W2K3 Gets 'Copy Protection'
No, not what you think. Thank heavens. But they -are- going to put
additional digital rights management (DRM) in W2K3 and in the new
They are calling it Windows Rights Management Services (RMS), and
the goal is to secure corporate documents from any prying eyes.
Not in the least your own employees. Potentially good for the
company, but perhaps not so good for external investigators.
The stuff is XrML-based, which is a new standard for expressing
rights in digital content. Redmond implemented this as a web
service (asp.net) probably counting on the fact this thing will
work fine via the Net, which is reasonable in a commercial
Rights Management Services will be able to work with apps like
email clients, word processors and sensitive corporate documents,
stuff like designs, research results, and the like. All these
will be protected in a persistent way, and the code to do this
will reside in the documents themselves. It allows or disallows,
(using time-based expiration dates) things like printing, copying
Because support for XrML will not be introduced until Office 2003
is released, users with older operating systems, including XP,
will not be able to use the RMS. Redmond said it is developing
tools that will allow users with older operating systems to view
RMS-enabled documents using Internet Explorer.
The master plan is of course that apps will be written so that
your end-user can easily designate who has access to specific
content and what kinds of access rights they have. I can already
see the tech support problems attached with this kind of thing.
This stuff could easily proliferate to your back office servers
and even games. Organizations will be able to enforce these
policies outside the company. More at the MS website:
Here Is Some Ammo To Get Budget!
ComputerWorld is running their Premier 100 Conference in Scottsdale
Arizona. IT security is a top concern for the IT execs attending
Doug Lewis, CIO at Six Continents Hotels Inc., called the problem
of IT security "the single biggest threat" to his organization.
And Curtis Robb, CIO at Delta Airlines Inc., said his company
gets 500 attempts to break into its computer systems every day.
Little wonder, then, that Phil Tyler, operational security consultant
at Phoenix-based Avnet Inc., told an audience that establishing IT
security policies and procedures is critical and shouldn't be placed
under strict return-on-investment constraints. "It's like auto
insurance," he said. "You don't ask about its ROI."
I like that concept. You should have a look at the article and
forward it to your own execs to get them accustomed to this new
and revolutionary viewpoint. ;-)
And here is another article about defending your security budget:
Disaster Recovery Plan - True Story
The NTSYADMIN list server is a free forum for professionals like
you that want a live discussion about problems. Disaster Recovery
plans were discussed. One participant, (Clayton Doige from the UK)
came up with this instructive story:
"A guy is charged with BCP for his entire company. He creates a
plan that covers offsite data protection, staff contact, counseling,
relative notification, office relocation, back up office facilities,
everything you can think of.
"One day everyone arrives at work to see a sign on the door. 'This
building has been blown up, please invoke Business Continuity Plan'
Everyone stands around, not knowing what to do, and then the guy
who wrote the plan shows up, and says OK, no problem, as he has it
in his brief case. Just then the CEO walks up and says to him 'You,
you were in the building when it blew up. You're dead now.'
This document was over a hundred pages. No one else had a copy.
One failed DR test.
"Do you know who needs to be responsible for Business Continuity
Planning? Company directors. It is totally their responsibility to
decide how much money it is worth spending to ensure that the
business stays up and running, and to guess at the odds of this
or that event occurring. Then they need to delegate things like
backups to IT, staff concerns to HR, and so forth. Next the plan
has to come together as a whole for the board to review, and decide
if they want to spend the money. Then, next year, they need to do
it all over again. If your directors don't want to spend the cash,
they are the one's with the most salary at risk at the end of the
Subscribe to the NTSYSADMIN (and all other forums) here:
Want To Play With Ipv6? Here's A Sample Application
Three degrees loads a Teredos Client on the workstation, which is
Microsoft?s back-end service for encapsulating IPv6 though an IPv4
link, which allows IPv6 end nodes to see each other across the Internet.
It enables an IPv6 stack on the workstation. I believe it then
leverages what I would term as IPv6 multicast groups for true
Peer2Peer. I just brought it up on two machines with two different
messenger addresses and it is going to open up a whole new world of
interactive communications and content sharing. I can initiate
showing files, sending "winks" (real-time attention getters) to
the other desktop, and initiating playing music on multiple machines
simultaneously - although it downloads it to the other machine
first instead of streaming it. It does leverage Microsoft?s Teredos
client for allowing IPv6-based clients to see each other across
and IPv4-based network. Now imagine that they enable this
functionality for Office-based collaboration. Check it out at: