- Sign-up Now!
 - Current Issue
 - Edit Your Profile/Unsubscribe

Subscribe | Media Kit | About Us | All Issues | Subscriber Feedback | Contact Us | Privacy Statement
Sunbelt W2Knews™ Electronic Newsletter
The secret of those "who always seem to know" - Over 500,000 Readers!
Mon, Feb 9, 2004 (Vol. 9, #6 - Issue #462)
The TOP 2 Headaches For IT
  This issue of W2Knews™ contains:
    • Microsoft and Sunbelt Software Jointly Announce...
    • New RSS Feeds
    • New SunPoll re the CAN-SPAM Act
    • Wi-Fi to Your Car
    • New Novell CLE Certification
    • Flushing The Outlook Cached Email Addresses
    • All about AD OUs
    • Top 12 Things A Klingon Programmer Would Say
    • New Survey: IIS Serves The Most High Traffic Web Sites
    • Open Beta 64-bit Windows
    • IM CON: The Business Case Against Instant Messaging
    • Microsoft Firewall Dispels Myth Of Hardware Superiority
    • Spam In Europe: 53% Of All Email
    • Survey: IT Spending Back From The Dead
    • Antivirus: How Come These Things Keep Creating Havoc?
  5. W2Knews 'FAVE' LINKS
    • This Week's Links We Like. Tips, Hints And Fun Stuff
    • Why Is Redmond's 1B$ Hole Going To Cost You Money?
  SPONSOR: Microsoft® & Quest Software®
Determine Potential Savings - Get Your Storage Assessment.
Disk space is cheap, but managing storage isn't. How are you
planning to tackle this growing concern? Determine your company's
storage fitness, potential TCO and achievable project savings
with Microsoft® and Quest Software's Storage Optimization
Offering. Download the complimentary storage assessment tools.
Visit Microsoft® & Quest Software® for more information.

Microsoft and Sunbelt Software Jointly Announce...

Put this one in your planner for March 3rd! Microsoft and Sunbelt Software jointly announce the Microsoft Executive Circle Webcast: How to Protect Your Enterprise from Spam: Solutions for Microsoft Exchange. Get more information and register on the web here:

New RSS Feeds

Fave RSS Feeds of the Week: kbAlertz has hundreds of RSS feeds for Microsoft KnowledgeBase articles. Pick the ones you like at:

And here is an RSS feed on the lighter side: Dilbert

Send me an email and tell me, which is your favorite RSS Reader?

New SunPoll re the CAN-SPAM Act

Jan 1, the new federal CAN-SPAM act went into effect. Here's the SunPoll Question: What impact has the act had so far on your company e-mail servers? Please vote here, rightmost column:

Quotes of the Week:
"Imagination is more important than knowledge". - Albert Einstein
"Reality is that which, when you stop believing in it, doesn't go away". - Philip K. Dick
"If you give a user an opportunity to fail, they will take advantage of it." - John Henry Maurice

Warm regards,
Stu Sjouwerman (email me with feedback: [email protected])

  SPONSOR: Double-Take
Are your servers protected? Disaster Recovery is #1 priority.
New: Professional Services - A Guarantee to make it work in your
environment for a fixed price! Ask your Rep for details.
Do you have to have a tested plan and reliable tools in place for
the moment your site goes down? DOUBLE-TAKE is that tool. Sold
more than all other High-Availability tools combined.
It is even certified for W2K Datacenter. No other HA tool is.
Visit Double-Take for more information.

Wi-Fi to Your Car

If you can send MP3 files wirelessly around your house using 802.11b, why not pipe music via Wi-Fi to your family car as well? Wi-Fi can transfer music to an MP3 jukebox in the trunk when your car is in the garage or parked nearby.

Rockford Corp. is currently shipping a device intended for this application, and more products are expected by year's end from car audio makers and PC networking companies. The Rockford Omnifi DMP1 ($600 street) is a trunk-mounted 20GB jukebox that links to your car audio system. It has USB 2.0 and 802.11b connections, along with a small synchronization applet for your PC. USB is for the initial transfer, and Wi-Fi is for daily updates. More:

New Novell CLE Certification

A few days ago, Novell announced two new certification programs: Certified Linux Engineer (CLE) and SUSE Certified Linux Pro.

