- Sign-up Now!
 - Current Issue
 - Edit Your Profile/Unsubscribe

Subscribe | Media Kit | About Us | All Issues | Subscriber Feedback | Contact Us | Privacy Statement
Sunbelt W2Knews™ Electronic Newsletter
The secret of those "who always seem to know" - Over 500,000 Readers!
Sun, Oct 25, 1998
Sunbelt Windows NTools E-News[tm] Vol. 3, #21 - Oct 25, 1998
  This issue of W2Knews™ contains:
Sunbelt Windows NTools[tm] Electronic Newsletter
Vol. 3, #21 - Oct 25, 1998
--- http://www.sunbelt-software.com ---

********************************************************************
Sunbelt Windows NTools E-News is the World's first and largest 
E-Newsletter designed for NT System Managers that have the job of 
getting and keeping NT up & running in a production environment.
Sunbelt launched this electronic newsletter early 1996 so we 
could keep the Windows NT community informed and aware of what 
is happening with NT and 3-rd party NT System Management Tools. 
You get hints and tips that will enable you to better utilize 
and understand Windows NT. You'll find general Windows NT related
and third party news, technical information, and 3-rd party beta
and release information. By subscribing to NTools E-News[tm],
you will receive instant notification of important NT related
events and you are also a charter member of the Sunbelt Field 
Test Bonus Program. Sunbelt Software is the first and largest 
distributor worldwide of Third Party System Management Tools for 
Windows NT with 6 subsidiaries in the USA and Europe.
********************* over 100,000 subscribers!*********************


This issue of Windows NTools E-News contains:

1. "EDITORS CORNER" 

2. "TECH BRIEFING"
* DOUBLE-TAKE FUTURE: MIRROR NT<->NETWARE<->UNIX
* SP4 THIRD PARTY TOOL COMPATIBILITY ISSUES

3. "NT RELATED NEWS" 
* NT WILL CHANGE ITS NAME...
* NEW MS WHITE PAPER: DEPLOY EXCHANGE IN NETWARE ENVIRONMENT
* WHAT IS THE DIFFERENCE BETWEEN THE 'SMALL' AND 'BIG' SP4?
* NEW COURSEWARE FOR NT 5.0
* MCSE COMPLETE UPDATE COMING SOON

4. "NT THIRD PARTY NEWS"
* HOW TO PREVENT AN NT SECURITY DEBACLE LIKE CATERPILLAR'S
* TUESDAY: STORAGE RESOURCE MANAGER ENTERPRISE EDITION !

5. "HINTS AND TIPS - TIME SAVERS AND OTHER GOODIES...

6. "THE NT STOCK WATCH"

7. "Y2K WATCH"

8. "HOW TO USE THE MAILING LIST"
NEW Instructions on how to subscribe, sign off
and change your address.

***********************SPONSOR**************************************
Save thousands of dollars. Check out the DELL OUTLET for refurbished
NT Servers. Every DELL refurbished system is thoroughly checked, 
tested, and re-tested in their server factory - it's got to look and 
perform like new before it goes out the door. DELL can even custom 
configure your servers. But the best thing is, they come with the 
same 3-year warranty and on-site support as new systems. Check out
their on-line stockrooms and you will like what (price) you see. 
https://www.dell.com/outlet/sunbelt.htm
*************************SPONSOR************************************

1. "EDITORS CORNER" 

Hi NT-ers,

There is a lot of interesting news, so this Editor's Corner is very 
short. The item I recommend most this time is _at_least_ read the
Caterpillar NT Security Debacle, and make sure you prevent this from
happening in your own outfit. Investigating this further I found some 
enormous holes in our own Sunbelt password policies and I'm going to 
take action!

Warm regards,

Stu Sjouwerman



********************************************************************
2. "TECH BRIEFING"

* DOUBLE-TAKE FUTURE: MIRROR NT<->NETWARE<->UNIX

One of the reasons we chose for Double-Take for mirroring and fail-
over was the extremely interesting future versions that will become
available. I can lift the veil of just one powerful feature that
will see the light in future versions. 

