Date: Tue, 28 Oct 2003 13:57:16 -0500 (EST)
From:"NWC Online" <nwc_online@update.networkcomputing.com>  Subject: Network Computing Online #2.26
-- Network Computing Online #2.26 --
Your Online IT Resource
http://www.networkcomputing.com/
Tuesday, October 28, 2003

-------------------------------------------------------------
CMP Media's research indicates that 86% of IT managers 
surveyed already use open source software to support corporate 
applications.  Look inside to read relevant, compelling content 
and download the Playbook to get the best practices and winning 
strategies for your open source platform.  
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0B4tf0Am

-------------------------------------------------------------

This week, Compare IT focuses on gigabit switches. Research and get
quotes on product offerings from Cisco Systems, 3Com, Nortel and
Extreme Networks. Plus, check out our editor's hot white paper pick on
XML Web services security.

And don't forget to check out our forums, Ask the Experts, Shop Talk
and the Outsourcing Center. You can browse for real-world, hands-on
advice on tough IT problems from NWC editors and readers as well as
post questions. Our Current Forum Threads section has all the details.

Enjoy Network Computing Online and please let us know how we can
better serve you (mailto:nwconline@cmp.com).

Until next week,
--The Network Computing Online Team

-------------------------------------------------------------

In This Issue:
1)  Security Threat Watch Newsletter
2)  Compare IT: Gigabit Switches
3)  The Daily Blog
4)  Tech Library Toolkit; Editor's Hot White Paper Pick
5)  On the Network:
                Last Mile: Our Favorite Sig Files
                Top 11: Apple Super Computer
                Interactive Buyer's Guide: Wireless APs and Gateways
                Tech Quiz: VPNs
                Data Protection E-Poll
                Career Coach
6)  Current Forum Threads
7)  Secure Enterprise: Review: Identity Crisis
8)  Security Pipeline: Q&A with Microsoft Security VP Mike Nash
9)  Top Stories:
                Feature: On Location with Life Time Fitness
                Workshop: Delivering Content to Handhelds
                Sneak Preview: Extended Systems' OneBridge Mobile
                Groupware
10) Security Alert: SCO System Scripts Insecure Temp File Handling
11) Storage Pipeline: Red Hat Takes Another Step Toward the Data
                Center
12) Latest IT Pro Downloads:
                Memory Defragmenter 1.0.0.1;
                Desktop Web Spider 1.0
13) Subscription Information

------------------------------------------------------------
1) Security Threat Watch Newsletter
------------------------------------------------------------
We are pleased to announce that on November 3 we will re-launch our
existing Security Alert Consensus (SAC) newsletter under a new name,
Security Threat Watch (STW). Still built by the original authors at
Neohapsis, this weekly, custom newsletter will continue to bring you
timely, accurate and authoritative data on important vulnerabilities
and security patches. But our re-launch also will unveil a number of
new features, some layout changes and a new schedule.

If you are already a subscriber to SAC, you will receive a
transitional newsletter explaining all the changes on October 30.
Whether or not you are a subscriber, we invite you to take a sneak
peek at the new look and feel online today. You can also check out
past issues and subscribe to STW.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCEc0AE

-------------------------------------------------------------
2) Compare IT: Gigabit Switches
-------------------------------------------------------------
Gigabit switches can pull any load your modest server farm dishes out.
Check out Compare IT's list of top vendors and their products, find
the unique solution your company needs and get quotes from companies
including Cisco Systems, 3Com, Nortel and Extreme Networks.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCEf0AH

------------------------------------------------------------
3) The Daily Blog
------------------------------------------------------------
a) Forget the Debit Card--Use Your Phone
That's the thought Sony Corp. is hoping to eventually get into your
head. The company is working on ways for consumers to use their cell
phones to pay for groceries, pay for train fares, pick up checks at
restaurants and more.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCE40AR

b) New Typeface Helps Dyslexics
A new typeface being developed by a Dutch designer--herself
dyslexic--could help those who suffer from the disorder when reading
words online and in print.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCE50AS

Find more blogs and blog entries here.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCE60AT

-------------------------------------------------------------
4) Tech Library Toolkit; Editor's Hot White Paper Pick
-------------------------------------------------------------
Visit Network Computing's Tech Library for the latest technical
information on today's key IT issues, including network security,
mobile & wireless, streaming media and more. Peruse vendor white
papers, analyst reports and Webcasts as well as the most recent
industry research findings.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0BsdA0Aw

Get the latest papers via our RSS feed.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0Bu2H0AH

