- The Windows 2000\XP\.NET Resource Index
Home | About Us | Search |

Last Updated December 10, 2003

LabMice Link of the Day Archive
As we surf the web in our pursuit of additional content for LabMice, we occasionally stumble upon a really cool, humorous, unusual, or very useful link that we think should stand out from the hundreds we add every week. So we developed a small section on our front page to highlight these, and will archive the rest here.
This Month:

What is NFS? Do you ever wonder what RIBLOE stands for? This Windows-focused IT glossary will help you stay on top of the industry's latest lingo. Learn the definitions of top-used acronyms and terms from Anna Kournikova to Zero Administration. (

Know-IT-all Quiz: Local Yokels
When Windows 2000 is used for Internet Connection Sharing, the default is to use your ISP's DNS servers rather than any local servers. Why is this problematic? Click here if you think you know the answer. Source:

This chapter, from "Microsoft Windows Server 2003 Unleashed" defines organizational units and groups within Windows Server 2003's Active Directory and describes methods of integrating them into various Active Directory designs. Specific step-by-step instructions and best practice design advice are given as well. Source:

OSI (Open Systems Interconnection) is a standard description or "reference model" for how messages should be transmitted between any two points in a telecommunication network. It's also the conceptual backbone of most enterprise networks. Use this illustration, collection of articles and expert advice to find out what each OSI layer does and which protocols function where. Source:

EFS - Proceed with caution
The Encrypting File System (EFS) is a feature of the Windows 2000 and Windows 2003 operating systems that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent. It's a powerful technology, but one that should be approached with caution. If you don't, you may find that you can't decrypt your own files. Get some expert pointers about EFS in this collection of tips, articles and expert advice. Source:

Chapter of the Week: Protect your data with EFS
In this chapter from "Windows XP Professional: The Complete Reference" by Guy Hart-Davis, you'll learn how to use Encrypting FileSystem (EFS) to encrypt the files and folders you want to protect. EFS is a powerful technology that needs to be approached with caution; otherwise you might find that you can't decrypt your own files. Source: TechTarget

Networking Decisions 2003
Network security, storage and next-generation technology will be the focus of Networking Decisions 2003, a free conference for qualified enterprise professionals. Set for November 5-7 in Atlanta, this three-track event will help you optimize and secure your network with extensive technical sessions on network security, SANs, VoIP and wireless strategies for the future. Session highlights include: 'Network Analysis Tools: Achieving a Secure, Reliable Environment' by Laura Chappell, Protocol Analysis Institute, "New Frontiers of Network and Systems Management' from Jean-Pierre Garbani, Forrester Research, and 'Leverage Your Network to Deliver New Applications' with Tim Wilson, Enterprise Management Associates. Source: TechTarget

Source of Worry for Microsoft
While Microsoft is large enough to weather the loss of a single client, the defection of the state of Massachusetts to open-source software rings warning bells. If government agencies begin embracing open source, will the big companies be next? Source: Wired

Certification Top 10 Lists
"There are hundreds of programs in today©s certification landscape. How can you tell the good from the bad, the winners from the losers, or what©s up-and-coming from programs on their way down? While careful analysis of the market is always warranted, and reality checks against current classified employment ads and job postings are highly recommended, we present lists of leading certifications in this story, across various categories we believe to be of definite interest to our readers." Source: Certification Magazine

Hottest Processors
Moore's Law is still in effect, making it tough to keep up with processing capability. Here's a cheat sheet to today's hottest processors. Source: Windows & .NET Magazine

Defending The Rock
"Prudential's ingrained security culture and change control management makes it a security program worth emulating." Source: InfoSecurityMag

Chapter of the Week: Windows XP Professional: The Complete Reference -- Chapter 19, 'Protecting your data with encrypting file system'
In this chapter, you'll learn how to use Encrypting File System (EFS) to encrypt the files and folders you want to protect. EFS is a powerful technology that needs to be approached with caution; otherwise you might find that you can't decrypt your own files. Source: Search

Who Do You Trust?
From your CEO to your mail clerk, insiders can do more damage than outside attackers. Here are 10 ways to reduce your risk. Source: InfoSecurityMag

Google's Secret: 'Cheap and Fast' Hardware
When building a datacenter, most companies spend a fortune to buy the best servers, hoping the investment will result in fewer hardware failures and downtime. Google appears to be taking the opposite approach, and using cheap, fast, off the shelf hardware and expecting it to fail. Source: PCWorld

Changes to Default Settings Make Windows Server 2003 More Secure (Part 1)
"One big change, very noticeable in Windows Server 2003, is the difference in default settings. In this two-part article, we©ll look at how the out-of-the-box server differs in its defaults from previous versions and how the new defaults make the OS more secure (while at the same time causing frustration for some admins and users who find themselves unable to gain access that was available without any reconfiguration in earlier operating systems). In Part 1, we©ll focus on how the default permissions have changed, changes to the membership of the Everyone group, and ownership of objects." Source:

Should Microsoft Be Liable for Bugs in Its Products?
"If Microsoft was financially liable for problems with its software, would the company provide better products?" Source: Windows & .NET Magazine

Chapter of the Week: Windows XP Professional: The Complete Reference -- Chapter 11, 'Tuning Windows XP Professional for optimum performance'
This chapter discusses the tools that Windows XP Professional provides for managing events, logging crashes and monitoring and improving the performance of the operating system. It covers using Event Viewer, Dr. Watson, Task Manager and the Performance tool. It also covers how to create, change and delete environment variables. Download is in PDF format. Free registration may be required. Source:

IT product release dates annoy, bore users
While many users say IT product release dates are artificial milestones, some find them helpful as planning guides, according to a new survey. Source:

Five tips for securing a converged net
IP telephony and voice over IP are by no means the standard for carrying enterprise voice just yet. But these technologies have been in the real world long enough for users to have learned some tricks for protecting a converged infrastructure against network threats, both external and internal from inside the firewall. Source: Network World Fusion

SQL Server 2000-Yukon
SQL Server is a product in transition -- and a much longer transition than anyone expected. By the time the next version of SQL Server, code-named "Yukon," ships, SQL Server 2000 will be four years old. Does the database have the legs to keep gaining share against Oracle and IBM as it ages? Source:
ENT Online

Intrusion Detection Terminology (Part Two)
This is the second and final part of the series that discusses IDS terminology, including terms where there may be disagreement from within the security community. Source:

Chapter of the Week: Managing Enterprise Active Directory Services -- Chapter 10, 'Active Directory management components: schema'
To really understand the inner workings of Active Directory, it helps to have a thorough understanding of the Active Directory schema. This chapter gives a brief introduction to schema concepts, then covers the tools and programmatic interfaces that can be used to manage the schema. The second half focuses on the steps necessary to extend the schema and includes a schema verification and extension program. Source:

Past Archives

This site and its contents are Copyright 1999-2003 by Microsoft, NT, BackOffice, MCSE, and Windows are registered trademarks of Microsoft Corporation. Microsoft Corporation in no way endorses or is affiliated with The products referenced in this site are provided by parties other than makes no representations regarding either the products or any information about the products. Any questions, complaints, or claims regarding the products must be directed to the appropriate manufacturer or vendor.