Date: | Wed, 8 May 2002 03:23:59 -0700 (PDT) |
| From: | "NetAdmin Republic NetNote" <Online#3.13756.b4-4vMr_VRAxKRs.1@newsletter.online.com>
| |
Subject: | [TechRepublic] New cert targets network, software security |
TechRepublic
http://www.techrepublic.com
Presents your
NETADMIN REPUBLIC NETNOTE E-NEWSLETTER for May 8, 2002
<---------------Advertisement--------------->
PC TROUBLESHOOTING TIPS FOR RISING IT STARS!
PC Troubleshooting is a tough job that only gets tougher;
as technology advances, your job becomes more complex.
Keeping systems up and running is your primary goal...
you were hired to prevent downtime and keep the wheels
of business turning by maintaining, troubleshooting, and
supporting desktops, laptops, printers, and all other
peripherals. TechRepublic's PC Troubleshooter Resource
Guide 2002 book and CD-ROM are loaded with the information
you need to face each challenge - from the simple to the
simply confusing - with confidence.
Click Here to Order Yours:
http://clickthru.online.com/Click?q=c9-3OPLQpgVZHYo4fvjO07mieZtudRR
<------------------------------------------->
NEW CERT TARGETS NETWORK, SOFTWARE SECURITY
EDITOR'S NOTE: Due to technical difficulties, some of you may have
received duplicate copies of the May 1 edition of the NetAdmin Republic
NetNote. We apologize for any inconvenience this may have caused.
COMPTIA IS PREPARING A NEW CERTIFICATION: SECURITY+
CompTIA will roll out its new Security+ exam soon. According to results
from a recent survey, focus is needed on security more now than ever.
Learn more about CompTIA's Security+ plans and see how you can provide
input
on this new certification.
http://clickthru.online.com/Click?q=de-7tLkQMWSgpTQtoXtFbIv-HJrx9RR
UNDERSTANDING WIRELESS LAN PROTOCOLS AND COMPONENTS
WLANs continue to proliferate on corporate networks, yet there's still
a
lot of confusion over WLAN security measures and the various
implementations of the 802.11 protocol. Here's a breakdown of WLAN
components,
protocols, and security.
http://clickthru.online.com/Click?q=f4-Y-QEQ0sVSA_alKAuZJbXdsfLfsRR
FIND AND CLOSE FILES WITH THE NET FILES COMMAND
What do you do when a user has left for the day but locked a file that
another user needs? The Net Files command can solve this problem and
other
issues with open files. John Sheesley offers a tutorial on using this
handy command-line tool.
http://clickthru.online.com/Click?q=09-joOSIj8QsJyoYsJLbS7YZwgv6dRR
----------------------------------------
NEW THREAT EXPOSES INTERNET EXPLORER, AGAIN
Don't look now, but Microsoft Internet Explorer contains two new
serious
flaws. Unfortunately, the software giant has been slow to respond to
reports about these vulnerabilities. See where the danger lies and what
you
can do to be safe.
http://clickthru.online.com/Click?q=1e-JQeLI4jLxRBrRtiqLso-Lo2CRRRR
----------------------------------------
BACK BY POPULAR DEMAND
FIVE STEPS TO DEPLOYING LINUX IN THE ENTERPRISE
An enterprise deployment of Linux involves more than downloading a
distribution and loading it on a resurrected 486. Jason Hiner shows you
five
steps that can make all the difference for a successful deployment of
Linux in the enterprise.
http://clickthru.online.com/Click?q=33-vUNnINj-JEvogh7ziyaFxG-C-9RR
USING CITRIX NFUSE TO WEB-ENABLE APPLICATIONS
If you have legacy applications you'd like to Web-enable, consider
Citrix NFuse. This Network Perspective column provides the details on
this
product and offers some basic topology and install information.
http://clickthru.online.com/Click?q=48-gglbIdBOVdhiD3WX__zN2uBa09RR
------------------------------------------
IT PRODUCT ALERT
SOLVE YOUR USB PORT SHORTAGE
Are your network users limited by a shortage of USB ports? Try breaking
out
of your USB bottleneck with a few 4Port USB hubs. For buying
information,
visit CNET's Shopper.com.
http://clickthru.online.com/Click?q=5d-JN8bIK0O8d12wwIoYvex5nGndsRR
----------------------------------------
TODAY AT TECHREPUBLIC
THE TOP FIVE THINGS FOR WINDOWS ADMINS TO LEARN ABOUT LINUX
Don't let the leap to Linux scare you or your users. Check out five
Linux fundamentals that will help you support Linux effectively.
http://clickthru.online.com/Click?q=72-R8ZHIPUmnEy6qzVr7M6jX2o7ndRR
TACKLING TOUGH ISSUES IN E-CUSTOMER SERVICE
Customer service has long been based largely on trust between the
merchant and the buyer. But trust is lacking in e-commerce, as
verifying who's
shopping can sometimes be impossible. Learn why the lack of security
tools is holding back e-business.
http://clickthru.online.com/Click?q=87-izOOQ8nSW8xWchieBlFX8JaOUsRR
THREE EASY STEPS TO CREATE EFFECTIVE STATUS REPORTS
Many project managers consider writing status reports a necessary evil.
This three-pronged strategy from an experienced project manager helps
you
produce effective status reports based on what people want to know and
when they want to know it.
http://clickthru.online.com/Click?q=9d-kk6WQv0HoCPPedduJLYn7qwnBRRR
----------------------------------------
CAN YOU PROVE WHAT YOU'RE WORTH?
Adding certifications to your resume shows the rest of the world that
you have IT expertise. It also demonstrates that you're motivated to do
the
work necessary to prove it. Each Friday, TechRepublic's IT
Certification
Corner TechMail keeps you up to date on available certifications and
provides tips on how to study for them. Your future awaits--sign up
instantly!
http://clickthru.online.com/Click?q=b2-M4LwQX0SAcCgM5-jd2lxppU7E9RR
------------------------------------------
This e-newsletter may contain links to sites on the Internet that are
owned and operated by third parties. CNET Networks, Inc. is not
responsible
for the content of any such third-party site.
Questions or comments:
http://www.techrepublic.com/contact_faqs/techmails.jhtml
Visit TechRepublic
http://www.techrepublic.com/
Copyright 2002 CNET Networks, Inc. All rights reserved. TechRepublic is
a registered trademark of CNET Networks, Inc. TechRepublic Logo is a
trademark of CNET Networks, Inc.