-------------------------------------------------------------
Editor's Hot White Paper Pick
-------------------------------------------------------------
Our editors have chosen "Essential XML Web Services Security Best
Practices" as this week's hottest white paper. DataPower describes a
system for pragmatic adoption of XML Security Best Practices that
improves application performance and security without locking
enterprises into specific standards, platforms or methodologies.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCJJ0As

Access more white papers, case studies and product information on XML
in the Network Computing Tech Library.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCJK0At

------------------------------------------------------------
5) On the Network
------------------------------------------------------------
a) Last Mile: Our Favorite Sig Files
Thanks to all those who submitted your favorite geeky sig files. It
was a tough job, but we managed to separate the wheat from the
almost-wheat and have posted a complete catalog as well as some select
examples with commentary. Feel free to pilfer your favorites for
personal use.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCEd0AF

b) Top 11: Apple Super Computer
This week, we're looking for the Top 11 little known uses for an Apple
Super Computer. (Remember the 1,100 64-bit G5 Apple Macs assembled at
the Virginia Polytechnic Institute?) Make us laugh, and we'll post
your entry in print and online. Here are a couple ideas to get you
started.
--Calculate number of times Steve Jobs actually wore black mock
turtleneck.
--Predict the precise moment in time when a Windows 2003 server will
require a reboot.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0BjCi0Au

c) Interactive Buyer's Guide: Wireless APs and Gateways
Compare and analyze more than 60 wireless access point and gateway
products that support 802.11b, 802.11g and/or 802.11a standards across
10-plus requirements.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCEe0AG

d) Tech Quiz: VPNs
Test your security savvy with our latest quiz on virtual private
networking. If you get all the right answers, we'll put your name in
the hat for a chance to win a truly cool Network Computing
collectible.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0TNs0An

e) Data Protection E-Poll
Our editors need your help sorting through the dizzying array of data
protection strategies for an upcoming cover package focused on
state-of-the-art data backup and restore techniques. Please take a
minute to respond to our data protection e-poll as it pertains to your
organization. We'll share the (anonymous) survey results in our
January 22, 2004, issue.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CBuu0AJ

f) Career Coach
Network Computing's Career Coach can get expert answers to your
thorniest workplace issues, be they certification questions, political
games gone haywire, geek etiquette or technical woes. Write the Career
Coach at:
careercoach@nwc.com

------------------------------------------------------------
6) Current Forum Threads
------------------------------------------------------------
a) Ask the Experts: Rights to Allow Change of Network Neighborhood
Settings
By Dennis Miller
How can I disable the user rights in Windows 2000 so they cannot
change the network neighborhood settings? This is not Active
Directory.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCEr0AT

b) Ask the Experts: Unable to Load Local Profile
By Henry Katzmarek
I am running a small system with two Windows 2000-based servers and
about a dozen XP Pro workstations based on Active Directory. I have
modified the group policy to store the My Documents folder on a
server-based path using UNC notation. I also have the roaming profile
stored on the client server path. After making these changes, the XP
workstations occasionally in the morning are unable to load the local
profile.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCEs0AU

c) Outsourcing Center: How Should U.S. Development Firms
Differentiate?
By Larry Cummings
Another question for Wesley: I work for a company that does the exact
kind of work your company contracted for offshore on this project.
I'll certainly be referring people who tell me that offshore is always
the best way to go to your experiences on this project. I was
wondering if there was any specific advice you could share with
companies like ours that might help us differentiate ourselves from
offshore development companies.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCEt0AV

View all Forums.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCEu0AW

------------------------------------------------------------
7) Secure Enterprise: Review: Identity Crisis
------------------------------------------------------------
By Lori MacVittie
We tested products from Computer Associates, Courion and Novell and
found that although any of them can save you time and money, only one
provides the flexibility and robustness you need to prevent ID-based
security breaches.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCEp0AR

Read more from Secure Enterprise magazine.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CBFY0A3

------------------------------------------------------------
8) Security Pipeline: Q&A with Microsoft Security VP Mike Nash
------------------------------------------------------------
By Carolyn A. April, VARBusiness
A raft of new security initiatives aimed at buttressing Microsoft's
Trustworthy Computing pledge is emanating from Redmond, and Mike Nash
is the guy tasked with getting it done.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCE30AQ

Read more from Network Computing's Security Pipeline.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0B6hK0AB

-------------------------------------------------------------
9) Top Stories
-------------------------------------------------------------
What were readers perusing last week on the Network Computing Web
site? Here's a list of our hottest articles.