Since Double-Take existed first on Netware before they rewrote
the code from scratch for NT, the developer has in-depth knowledge
about the Novell Platform. They acquired UNIX expertise and in
the coming year we will see Double-Take being able to mirror the
critical data from your UNIX and Netware Servers to NT, and the
other way around. 

More than 70% of you are working in a mixed environment, so this
is a welcome addition to your arsenal of tools to keep your data
safe. If you want to have a quick overview why we feel Double-Take
is the best product out there for mirroring and fail over, have a
look at this table: http://www.sunbelt-software.com/mirrcomp.htm
For 30-day download: http://www.sunbelt-software.com/dtake.htm
----------------------------

* SP4 COMPATIBILITY ISSUES

It's obvious that the new SP4 would bring some changes. I'd already 
promised that if we would be aware of compatibility issues with any
of our tools, we'd let you know. There are two at the moment that 
are being fixed. More may be coming out of the woodwork soon though:

1) Balance Suite. When someone has SP4 on their system, the install 
of Balance Suite fails. Apparently the NDIS hotfix plugs a registry 
setting that is not there for SP4.

2) AutoPilot does not like the new SP4 Kernel. After the SP4 install,
AutoPilot comes up with an error message that it cannot start. This
was actually expected as a matter of fact.

Both issues are currently remedied by the Developers and we will soon
have new versions that fix these problems. Usually developers cannot
make 100% SURE their fixes will work until the final SP ships, too
much stuff can change at the last moment. We should have versions
that work in a few weeks.


********************************************************************
3. "NT RELATED NEWS" 

* NT WILL CHANGE ITS NAME...

Yup! Since in the Year 2000 the windows code base will be NT-only,
there is no need for a name like W98 or NT to distinguish them 
anymore. Microsoft is mulling over names like Windows 2000, and what
is also discussed is Windows Pro. We'll see what comes out but at
least you are now warned to not invest too much in the NT abbreviation
because it's going to disappear in the near future. 
---------------------------

* NEW MS WHITE PAPER: DEPLOY EXCHANGE IN NETWARE ENVIRONMENT

In one of MS's electronic newsletters I was sent this item that will
probably be of use to you. Two recently released Exchange Server 
white papers provide more detailed information on how Exchange works 
and how to set up Exchange Server 5.5 in a NetWare environment. 
http://www.microsoft.com/exchange
----------------------

* WHAT IS THE DIFFERENCE BETWEEN THE SMALL AND BIG SP4?

Well, first of all we should restate this and call it the BIG
SP and the GIGANTIC Service Pack . There are two flavors of SP4. 
One is 32Meg, the other is 76Meg (!).

When you expand the bigger one, it contains the following:
-NT4 SP4
-Y2K Fixes for IE
-Y2K Fixes for Data Access components, and
-Y2K Fixes for Site Server

That means it is the 32Meg and ADDED are the above Y2K fixes.
If you run the executables, they will expand and tell you 
what is in there and how you should apply them. It's suggested
to call MS and get the CD. You may need to reapply SP4 on a
regular basis so a CD is no luxury. 

If you want to get the new Microsoft SP4 FAQ and download site:
Click your way to: (URL's broken up so you can copy and paste)

http://support.microsoft.com/support/ntserver/Content/
ServicePacks/Default.asp

More interesting, here is the looooong LIST OF BUGS FIXED in NT4.0
Service Packs!

http://support.microsoft.com/support/kb/ARTICLES/
Q150/7/34.asp?PR=IE4&T1=7d&FR=0&A=T&T=B&S=F&

If you want to automate the rash of new hotfixes coming out for SP4, 
check out the new SPQuery you can get in the Online Shop for $129.95 
with immediate electronic delivery: 
http://www.sunbelt-software.com/spquery.htm
-----------------------

* NEW COURSEWARE FOR NT 5.0

New Windows NT 5.0 Beta Courseware is available at:
http://www.microsoft.com/train_cert/courses/index/nt5moc.htm

