Date: Tue, 11 Nov 2003 14:17:34 -0500 (EST)
From:"NWC Online" <nwc_online@update.networkcomputing.com> 
Subject: Network Computing Online #2.28
-- Network Computing Online #2.28 --
Your Online IT Resource
http://www.networkcomputing.com/
Tuesday, November 11, 2003

-------------------------------------------------------------
This issue sponsored by Mobilized Software. 
Get the practical strategies, real-world case studies
And trusted roadmaps for mobile and wireless 
Visit Mobilized Software: 
The Ultimate Source for Mobile and Wireless. 
Go to 
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCdS0AL


-------------------------------------------------------------

We've reorganized the Compare IT archive to search across 14 product
categories. Test it out with this week's featured topic, firewalls.
Research and get quotes on product offerings from Cisco Systems, 
Nortel,
3Com and Nokia.

Plus, check out Security Threat Watch, our weekly, custom newsletter.
It delivers timely, accurate and authoritative data on important
vulnerabilities and security patches. You can read past issues and
subscribe to STW at:
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCEc0A5

Enjoy Network Computing Online and please let us know how we can
better serve you (mailto:nwconline@cmp.com).

Until next week,
--The Network Computing Online Team

-------------------------------------------------------------

In This Issue:
1)  Compare IT: Improved Archive/Firewalls
2)  The Daily Blog
3)  Tech Library Toolkit; Editor's Hot White Paper Pick: Extreme
                Networks Unified Access Architecture--Ending the
                Dual-Network Dilemma for Wired and Wireless
                Infrastructure
4)  On the Network:
                IT Minute: Desktop-Management Suites
                Top 11: 2004, Anyone?
                Introducing Storage Pipeline, The Magazine
                Sharing Security Strategies
                Linux E-Poll
                Free Webcast: The 2003 CSI/FBI Report on Computer
                Crime and Security
5)  Current Forum Threads
6)  Storage Pipeline: Special Report: Ultimate Enterprise Storage
7)  Mobile Pipeline: Qualcomm Jumps Into Push-to-Talk Fray
8)  Top Stories:
                Feature: VoWLANs
                Secure Enterprise: Special Report: Calling in
                the Specialists
                Sneak Preview: IBM Lotus Notes and Domino 6.5
9)  Security Threat Watch: MacOS X Vulnerabilities
10) Storage Pipeline: Review: Out of the Abyss
11) Latest IT Pro Downloads:
                Trellian Internet Studio 2.01;
                Trellian SEO Toolkit 2.01
12) Subscription Information

-------------------------------------------------------------
1) Compare IT: Improved Archive/Firewalls
-------------------------------------------------------------
We've retooled our service so you can quickly compare selected products
within our RFP Solution Center. We've also reorganized the archive to
search across 14 product categories.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0BerD0Ar

This week's Compare IT focuses on firewalls. Research and compare
products from Cisco Systems, Nortel, 3Com and Nokia.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC560A4

------------------------------------------------------------
2) The Daily Blog
------------------------------------------------------------
a) Wi-Fi Flaw of the Most Human Kind
Our close associate Robert Moskowitz has just released a paper
describing a substantial weakness in the new WPA (Wi-Fi Protected
Access) interface. As it turns out, WPA can fall prey to prying
eyes as easily as the now greatly dismissed WEP standard.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC6T0Aa

b) Slow News Day?
Even on the slowest news day I can't imagine pitching a story
outlining a time line for the Matrix trilogy. Obviously, it was
a REAL slow day at the Associated Press.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC6U0Ab

c) Boom!
Is it insane to build a $5.46 million working model of the Internet
for no other reason than to blow it up?
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC6V0Ac

Find more blogs and blog entries here.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCE60AL

-------------------------------------------------------------
3) Tech Library Toolkit; Editor's Hot White Paper Pick
-------------------------------------------------------------
Visit Network Computing's Tech Library for the latest technical
information on today's key IT issues, including network security,
mobile & wireless, streaming media and more. Peruse vendor white
papers, analyst reports and Webcasts as well as the most recent
industry research findings.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0BsdA0Ao

Get the latest papers via our RSS feed.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0Bu2H0A8