a) Feature: On Location with Life Time Fitness
(October 16, 2003)
The director of software systems at Life Time Fitness shares the
company's experiences--and struggles--when it attempted to outsource
work to a top Indian firm.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CBak0An

b) Workshop: Delivering Content to Handhelds
(October 2, 2003)
Without enterprise content, a handheld device is just a flashy gadget.
We'll show you how to deliver information and applications that turn
PDAs and mobile phones into true business tools.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CBam0Ap

c) Sneak Preview: Extended Systems' OneBridge Mobile Groupware
(October 2, 2003)
This software lets the most widely used devices connect to your
network and provides real-time synchronization with some enterprise
PIM servers.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CBao0Ar

Join other NWC readers in discussing these articles.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0Brcx0Ap

-------------------------------------------------------------
10) Security Alert: SCO System Scripts Insecure Temp File Handling
-------------------------------------------------------------
SCO released an advisory indicating that various system scripts
included with OpenServer 5.0.5 do not properly handle temporary files,
thereby allowing a local attacker to perform a symlink attack. The
vendor confirmed this vulnerability. Update information is available
at the reference URL below.

Source: SCO
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCJL0Au

For more security alerts and information, sign up for our free
Security Threat Watch newsletter today.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CBlM0AU

------------------------------------------------------------
11) Storage Pipeline: Red Hat Takes Another Step Toward the Data
      Center
------------------------------------------------------------
By Larry Greenemeier, Information Week
Enterprise Linux 3 improves the operating system's performance when
running apps with multiple threads operating at once.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCE70AU

Read more from Network Computing's Storage Pipeline.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0B1260Ap

-------------------------------------------------------------
12) Latest IT Pro Downloads: Memory Defragmenter 1.0.0.1;
      Desktop Web Spider 1.0
-------------------------------------------------------------
We've made it easier and quicker for you to locate IT Pro Downloads'
shareware, freeware and other applets from any location on nwc.com.
Just type a keyword into the IT Pro search box, and you'll be amazed
at the vast collection of apps that will spring up before your eyes.
http://www.itprodownloads.com/

a) Memory Defragmenter 1.0.0.1
Memory Defragmenter frees up wasted RAM and reports the free memory.
It also prevents Windows crashes, since they mainly occur if there is
no free memory. Plus, you can configure Memory Defragmenter to
automatically free memory when the amount of available RAM falls below
a certain value.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CBRv0Aj
Size: 452k
Platform: Windows 95, 98 or NT
Licensing: Shareware; $15

b) Desktop Web Spider 1.0
If you need to get all the content and link structure information of a
site, try Desktop Web Spider. It helps you find all related Web pages
in the correct order and will spider all links and content.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CBuk0A8
Size: 12k
Platform: Windows 95, 98 or NT
Licensing: Freeware

Find more shareware, freeware and demoware products, ready for
immediate download.
http://www.itprodownloads.com/

Note: By using IT Pro Downloads you agree to these terms of use.
http://www.nwc.com/itpro/itpro-terms.html

-------------------------------------------------------------
CMP Media's research indicates that 86% of IT managers 
surveyed already use open source software to support corporate 
applications.  Look inside to read relevant, compelling content 
and download the Playbook to get the best practices and winning 
strategies for your open source platform.  
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0B4tf0Am

-------------------------------------------------------------

-------------------------------------------------------------
13) Subscription Information
-------------------------------------------------------------
Did someone forward this newsletter to you? Get your own issue.
http://www.submag.com/sub/nc?wp=wpdly2

Free Network Computing Newsletters. Do more than just keep pace with
today's technologies. Sign up for Network Computing's new cadre of
newsletters to get real-world advice on hot topics like mobile
computing, security, architecting e-business and Unix/Linux. Subscribe
today.
http://www.submag.com/sub/nc?wp=wpdly2

Still not receiving your own FREE subscription to Network Computing
Magazine?
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0B5yO0AV

Note: To better serve you, we use dynamic URLs, which allow us to see
how many readers view each story. We do not share this information or
your personal information with any outside party. Concerned about the
privacy of your information relative to these tracking URLs? Please
refer to our privacy policy.
http://www.doubleclick.net/us/corporate/privacy

We'd like to know what you think about this newsletter and what
information you'd like to see in future editions. E-mail your comments
to (mailto:nwconline@cmp.com).

Subscribe Today! Network Computing's Security Threat Watch (STW) 
created
in conjunction with Neohapsis, this weekly, customizable newsletter
will bring you timely, accurate and authoritative data on important
vulnerabilities and security patches. For more information and to 
subscribe
to this free newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/edZb0E43wY0qh0CCEc0AE

Look for the next Network Computing Online newsletter on Tuesday,
November 4, 2003!

Copyright (c) 2003 Network Computing, a CMP Media LLC publication --
http://www.nwc.com/

This message powered by DARTmail
http://www.doubleclick.net/us/corporate/privacy