Your Cheat Sheet for Microsoft NT 4.0 Resources
http://www.microsoft.com/train_cert/resource/nts4res.htm


********************************************************************
4. "NT THIRD PARTY NEWS"

* HOW TO PREVENT AN NT SECURITY DEBACLE LIKE CATERPILLAR'S
(and how Sunbelt's security was found leaking as a sieve as well)

Are your users resisting password policy? Are they using easy to guess 
passwords, or write them down on notes stuck to their screen? Do they 
perhaps share passwords with other employees? This kind of behavior
is all too common, and I found and even worse one in Sunbelt itself.
These above common situations give hackers (inside or outside) too 
easy access to your priceless corporate data, regardless of the 
strength of any other security policies you may have in place.

For those of you that may not believe that enforcing password 
conventions, or having the ability to easily delete user accounts 
are important to network security, here is something that might be 
of interest: 'Caterpillar LAN hack: A lesson in security'
You really want to read this, it's maybe 5 minutes but actually
QUITE important.

When I read through it, I realized with dismay that within my own
outfit Sunbelt a few of these policies were not 'IN' either. Worse:
 I did a little check and it turned out to be common 
practice to have username and password IDENTICAL...
Well, THAT is going to change starting Monday morning !! READ THIS:
http://www.zdnet.com/pcweek/stories/news/0,4153,361425,00.html

Done? Got the scare of the month? OK, now how to handle this? 
Trusted Enterprise Manager would have prevented the Caterpillar 
security break in the following 6 ways.

1) Most companies spend a load of money protecting security breaks
for "Outside-->In" scenarios. But the majority of breaks (80%) come 
from INSIDE. Companies are not enforcing strong password conventions
because "it's too much trouble with NT". Password setting with TEM is 
much faster and easier and can be set by a delegated help desk or user 
who doesn't even know the actual passwords.

2) This catastrophe at Caterpillar was through a dormant account 
that wasn't deleted. This happens where System Admins are overworked 
and overloaded doing "more important work". TEM allows you to offload 
these minor but critical tasks to a help desk who has fewer responsi-
bilities - and so can much more easily and reliably manage these
tasks.

3) NT User Manager gives no reports by which to manage this kind of
undesirable exception - a dormant account with full domain access. 
TEM provides monthly or quarterly reports to pro-actively monitor this 
kind of outpoint and handle it ahead of a major break like this. At 
any point in time a SysAdmin can scan and find any glaring holes in a 
system, such as "all unknown dormant accounts".

4) With TEM remote users have to have some kind of RAS authorization 
before they can even get into a system. This hacker would never even 
have been able to get in if TEM had been in place. TEM sets RAS 
authorization easily and automatically.

5) TEM grants network access ONLY to stations you need and this 
hacker, even if in the network, would never have been able to access
a dormant account like this.

6) With ability to preview system weak points and correct them, TEM
will prevent a Caterpillar type catastrophe at your company. But if by 
some Act of God something ever did happen, TEM would immediately and 
directly be able to find out where and how it happened to stop it. This
wouldn't have continued for 24 hours like it did at Caterpillar.

Now here's the punchline! Caterpillar was offered TEM about a year ago. 
They decided they "didn't really need it" We can only suggest to not be 
the next Caterpillar Wall Street Journal horror story. Get TEM first: 
http://www.sunbelt-software.com/tem.htm
---------------------------

* TUESDAY: STORAGE RESOURCE MANAGER ENTERPRISE EDITION

You could very well call SRM the 'missing BackOffice Storage Server 
module' Coming Tuesday you will get a separate NewsFlash with the full
data about SRM EE V3.0. The new SRM V3.0 EE has MS SQL Server as the 
database engine and will now scale up to Enterprise Level.

Storage Resource Manager is being implemented at many Global 2000 
companies like Kmart, Northrop Grumman, Staples, Deutsche Bank, and GE 
because it is the only application that gives IT organizations the 
ability to centrally manage their Windows NT and Microsoft BackOffice
storage. 

