- Sign-up Now!
 - Current Issue
 - Edit Your Profile/Unsubscribe

Subscribe | Media Kit | About Us | All Issues | Subscriber Feedback | Contact Us | Privacy Statement
Sunbelt W2Knews™ Electronic Newsletter
The secret of those "who always seem to know" - Over 500,000 Readers!
Mon, Jan 20, 2003 (Vol. 8, #3 - Issue #409)
2003 The Year Of Security?
  This issue of W2Knews™ contains:
    • Finally, in 2003 You Will Get Budget For Security Tools
    • What Was The Surprise 2002 Best Seller?
    • MS' Top 10 Challenges in 2003
    • California Disclosure Law Has National Reach
    • New In Security: MS Lets Governments Review Windows Code
    • Intel Based Workstation Survey
    • Free Wireless Lockdown Tool!
    • Check Out iHateSpam Exchange 2000 Anti-Spam Engine
    • NtDump Allows Free Security Audit
  5. W2Knews 'FAVE' LINKS
    • This Week's Links We Like. Tips, Hints And Fun Stuff
    • Hacker's Challenge 2: Test Your Security & Forensic Skills
  SPONSOR: iHateSpam Server Edition: Coming Soon!
Sunbelt Software is excited to announce the Feb 2003 release of
iHateSpam for Exchange 2000.
This server-based version (with MMC
interface) is currently readied for Beta. In 2002, iHateSpam has become
the best-selling anti spam add-in for Outlook. The Press loves it.
PC World just said: "The iHateSpam Outlook version caught an
impressive 96 percent." Spam costs anywhere from $8 to $26 per
employee per month. Do not lock into any other server side spam
filter until you have evaluated iHateSpam Server edition. Need an
anti-spam solution right now? Buy the client-side solution and get
a 100% upgrade credit if you move to iHateSpam Server. More at:
Visit iHateSpam Server Edition: Coming Soon! for more information.

Finally, in 2003 You Will Get Budget For Security Tools

I'm not sure if you are aware of a publication called Enterprise Systems Journal. They have been around for a while and just came out with some very hopeful news. Sept 11, up to now, has mostly caused companies to invest money in physical security and disaster recovery tools but not security. Spending for security in IT was mostly flat last year. No more it seems. Several industry analysts say that security projects that were postponed are going to be kicked in gear this year. We're talking mainly things like vulnerability assessment, patching and security event analysis.

Market research firms are now predicting a recovery in IT security spending in 2003 and beyond. Vista Research, for example, projects that spending for security products and services will grow by 11 percent this year and by an additional 18 percent in 2004. That means apart from (valuable and needed) so called "point solutions", you will also see more "in depth" projects getting going. It's a good idea to show the full article to IT management, and start your budget/purchase cycle early. Following is the link to the full article which also features Andrew Baker, a superstar on the very popular NTSYSADMIN list server we sponsor:

And here are the links to the two best selling point solutions:

  1. UpdateExpert: The Ultimate Service Pack and Hotfix Manager for Windows XP/2000/NT. This product is the best-of-breed in managing patches and keeping your networks secure.
  2. Retina: Award winning vulnerability and penetration scanner. Does both outside-in and inside-out scans with blistering speed.
If your organization is considering a wall-to-wall, enterprise- wide, top-down, multi-platform complete security solution, then check out VigilEnt. This is a very comprehensive (both personnel and hardware) high-end IT security solution that also makes your organization HIPAA and GLBA-compliant. (HIPAA is a U.S. government- driven security standard for healthcare and GLBA is a similar law for banking, financial institutions and commerce)

Let's get secure in 2003!

Quote of the Day Corrected. Einstein really said: "Great Spirits have always encountered violent opposition from mediocre minds". We had the quote as: "Great spirits often meet violent opposition with mediocre minds"

Here's another good one:
"...You should be asking yourself, "Do I feel lucky"....well, do ya, Punk?"...Clint Eastwood as Dirty Harry.

Warm regards,
Stu Sjouwerman
(email me with feedback: [email protected])

  SPONSOR: Double-Take
Disaster Recovery has become priority #2, right after Security.
This means you have to have a tested plan and reliable tools in
place for the moment your site goes down. Double-Take is that tool.
Sold more than all other High-Availability tools combined. It is
even certified for W2K Datacenter. No other HA tool is. How it
works? "Server A goes down--Server B takes over transparently".
Get the eval copy here, this is your ultimate job-security:
Visit Double-Take for more information.