-------------------------------------------------------------
Editor's Hot White Paper Pick: Extreme Networks Unified Access
Architecture--Ending the Dual-Network Dilemma for Wired and
Wireless Infrastructure
-------------------------------------------------------------
Are wireless access points the weak links in your security chain?
If so, you are not alone. One of the most pressing concerns for
enterprise IT managers is whether a wireless solution can protect
corporate data and safeguard the network itself. Extreme Networks'
Unified Access Architecture can do both by limiting the amount of
sensitive data that the networks contain and employing strong 
encryption
for all transmissions.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CDHc0AA

------------------------------------------------------------
4) On the Network
------------------------------------------------------------
a) IT Minute: Desktop-Management Suites
Tune in for a behind-the-scenes discussion of our desktop-management
suite review with Director of Internet Operations Brad Shimmin and
Associate Technology Editor Mike DeMaria.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC540A2

b) Top 11: 2004, Anyone?
This time around, we're looking for something a bit unusual, your Top 
11
highly unlikely IT predictions for 2004. Make us chuckle and we'll
include your entry in our special holiday issue. Here are a couple 
ideas
to get you started.
--SCO lawyer accidentally posts press release from @msn.com account.
--Steve Jobs unveils industry's first 42-inch plasma screen laptop and
portable carrying cart.
--Larry Ellison doesn't piss anyone off at all, not even his barber.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0BjCi0Am

c) Introducing Storage Pipeline, The Magazine
Get your gigabyte swerve on with our inaugural supplement dedicated to
all things storage. You can find specific story listings or visit our
table of contents page for a complete listing of our current issue plus
a look ahead to the next.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC550A3

d) Sharing Security Strategies
Join NWC and our partners, Neohapsis Labs and Secure Enterprise, for a
Webcast discussion about the ins and outs of asset-centric,
defense-in-depth security methods.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CClS0AT

e) Linux E-Poll
Our editors need your help for an upcoming Linux Special issue. Please
take a few minutes to respond to our Linux e-poll as it pertains to 
your
organization. We'll share the (anonymous) survey results in our 
February
5, 2004, issue.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCtv0AC

f) Free Webcast: The 2003 CSI/FBI Report on Computer Crime and Security
This survey is one of the longest running and most widely quoted 
reports
in the industry. During this special one-hour event, Robert Richardson,
editorial director of the Computer Security Institute (CSI), will 
detail
results from the 2003 research and draw conclusions on the overall 
state
of information and network security.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC570A5

------------------------------------------------------------
5) Current Forum Threads
------------------------------------------------------------
a) Ask the Experts: Installing Exchange 5.5 on Windows Server 2000
By Dennis Miller
I am trying to install Exchange 5.5 on a Windows 2000 server. I keep
getting an error that says it must be on an NT domain. I am not running
Active Directory. I just want to create a second SMTP gateway server
with Exchange 5.5 on it. Is there a way to load Exchange 5.5 on a
Windows 2000 server?
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC6K0AR

b) Outsourcing Center: Creating a Hybrid Team?
By Sam Leakey
In your experience, do you feel that it's possible to dump some of the
project management overhead and create a hybrid team of developers 
(some
offshore, some on / some in house, some out) who work through the same
documentation process?
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC6L0AS

View all Forums.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCEu0AO

------------------------------------------------------------
6) Storage Pipeline: Special Report: Ultimate Enterprise Storage
------------------------------------------------------------
By Frank Ohlhorst With Marc Spiwak
The key to cost-effective storage is data prioritization. Here are some
tips for building the ideal storage system.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC6M0AT

Read more from Network Computing's Storage Pipeline.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0B1260Ah

------------------------------------------------------------
7) Mobile Pipeline: Qualcomm Jumps Into Push-to-Talk Fray
------------------------------------------------------------
By David Haskin
The vendor says it will release push-to-talk technology for
next-generation phones.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC6Z0Ag

Read more from TechWeb's Mobile Pipeline.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CAPw0AZ

-------------------------------------------------------------
8) Top Stories
-------------------------------------------------------------
What were readers perusing last week on the Network Computing Web
site? Here's a list of our hottest articles.

a) Feature: VoWLANs
(October 30, 2003)
The merger of wireless LANs and voice over IP could mean significant
cost savings and productivity improvements for enterprise networks.
Early product offerings are expensive and not fully developed, but
Cisco's 7920 stands out.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCc80Ar

b) Secure Enterprise: Special Report: Calling in the Specialists
(October 21, 2003)
Some security projects demand outside expertise. Here's how to 
determine
if you need to call in the consultants.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCdD0A5

c) Sneak Preview: IBM Lotus Notes and Domino 6.5
(October 30, 2003)
Aimed at businesses that need more than simple messaging, Notes-Domino
provides e-mail, calendaring and group scheduling, task management, and
both personal and corporate address books.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCdE0A6

