Date: Tue, 18 Nov 2003 13:52:32 -0500 (EST) From:"NWC Online" <nwc_online@update.networkcomputing.com>
Subject: Network Computing Online #2.29
-- Network Computing Online #2.29 --
Your Online IT Resource
http://www.networkcomputing.com/
Tuesday, November 18, 2003

-------------------------------------------------------------
This issue sponsored by Mobilized Software. 
Get the practical strategies, real-world case studies
And trusted roadmaps for mobile and wireless 
Visit Mobilized Software: 
The Ultimate Source for Mobile and Wireless. 
Go to 
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CCdS0Af


-------------------------------------------------------------

This week, Compare IT focuses on dedicated Internet access. Research 
and
compare product offerings from XO Communications, Netfice, CCI and New
Edge Networks. Plus, check out our editor's hot white paper pick on
securing your wireless network.

And don't forget to test your knowledge of desktop-management policies
and procedures with our latest TechQuiz. Read more details in the On 
the
Network section.

If you need timely, accurate and authoritative data on important
vulnerabilities and security patches, don't miss Security Threat Watch,
the re-launch of our Security Alert Consensus newsletter. For more
information and to subscribe to this free newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CCEc0AQ

Enjoy Network Computing Online and please let us know how we can
better serve you (mailto:nwconline@cmp.com).

Until next week,
--The Network Computing Online Team

-------------------------------------------------------------

In This Issue:
1)  Compare IT: Dedicated Internet Access
2)  The Daily Blog
3)  Tech Library Toolkit; Editor's Hot White Paper Pick: SonicWALL
                Makes Wireless Networking Secure
4)  On the Network:
                Top 11: 2004, Anyone?
                Convergence Webcast
                TechQuiz: Desktop Management
                NWC Project: Web Server Monitoring Winners
                NWC Search Enhancements
                Network Design Manual: Samba 3
                Sharing Security Strategies
5)  Current Forum Threads
6)  Storage Pipeline: State of the Art: Storage on Demand
7)  Mobile Pipeline: Treo 600: Good Stuff in a Small Smartphone
8)  Top Stories:
                Feature: Desktop Management
                Review: Desktop-Management Suites
                Workshop: Layer 2 Discovery
9)  Security Threat Watch: This Week's Microsoft Patches
10) Storage Pipeline: First Person: Whose Storage Is It, Anyway?
11) Latest IT Pro Downloads:
                Cygnus Hex Editor 1.53;
                KeepNI 2.0.0
12) Subscription Information

-------------------------------------------------------------
1) Compare IT: Dedicated Internet Access
-------------------------------------------------------------
The need for a fast and reliable connection to the Internet has never
been greater. Dedicated Internet access solutions enable you to choose
the bandwidth you need today to scale for tomorrow. Whether your
organization needs to transfer large files or engage in e-commerce, a
variety of cost-effective, high-performance and flexible options are
available. Research and compare products from XO Communications,
Netfice, CCI and New Edge Networks.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDko0AH

------------------------------------------------------------
2) The Daily Blog
------------------------------------------------------------
a) nTAG...Tools for the Socially Over-Adept
Do you hate having to outline a subtle point while waiting in line at
the open bar? Look no further than the nTAG, the handy RFID-based,
wearable computer that records your thoughts and opinions and then
communicates them to like devices.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDk80AM

b) Blogs Get Spammed
Since folks are ignoring the deluge of Spam e-mails they get every day,
Spammers have taken to posting in Blogs, leaving messages like "Great
Post" or "Thanks for the Information." Of course, when you open the
comment, you find the all too familiar signs of Spam.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDlA0AW

c) You Say Tomato, I Say Tomacco
Ever see "The Simpsons" episode from a few years back where Homer 
breeds
a foul-tasting, but highly addictive hybrid of a tomato and tobacco
plant, called the "Tomacco?" Well, Rob Baur of Lake Oswego, OR, 
wondered
if fantasy could become reality.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDlB0AX

d) Noise Pollution with a Capital PC
Have you noticed that computers seem to be getting a lot noisier 
lately?
You're not the only one. As our PCs get more powerful, generating more
heat, they're getting louder, thanks to those fans, heat pipes and
vents.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDlC0AY

Find more blogs and blog entries here.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CCE60Af

-------------------------------------------------------------
3) Tech Library Toolkit; Editor's Hot White Paper Pick
-------------------------------------------------------------
Visit Network Computing's Tech Library for the latest technical
information on today's key IT issues, including network security,
mobile & wireless, streaming media and more. Peruse vendor white
papers, analyst reports and Webcasts as well as the most recent
industry research findings.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0BsdA0AA