What Was The Surprise 2002 Best Seller?

Looks like you were all tired of both traveling and bloatware at the same time. Huh? Well, you replaced really large remote control tools for a fast, nimble and small-footprint remote admin tool in droves. One of you called it a "pcAnywhere Killer" and with reason. The Sunbelt Remote Admin really took off in 2002. It is blisteringly fast, easy to install on remote servers, and it's got everything an admin's heart desires.

And to show you that this is not just our own opinion, here is an independent review that shows just the same thing. They claim remote management has been a godsend. That might just be overstating it a bit, but it certainly is extremely convenient.

You can program your Active Directory Group Policy to install Sunbelt Remote Administrator when a user logs onto the network for the first time. Installation takes about a minute. PcAnywhere is just too big of an application to use with Group Policy. Click here for the TechTarget article.

And get your eval copy of Sunbelt Remote Admin here!

Want to know what the current Top 10 Bestsellers are? Click:


MS' Top 10 Challenges in 2003

"Directions On Microsoft" is a consulting outfit that does nuthin' but MS. They even maintain an updated MS org chart for their customers with the ever changing 800 MS execs. On their website is an interesting article that shows what MS's hurdles are expected to be this year. Nothing astounding but definitely worth a few minutes:

California Disclosure Law Has National Reach

This year a new California law will require businesses to notify their customers after being hacked. It could change intrusion response practices throughout the U.S. Check out the net-security site for that article:

New In Security: MS Lets Governments Review Windows Code

Yup, you can finally see it! Want to check out what is under the hood? Now you can, if you work in a multi-national or a government. (And after your have signed non-disclosure statements equivalent to a Top Secret clearance [grin]) If you belong to a lowly state, provincial or local government or agency, or you are in small business... tough luck. This is for the big dawgs only.

Just this Tuesday MS announced that upon request, it will allow governments and multinational businesses access to the actual code underlying several versions of Windows. This with the goal to make the customer feel more warm and fuzzy about security.

Russia and the North Atlantic Treaty Organization (NATO) have already signed up for Microsoft's new Government Security Program (GSP) and Microsoft is in talks with more than 20 countries about the program.

GSP covers current versions, SP's and beta releases of W2K, XP, W2K3 and CE. You can look at the source code and other technical data you need to conduct "robust security reviews" as they state. You can see the code in a debugger, but not compile, redistribute or actually modify the code. Duh. But they are willing to listen to suggestions you may have.

My take on this: That's all fine and dandy, but real deal here is the threat of Linux, which is open source so that anyone can do code review if they like. Security? Naah. Competition? Yup! Here is the official Redmond statement:

Intel Based Workstation Survey

As a W2Knews subscriber, we value your expert opinion on business and technology-related issues. We are currently conducting a survey about user satisfaction with Intel based workstations.

You must be responsible for selecting or recommending brand/model of workstation purchases for company, and have purchased one of these brands (HP, Compaq, Dell, IBM) within the last 18 months.

We would like to include your opinion if you have Intel based workstations installed at your location and are involved in the purchase of/recommending process for workstations.

To show our appreciation for your time participation in the study, you will be entered into a drawing to win $500. AND, the first 100 people that respond and qualify, will get a $15 Amazon gift cert (Terms and Conditions). The survey takes about 10-15 minutes to complete and is right here:


Free Wireless Lockdown Tool!

SecureWave just released a free security solution that, I dare to say, is of interest to many of you.

In two words, they have released a Windows 2000/XP solution that allows you to prevent the use of Wireless cards --unless you actually want your users to use them of course. Many companies spent lots of money on their firewalls and, those that make use of it, even WLANs. However, today the focus has been on securing the communication between the WLAN endpoints and the base stations -- but what about if you do not want them in the first place?

