the products must be directed to the appropriate manufacturer or vendor.