Join other NWC readers in discussing these articles.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0Brcx0Ah

-------------------------------------------------------------
9) Security Threat Watch: MacOS X Vulnerabilities
-------------------------------------------------------------
MacOS X users finally get a chance to play the "patch your system"
game as a result of the many vulnerabilities announced last week.

core file overwrites, argv overflows, insecure file permissions
mod_security 1.7.x: sec_filter_out() remote overflow
thttpd: defang() remote overflow

USB keyboard local root login bypass
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CDHd0AB

core file overwrites, argv overflows, insecure file perms
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CDHe0AC
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CDHf0AD
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CDHg0AE

screensaver keystrokes locking bypass
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CDHh0AF

For more security alerts and information, sign up for our free
Security Threat Watch newsletter today.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCEc0A5

------------------------------------------------------------
10) Storage Pipeline: Review: Out of the Abyss
------------------------------------------------------------
By Jon William Toigo
Managing massive amounts of data on mix-and-match systems is an
overwhelming task. Find out which of the three vendors that responded
to our RFI gets our bid.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CC6S0AZ

Read more from Network Computing's Storage Pipeline.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0B1260Ah

-------------------------------------------------------------
11) Latest IT Pro Downloads: Trellian Internet Studio 2.01;
    Trellian SEO Toolkit 2.01
-------------------------------------------------------------
a) Trellian Internet Studio 2.01
The Trellian Internet Studio suite includes a range of tools for Web
authoring, e-commerce, search and the Internet.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCto0A4
Size: 2337000k
Platform: Windows 95, 98 or NT
Licensing: Shareware; contact vendor for pricing

b) Trellian SEO Toolkit 2.01
The Trellian SEO Toolkit is a Search Engine Optimization application
that features all the tools you will need to manage your Web site and
reach the top of the search engines.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCtr0A7
Size: 1529000k
Platform: Windows 95, 98 or NT
Licensing: Shareware; contact vendor for pricing

Find more shareware, freeware and demoware products, ready for
immediate download.
http://www.itprodownloads.com/

Note: By using IT Pro Downloads you agree to these terms of use.
http://www.nwc.com/itpro/itpro-terms.html

-------------------------------------------------------------
This issue sponsored by Mobilized Software. 
Get the practical strategies, real-world case studies
And trusted roadmaps for mobile and wireless 
Visit Mobilized Software: 
The Ultimate Source for Mobile and Wireless. 
Go to 
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCdS0AL


-------------------------------------------------------------

-------------------------------------------------------------
12) Subscription Information
-------------------------------------------------------------
Did someone forward this newsletter to you? Get your own issue.
http://www.submag.com/sub/nc?wp=wpdly2

Free Network Computing Newsletters. Do more than just keep pace with
today's technologies. Sign up for Network Computing's new cadre of
newsletters to get real-world advice on hot topics like mobile
computing, security, architecting e-business and Unix/Linux. Subscribe
today.
http://www.submag.com/sub/nc?wp=wpdly2

Still not receiving your own FREE subscription to Network Computing
Magazine?
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0B5yO0AN

Note: To better serve you, we use dynamic URLs, which allow us to see
how many readers view each story. We do not share this information or
your personal information with any outside party. Concerned about the
privacy of your information relative to these tracking URLs? Please
refer to our privacy policy.
http://www.doubleclick.net/us/corporate/privacy

We'd like to know what you think about this newsletter and what
information you'd like to see in future editions. E-mail your comments
to (mailto:nwconline@cmp.com).

Subscribe Today! Network Computing's Security Threat Watch (STW)
created in conjunction with Neohapsis, this weekly, customizable
newsletter
will bring you timely, accurate and authoritative data on important
vulnerabilities and security patches. For more information and to
subscribe to this free newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/edoE0E43wY0qh0CCEc0A5

Look for the next Network Computing Online newsletter on Tuesday,
November 18, 2003!

Copyright (c) 2003 Network Computing, a CMP Media LLC publication --
http://www.nwc.com/

This message powered by DARTmail
http://www.doubleclick.net/us/corporate/privacy