Get the latest papers via our RSS feed.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0Bu2H0AT

-------------------------------------------------------------
Editor's Hot White Paper Pick: SonicWALL Makes Wireless Networking
Secure
-------------------------------------------------------------
Wireless technology is growing at an increasing rate. This explosion of
growth has companies adding access points to networks often without the
necessary wireless security infrastructure in place. In this white
paper, SonicWALL discusses the challenges facing organizations
interested in deploying wireless network security.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDp60AP

Access more white papers, case studies and product information on
Wireless Security in the Network Computing Tech Library.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0ByUs0Ap

------------------------------------------------------------
4) On the Network
------------------------------------------------------------
a) Top 11: 2004, Anyone?
It's your last chance to submit something even more unusual to our
latest Top 11 list: "Highly unlikely IT predictions for 2004." Make us
chuckle and we'll include your entry in our special holiday issue. Here
are a couple ideas that came in last week from your peers.
*"George Bush, in response to paternity claims, admits to being Father
of the Internet." --N. Thomas Peiffer
*"Microsoft & SCO announce they are teaming up to create Closed Linux
2005." --Mark Jass
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0BjCi0A7

b) Convergence Webcast
Attend "IP Telephony Economics: Does It Add Up To Savings and
Productivity?" a free, online seminar on December 4, 2003 at 11 AM
Eastern. Networking authority Nick Lippis moderates this session
produced in association with Network Magazine.

For more information.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDkk0AD

To register.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDkl0AE

c) TechQuiz: Desktop Management
There's still time to test your knowledge of desktop-management 
policies
and procedures. If you get all the answers right, we'll put your name
into the hat for a chance to win a truly cool Network Computing
collectible.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0TNs0Az

d) NWC Project: Web Server Monitoring Winners
Thanks to all who submitted Web transactions to help Executive Editor
Bruce Boardman evaluate Web server monitoring services. Check out
Bruce's final test results as well as the lucky winners of our 3Com 
NJ90
Network Jack giveaway.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0B3bR0AL

e) NWC Search Enhancements
You now can use pull-down menus to search Network Computing or any of
its sister publications, including Secure Enterprise, Network Magazine
and all our technology pipelines. You also can refine your search 
string
to include white papers and research reports.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDkm0AF

f) Network Design Manual: Samba 3
Written and edited by Samba-team members John H. Terpstra and Jelmer
Vernooi, our exclusive excerpt from "The Official Samba-3 HOWTO and
Reference Guide" will help readers decipher the recently released
Samba-3 code.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDkn0AG

g) Sharing Security Strategies
Join NWC and our partners, Neohapsis Labs and Secure Enterprise, for a
Webcast discussion about the ins and outs of asset-centric,
defense-in-depth security methods.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CClS0An

------------------------------------------------------------
5) Current Forum Threads
------------------------------------------------------------
Ask the Experts: Windows 2000 Active Directory Restrictions
We have a policy for logging on to workstations in Windows 2000 Active
Directory: One user name is to one computer name. Each user can log on
only to a specified computer name in log-on workstations. I would like
all users to have access to log on to a particular computer called 
MAIN.
I would prefer not to add each user manually. Is there a script or
command-line utility to make this task easier? Will I be able to add
MAIN to the log-on workstations for all users?
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDk20AG

View all Forums.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CCEu0Ai

------------------------------------------------------------
6) Storage Pipeline: State of the Art: Storage on Demand
------------------------------------------------------------
By Joseph F. Kovar
Vendors are developing new and improved ways to deliver pay-per-use 
data
storage.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDk30AH

Read more from Network Computing's Storage Pipeline.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0B1260A2

------------------------------------------------------------
7) Mobile Pipeline: Treo 600: Good Stuff in a Small Smartphone
------------------------------------------------------------
By Frederic Paul
This sleek smartphone is pricey, but it combines a lot of wireless
functionality in a small, highly usable package.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDlF0Ab

Read more from TechWeb's Mobile Pipeline.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CAPw0At

-------------------------------------------------------------
8) Top Stories
-------------------------------------------------------------
What were readers perusing last week on the Network Computing Web
site? Here's a list of our hottest articles.