These organizations have found that SRM complements their existing 
BackOffice applications, and fits in great with their existing enter-
prise management frameworks like Unicenter, OpenView, and Tivoli. They 
have also found that SRM quickly pays for itself and saves them money 
because they can now:

1. Avoid productivity losses due to backup job overruns, incomplete 
backup coverage, poorly balanced file servers, and out-of-space 
problems causing downtime.

2. Keep a flat IT headcount because their existing staffs spend less 
time managing storage and more time supporting business growth. They 
now let SRM centrally monitor their distributed NT files, directories, 
share points, partitions, and disks.

3. Stop buying unnecessary disks, file servers, and backup hardware by
identifying stale files, establishing quota management policies to 
reign in user disk space consumption, and implementing disk space 
charge-back.

4. Become a more proactive IT organization and less reactive by making 
more informed NT storage decisions based on clear historical trends.

Here are just a few of the Storage Resource Manager highlights:

- Disk space alerts, thresholds, and reports ensure that critical
application and file server partitions and directories have sufficient 
free space levels to maintain user productivity.

- Stale file reports identify the unused files on your network that 
could be deleted or archived, so you can free up disk space and avoid 
unnecessary storage purchases

- Backup Planning reports and trends ensure complete backup coverage, 
and enable you to balance your backup servers and clients to avoid 
backup job overruns.

- File server load balancing trends enable you to increase user
productivity

- Capacity planning trends and centralized reports save your outfit
time by enabling you to anticipate future needs and problems, justify 
storage budgets, and determine where to add new users.

- User (network-wide) and Directory Quota reports and alerts enable 
you to limit user disk space consumption and avoid more unnecessary 
storage purchases.

- Storage Area Network (SAN) planning is made possible through SRM's 
File Modification reports and custom filters, which enable you to 
analyze what storage should be moved to a SAN, and what storage should 
be left on server-attached RAID.

- Charge back on disk space is made possible by SRM's Group Accounting
reports, so departments pay for what they use.

Storage Resource Manager features a Web-based interface that can be
securely run from anywhere on your Intranet. Plus, the Removable 
Storage Management service they are developing for Microsoft for NT5.0 
and their partnership with IBM will provide a clear road map to the 
future and the ability to manage all types of logical and physical 
storage resources, from disk to RAID to SAN to tape/optical robots.

For a sneak preview: http://www.sunbelt-software.com/highsrm.htm
--------------------------

* MCSE COMPLETE UPDATE COMING SOON:

Our apologies for the delay on the next version! I got this
letter from Macmillan publishing a few days ago"

"All registered users will be getting the update in the next 
three weeks. They'll get Exchange 5.5, and the new Windows 
70-64, plus we've made quite a few content updates. The 
questions have gone through yet another tech edit, and we've 
improved the readability of the chapters, and all known bugs 
have been fixed.

"Stu, we're going to get this out quickly. I just spoke with 
our lead developer and we've just finished testing the 
installation routines, and double-checked the known-errata 
list to ensure we've caught everything possible.

"Sorry for the delay. I know we promised this for the last 
week in August, and we're going to be two months late. I do 
feel that the extra time will be worth it to our customers in 
the end. We'll be sending an announcement via e-mail to all 
registered users in the next week or so announcing the 
impending shipment of the update CD.

Well, I hope they are able to make it this time. I'll believe it
when I see it. 


********************************************************************
5. "HINTS AND TIPS - TIME SAVERS AND OTHER GOODIES...

