Date: Mon, 24 Dec 2001 03:44:06 -0500 (EST)
From:"NetAdmin Republic NetNote" <Online#1.4988.44-t9bkOFCaYM3f.1@newsletters.online.com>  Subject: Beware: The Reeezak worm bears some nasty gifts
TechRepublic: www.techrepublic.com

Presents your 
NETADMIN REPUBLIC NETNOTE E-NEWSLETTER for December 24, 2001

<--------------Advertisement------------>

MEET SECURITY CONCERNS HEAD-ON
In today's uncertain technology, economic, and political climate,
it's increasingly vital that IT managers, network administrators,
and support technicians keep their enterprise resources tightly
secured! TechRepublic's Securing Your Enterprise: A Guide to
Network Threat Management CD-ROM delivers the tools and
information you need to identify and eliminate security gaps,
lapses, and weak points; to develop plans for the deployment
and maintenance of policies and processes that will ensure
security and peace of mind.
http://click.online.com/Click?q=6e-2a7jIyE91binmbRQ35O8fpuPWsRR 

<--------------------------------------->

WHAT'S HOT AT NETADMIN REPUBLIC?

BEWARE: THE REEEZAK WORM BEARS SOME NASTY GIFTS
Another new mass-mailing worm called Reeezak is running loose on the
Internet, spreading anti-Semitic messages and attempting to disable
computers that open its Christmas.exe attachment. See what this worm 
can do and
how to avoid it.
http://click.online.com/Click?q=83-U-EXQYJi_FgiQgUtho81BwMEBsRR 

LOGGING LINUX SYSTEM EVENTS WITH SYSLOG
Linux admins can effectively track network and systems activity using
the syslog package. We'll show you how to install and configure the 
syslog
and klogd daemons and secure your system log files on Linux.
http://click.online.com/Click?q=ad-_4KAQzEWa5sJc3iQuaDosYzVDRRR 

CUSTOMIZE THE SECURITY OF L2TP/IPSEC CONNECTIONS
L2TP/IPSec VPN connections are more secure and more complicated than
PPTP connections in Windows 2000. They are also more customizable if 
you
know what you are doing. Take these steps to customize your security
connections.
http://click.online.com/Click?q=d7-wk2ZQLWsyTSny7yRoBZge0kvVsRR 

CRAMSESSION.COM HAS A NEW ATTITUDE

Been to CramSession.com lately? One of the Web's most popular
certification sites has a quirky new personality. Learn the strategy 
behind the
transformation and find out what's changed.
http://click.online.com/Click?q=ec-MHsXQVyT3vftHPA1DOGlbjGkSsRR 

----------------------------------------

BACK BY POPULAR DEMAND

DOWNLOAD THIS CHAPTER AND LEARN BEST PRACTICES FOR INSTALLING NEW
SERVERS
If you're looking for systematic ways to plan and deploy new servers,
this sample chapter from Coriolis' Server+ Exam Prep provides some
excellent guidelines. It also offers Server+ server installation 
material.
http://click.online.com/Click?q=16-T_rjI4c1y5sgifpDYl4eaHDhqRRR 

UNDERSTANDING THE BASICS OF CISCO IP ACCESS CONTROL LISTS
Access control lists help you protect your network by allowing you to
enable or deny the flow of information. Mike Mullins tells you how to 
set
up standard ACLs.
http://click.online.com/Click?q=40-6PL4Idnckgvpo64eyXaonxqWJ9RR 

---------------------------------------

TODAY AT TECHREPUBLIC

BEST OF 2001: DOWNLOAD THIS SAMPLE SERVICE LEVEL AGREEMENT
While they don't possess the same kind of "teeth" that contracts do,
service level agreements can help ensure that consultants and their 
clients
know their responsibilities and how to resolve issues if something goes
wrong.
http://click.online.com/Click?q=7f-bnCKIIPqqKO4HYH9zOjzeMkxZRRR 

BEST OF 2001: WILL JAVA AND COBOL GO HAND IN HAND?
Will Java take over the enterprise? The right place to look for the
answer is COBOL. The fifth most popular Developer Republic article in 
2001
speculates on Java's future. Join us as we revisit this issue.
http://click.online.com/Click?q=a9-IlqqQpUeKr978rHz1JTPvR1MkRRR 

A TECHIE'S CHRISTMAS CAROL
When four spirits visit one miserly old tech, his views of the holiday
season and the IT industry change overnight. We hope you enjoy this
lighthearted spoof of Charles Dickens' holiday classic.
http://click.online.com/Click?q=be-B7RxQCp2Uemw-Wgb0Yis5jGmg9RR 

----------------------------------------

HOW SECURE ARE YOU?
Where do vulnerabilities lie on your network? What are the latest
security updates and fixes? How can hackers infiltrate your system? If 
you
can't answer these three questions without hesitation, then your 
network is
in immediate danger. Don't delay--sign up right away to receive our
Internet Security Focus e-newsletter every Monday, and start your week 
with a
sigh of relief.
http://click.online.com/Click?q=e8-DOzMQfkcpW2UfVlr3PXgMcIz9sRR 


---------------------------------------

TechRepublic TechMails may contain links to sites on the Internet that
are owned and operated by third parties. TechRepublic, Inc. is not
responsible for the content of any such third-party site. 

Questions or comments:
http://click.online.com/Click?q=66-kDo_IyW0TshhS58sWjis-KziLdRR 

Visit TechRepublic 
http://click.online.com/Click?q=90-wHPMQ_IJRXEViP-VY8E7UmueKdRR 

Copyright 2001 CNET Networks, Inc. All rights reserved. TechRepublic is 
a registered service mark of CNET Networks,  Inc.