a) Feature: Desktop Management
(November 13, 2003)
Desktop management is time-consuming, frustrating and complex, but a DM
suite can make it bearable.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CC580AR

b) Review: Desktop-Management Suites
(November 13, 2003)
A comprehensive desktop-management system can take the anxiety out of
that dreaded task. We tested seven offerings. Altiris earned our
Editor's Choice, but LANDesk received our Best Value award.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CC6E0Af

c) Workshop: Layer 2 Discovery
(November 13, 2003)
Layer 2 discovery drills down to information such as which devices are
attached to which ports and which switches are connected to one 
another.
It shows the path between clients, switches, routers and servers for
application and network services. Basically, it helps you plan and get
to the source of network failures.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CC6G0Ah

Join other NWC readers in discussing these articles.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0Brcx0A2

-------------------------------------------------------------
9) Security Threat Watch: This Week's Microsoft Patches
-------------------------------------------------------------
Microsoft released another gaggle of patches this week. First is yet
another Internet Explorer cumulative update (the sixth one this year, 
by
our count). Those with ports 135/139 open will need to worry about a
buffer overflow in the Workstation service, and those using
FrontPage/IIS should be concerned about a remote buffer overflow.
There's also another patch that allows malicious Word and Excel
documents to bypass macro security.

For more security alerts and information, sign up for our free
Security Threat Watch newsletter today.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CCEc0AQ

------------------------------------------------------------
10) Storage Pipeline: First Person: Whose Storage Is It, Anyway?
------------------------------------------------------------
By Jon William Toigo
Storage consumers must join forces to determine what we need and voice
those needs.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDk70AL

Read more from Network Computing's Storage Pipeline.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0B1260A2

-------------------------------------------------------------
11) Latest IT Pro Downloads: Cygnus Hex Editor 1.53;
      KeepNI 2.0.0
-------------------------------------------------------------
a) Cygnus Hex Editor 1.53
This hex editor features an MDI interface, multi-level undo and redo,
extensive drag-and-drop support, fast and flexible search, search and
replace. You can delete and insert characters as easily as you can in a
word processor, edit files up to available virtual memory (up to 2 GB)
and more.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDSK0AH
Size: 430k
Platform: Windows 2000
Licensing: Shareware; $29

b) KeepNI 2.0.0
KeepNI monitors Web sites functionality. It will check to see if your
site is up and fully functional at all times. Whenever a malfunction is
detected, KeepNI immediately alerts you.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CDSI0AF
Size: 4001k
Platform: Windows 95, 98 or NT
Licensing: Commercial Demo; $99

Find more shareware, freeware and demoware products, ready for
immediate download.
http://www.itprodownloads.com/

Note: By using IT Pro Downloads you agree to these terms of use.
http://www.nwc.com/itpro/itpro-terms.html

-------------------------------------------------------------
This issue sponsored by Mobilized Software. 
Get the practical strategies, real-world case studies
And trusted roadmaps for mobile and wireless 
Visit Mobilized Software: 
The Ultimate Source for Mobile and Wireless. 
Go to 
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CCdS0Af


-------------------------------------------------------------

-------------------------------------------------------------
12) Subscription Information
-------------------------------------------------------------
Did someone forward this newsletter to you? Get your own issue.
http://www.submag.com/sub/nc?wp=wpdly2

Free Network Computing Newsletters. Do more than just keep pace with
today's technologies. Sign up for Network Computing's new cadre of
newsletters to get real-world advice on hot topics like mobile
computing, security, architecting e-business and Unix/Linux. Subscribe
today.
http://www.submag.com/sub/nc?wp=wpdly2

Still not receiving your own FREE subscription to Network Computing
Magazine?
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0B5yO0Ah

Note: To better serve you, we use dynamic URLs, which allow us to see
how many readers view each story. We do not share this information or
your personal information with any outside party. Concerned about the
privacy of your information relative to these tracking URLs? Please
refer to our privacy policy.
http://www.doubleclick.net/us/corporate/privacy

We'd like to know what you think about this newsletter and what
information you'd like to see in future editions. E-mail your comments
to (mailto:nwconline@cmp.com).

Subscribe Today! Network Computing's Security Threat Watch (STW)
created in conjunction with Neohapsis, this weekly, customizable
newsletter will bring you timely, accurate and authoritative data
on important vulnerabilities and security patches. For more information
and to subscribe to this free newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/edvR0E43wY0qh0CCEc0AQ

Look for the next Network Computing Online newsletter on Tuesday,
November 25, 2003!

Copyright (c) 2003 Network Computing, a CMP Media LLC publication --
http://www.nwc.com/

This message powered by DARTmail
http://www.doubleclick.net/us/corporate/privacy