CORRECTION: Last Issue we discussed naming conventions. We were a
bit too enthusiastic and make it look worse than it was. Here is
the corrected version:

'Domain Names Servers (DNS) are similar to WINS, but they don't 
support dynamic changing of server names. Also WINS uses NetBIOS 
names, where an underscore (_)is a valid character, and dashes (-) 
are not allowed. DNS uses computer names where dashes and underscores 
are not recommended characters. Microsoft currently recommends not 
using dashes or underscores in computer names, as either character 
will not allow the NetBIOS name to be the same as computer names. 
Some applications require that a computer's NetBIOS name is the same 
as its computer name - this is also required for NT 5 migration. 
Either DNS names or NetBIOS names can be used for computer names - 
it depends on the application as to which type of name is used and 
preferred.'
------------------------

Since I moved over from Eudora Pro to Outlook98 last week I came to
find it's an excellent idea to have your Outlook.pst file backed up
on a regular basis. I imported 60MB worth of old Eudora stuff into 
Outlook and all went well. All the separate Eudora files were now 
happily huddled together in one BIG 60MB file called Outlook.pst.

Until I used the Alt-Ctrl-I option to shortcut to the InBox. Worked
well before, but Outlook hung up with 100% CPU Utilization trying to 
get into the .pst file. Uninstall / Reinstall did not help. End-task 
was the only way out. Creating a new outlook.pst file got it going 
again, but of course I lost access to the .pst file with my old data. 
Of course I have to shamefully admit I had no backup made yet. 

Normally you can use the "Inbox Repair Tool", which you will find 
under Start->Programs->Admin Tools->Inbox Repair Tool and that utility 
normally does a good job in repairing corrupted PST files. Not in
my case though. Running through it did not solve the problem and it
kept showing 100% CPU at the Outlook startup and froze. Oh well, trash
the old one and create a new Outlook.pst.

Good thing I had no mission critical data in my email. But from now on
I'm going to backup my Outlook.pst file, if only to keep my phonebook
with email addresses intact!


********************************************************************
6. "THE NT STOCK WATCH"

52 WK 52 WK P/E WEEK
SECURITY CLOSE HIGH LOW RATIO CHNG
---------------------------------------------------------------------
BMC Software............. 44 15/16 60 1/4 27 3/8 38 +6.6%
Citrix Systems........... 62 1/8 76 3/4 36 3/8 +3.8%
Compaq Computer.......... 28 7/8 38 11/16 22 15/16 +6.4%
Computer Assoc........... 38 9/16 61 15/16 26 41 +8.6%
Data Genl................ 11 7/8 24 7 +25.0%
Dell Computer............ 58 1/4 69 1/4 17 1/2 70 +2.7%
Gateway 2000............. 51 5/8 68 3/4 25 1/16 68 +16.3%
Hewlett Packard.......... 57 15/16 82 3/8 47 1/16 20 +7.2%
IBM...................... 141 9/16 143 11/16 88 5/8 24 +4.1%
Intergraph............... 6 1/8 13 9/16 5 +10.1%
Microsoft Corp........... 106 3/8 119 5/8 59 52 +1.2%
NCR Corp................. 30 3/8 38 3/8 23 1/2 29 -1.0%
Network Assoc............ 39 1/16 56 7/8 25 1/2 +17.4%
Novell Inc............... 13 15/16 14 6 13/16 77 +10.9%
Oracle Corp.............. 27 3/32 37 1/4 17 3/4 27 +2.4%
Qualcom Inc.............. 54 1/4 71 15/16 37 3/4 40 +14.2%
Qualix Group Inc......... 2 5 7/16 0 15/16 +60.0%
Seagate Tech............. 23 7/8 30 16 1/8 +8.2%
Silicon Graphics......... 9 3/8 17 3/16 7 3/8 +4.1%
Sun Microsyst............ 52 1/2 55 1/16 30 3/8 27 +4.4%
Sybase Inc............... 5 11/16 20 3/4 4 1/2 +1.1%
Symntc................... 13 3/4 32 5/8 8 11/16 16 +24.2%
Unisys Cp................ 25 1/16 30 11/16 11 1/8 +4.9%
Dow Jones 30 Industrials. 8,452.29 +0.4%
********************************************************************

7. "Y2K WATCH" Only 432 days to Jan 1, 2000 

A recent survey done by the very well known GartnerGroup shows that 
not everything is A-OK with Y2K. The worldwide prospects of making it 
into the new millennium and through 2000 without significant disruption 
are bleak. You can draw that conclusion from its latest data yourself.

http://www.wired.com/news/news/business/story/14244.html
----------------------

A friend of mine sent me the following, it's interesting to know that
Unix has its own kind of similar problem. I'm not sure where he got
the data, but it _seems_ genuine. Let me know if you know more?