Under Windows 2000/XP you (as an end-user) just need to plug one of these wireless cards in that machine and bingo -- security polices are out of the window. If you want to make sure that WLAN cards cannot be used your will love WaveLock. I know the developers myself, these are reliable people. Wavelock is free, not supported but definitely interesting. check it out at:

Check Out iHateSpam Exchange 2000 Anti-Spam Engine

Here are some very happy users of iHateSpam on the client-side. Try this for yourself so you will see how the iHateSpam detection engine will work on the server level.

A "testimonial" for your records - iHateSpam works the way add-ins should work: easily installed and configured, clean and intuitive user interface, and seamless integration. We didn?t need a 30-day evaluation; we were convinced after using it for less than a week. Like the other Sunbelt Software utilities we use, this one works "as advertised." If you?ve experienced the frustration of spending hours to develop and maintain filtering rules for an email client, and you?re currently using Outlook, this utility is for you. --Bruce Brown.

"Just a quick note to everyone at Sunbelt. This is flat out the best twenty bucks I've spent on software in a long, long time! Thanks for a great product, at a great price, and with a great license policy (it's really nice to pay once and get the opportunity to use the product at work on the laptop and at home on my desktop). Keep up the great work!" --Gordy Power.

"I'm too busy to send in comments but... I cannot believe how well iHateSpam works!!! It's a class unto itself. I'd been playing with junk-sender lists and complicated rules. Nothing was working. Clicking on 'add to junk-senders list' is no more convenient than 'delete'. Other programs I tried seemed to be fancy complicated rules that needed to be baby-sat. I'd pay $20 just for the filtering but the addition of bounce and collaborative spam busting makes the decision to buy a no-brainer. Actually, I'd rather have iHateSpam than Windows. I'll recommend it highly to other spam victims. -- Matt Wortman, University of Cincinnati

The server version is arriving soon. Stay tuned. Again, want to see how the engine works? Download a client version and check it out. The spam detection engine for the server version is identical to the client version, which just became a Comp-USA best seller:

NtDump Allows Free Security Audit

The NtDump project is proud to announce the release of NtDump Version 1.0. NtDump allows system administrators to audit their security by viewing information normally hidden from view by Microsoft Windows.

NtDump is the successor to lsadump2 and pwdump3e, combining the functionality of both to create a better tool. It boasts features such as 128 bit encryption and batch mode.

The 1.0 release signifies stability for NtDump. It is now appropriate for production use.

"Auditing passwords is an essential part of the security cycle," says Ben Maurer, the author of NtDump, "NtDump assists auditing by helping to automate the collection of password hashes."

"The secret dumping functionality of NtDump can help investigators in computer crime cases," he continues "For example, if a police department suspected that a hacker had used a specific username and password for his dial-up account, NtDump could allow the department to verify this suspicion by analyzing the saved usernames and passwords in the LSA."

NtDump is licensed under the GNU General Public License, like its predecessors. To find out more and download NtDump, please visit


This Week's Links We Like. Tips, Hints And Fun Stuff

  • What REALLY was the first personal computer? Incredibly interesting:

  • http://www.w2knews.com/rd/rd.cfm?id=030120FA-First_PC
  • Millions of schoolchildren are drugged, "legally", for profit.

  • http://www.w2knews.com/rd/rd.cfm?id=030120FA-Fight_for_kids
  • The new Microsoft Watch, and Smart Personal Objects Technology (SPOT):

  • http://www.w2knews.com/rd/rd.cfm?id=030120FA-SPOT
  • Sunbelt sponsors a bunch of very popular forums where you can discuss IT problems with Admins in other companies:

  • http://www.w2knews.com/rd/rd.cfm?id=030120FA-Forums
  • Chris Kempster just finished an ebook titled "SQL Server for the Oracle DBA". Excellent coverage of the SQL Server 2k RDBMS for the DBA new to SQL Server, and would also be an excellent reference book for seasoned SQL DBA Sold online over at:

  • http://www.w2knews.com/rd/rd.cfm?id=030120FA-SQL_eBook
  • A very, very COOL Canadian hotel room.

  • http://www.w2knews.com/rd/rd.cfm?id=030120FA-Ice_hotel

    Hacker's Challenge 2: Test Your Security & Forensic Skills

    Do you have what it takes to keep the bad guys out of your network? Find out with the latest edition of this best-selling book featuring 20+ all new hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants. It's over at Amazon.com