"By the way, if you aren't worried about Y2K -- or even if you are --
you don't have to lose sleep over the much less famous Unix calendar
situation. This one relates to the way the current version of the Unix
operating system keeps time: counting seconds from Jan. 1, 1970,
and calculating the date and time from there.

"In Unix, the first second of recorded time was represented as a
32-digit integer that consisted of 32 zeroes. (The first zero was
reserved to signify that it was a positive number; starting with a one
would mean the overall number was negative.) Using binary
arithmetic, where the only numbers are zero and one -- or ``on'' and
``off,'' which is how computers view existence -- the next second was
represented by 31 zeroes followed by the number one. The third
second of Unix time was 30 zeroes followed by a one and a zero.
And so on.

"At about 3:15 a.m. on Jan. 19, 2038, the Unix clock will hit a number
consisting of a zero and 31 ones -- in decimal notation, a little more
than 2.4 billion seconds after Unix time began. In the following second
it will ``overflow,'' in tech jargon, creating a number consisting of a
one followed by 31 zeroes. In our decimal world, that will represent
minus 2.4 billion seconds, meaning the computer will now think the
year is 1901, with obvious and non-obvious consequences.

"So think of this as, roughly speaking, the Unix Y2.038K problem.
Some fixes are in the works, but the Unix crowd assumes that this
won't cause a problem in any event. By 2038, they say, Unix will
have been rewritten in a way that counts time in numbers containing
64 digits (maybe even more). Even going from 32 to 64 buys enough
time to breathe easy: 584 trillion years, give or take a few thousand
millenniums.


********************************************************************

8. "HOW TO USE THE MAILING LIST"
Instructions on how to subscribe, sign off
or change your email address

TO SUBSCRIBE TO THE LIST

US: http://lyris.sunbelt-software.com/scripts/lyris.pl?join=nt-list
and fill out the form, simple & easy: 1 minute work.
_____________________________________________________

TO QUIT THE LIST

1) The Web Way:
http://lyris.sunbelt-software.com/scripts/lyris.pl?
choose the NT-List, use your email address that is at 
the bottom of each newsletter and leave the list via 
the web interface.

2) The Email Way: Simply follow the instructions at 
the very end of this newsletter.
_____________________________________________________

TO CHANGE YOUR ADDRESS

First unsubscribe and then resubscribe as per the
procedure above.

********************************************************************


FOR MORE INFORMATION

On the World Wide Web point your browser to:

For the newsletter and our website:
USA: http://www.sunbelt-software.com

Email for US sales information to:
[email protected]
Email for US Tech support to:
[email protected]
Email to the US Editor:
[email protected]

Email for European Sales to:
[email protected]
Email for European Tech support to:
[email protected]

********************************************************************


Things Our Lawyers Make Us Say:
This document is provided for informational purposes only. 
The information contained in this document represents the
current view of Sunbelt Software Distribution on the issues
discussed as of the date of publication. Because Sunbelt
must respond to changes in market conditions, it should not
be interpreted to be a commitment on the part of Sunbelt
and Sunbelt cannot guarantee the accuracy of any informa-
tion presented after the date of publication.

INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS"
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
FREEDOM FROM INFRINGEMENT.

The user assumes the entire risk as to the accuracy and the
use of this document. This document may be copied and
distributed subject to the following conditions: 1) All text
must be copied without modification and all pages must be
included; 2) All copies must contain Sunbelt's copyright
notice and any other notices provided therein; and 3) This
document may not be distributed for profit. All trademarks
acknowledged. Copyright Sunbelt Software Distribution, Inc.
1998.

(email me with feedback: [email protected])