Both of these certs have a strategic goal to get more Linux knowledge in the market, and create trust. The CLE cert requires basic knowledge of Linux, and Novell recommends to get yourself trained to the level of the Linux Professional Institute Cert Level I (LPIC-1). Several training outfits will offer 5-day courses on Novell Nterprise Linux Services, with file, print, messaging, directory and management services on Linux. Candidates need to take a Practicum CLE exam. Expected in April:

Find out more about which certifications are "hot" and "not" at the NetworkWorld Fusion site:

Flushing The Outlook Cached Email Addresses

A tiny hint, but a source of endless pain for end-users. How to get rid of these cached addresses that keep popping up every time you start typing an email address?

Do a search for a hidden file with the extension *.nk2. That is Outlook's cache. Delete it and you should be fine. Make sure in the search that you are looking for "Hidden Files and Folders". I got rid of mine! Hallelujah. They do come back though. Anyone found out how to turn that feature off completely ?

All about AD OUs

Learn about the rationale for using Organizational Units in your Active Directory infrastructure and the finer technical aspects of managing and manipulating OU permissions and properties.

Top 12 Things A Klingon Programmer Would Say

  1. Specifications are for the weak and timid!
  2. This machine is a piece of GAGH! I need dual Pentium processors if I am to do battle with this code!
  3. You cannot really appreciate Dilbert unless you've read it in the original Klingon.
  4. Indentation?! -- I will show you how to indent when I indent your skull!
  5. What is this talk of 'release'? Klingons do not make software 'releases'. Our software 'escapes' leaving a bloody trail of designers and quality assurance people in its wake.
  6. Klingon function calls do not have 'parameters' -- they have 'arguments' -- and they ALWAYS WIN THEM.
  7. Debugging? Klingons do not debug. Our software does not coddle the weak.
  8. I have challenged the entire quality assurance team to a Bat-Leth contest. They will not concern us again.
  9. A TRUE Klingon Warrior does not comment his code!
  10. By filing this SPR you have challenged the honor of my family. Prepare to die!
  11. You question the worthiness of my code? I should kill you where you stand!
  12. Our users will know fear and cower before our software. Ship it! Ship it, and let them flee like the dogs they are!

New Survey: IIS Serves The Most High Traffic Web Sites

A new survey conducted by Port80 Software of the 1000 most-visited Web sites on the Internet reports that MS Internet Information Services (IIS) serves more high traffic sites than any other Web server, including open source Apache. Based on the best available data from Nielsen/NetRatings, the global standard for Internet audience measurement, Port80 Software analyzed the top 1000 highest traffic sites to determine which Web server software they are using.

Port80's Top 1000 Corporations' Web Servers Survey, analyzing US Fortune 1000 Web sites, has been intensely debated since its inception in January 2003. The company challenges the relevance of the popular Netcraft Web Server Survey for business decision makers, asserting that the Port80 surveys better reflect the large enterprise Web server market. This new Top 1000 High Traffic Web Servers Survey was conducted to illuminate market share among those sites that demand the most out of their Web server software: the most visited destinations on the Internet.

"Netcraft canvases millions of sites, whereas Port80 focuses on selective samples of high traffic and major corporate Web sites," said Joseph Lima, COO of Port80 Software. "In response to our Fortune 1000 survey, many critics suggested that sampling the highest traffic sites would make for a more enlightening survey. Each survey provides a different picture of the Web server market and, while there is no definitive answer, we hope that this high traffic survey adds a significant new perspective to the debate."

Port80 Software's January 2004 survey of the Web server software used by the 1000 highest traffic Web sites revealed the following market shares:

Microsoft IIS: 43.1%
Apache: 39.7%
Netscape Enterprise: 8.7%
Other Web servers: 8.5%

For details on Port80 Software's new monthly Top 1000 High Traffic Web Servers Survey, methodology, and a tool that checks a site's Web server type in real-time, visit:

Open Beta 64-bit Windows

MS released their 64-bit open beta for the AMD chip. You can have a look at it and prepare for the new version this way. You need to register for the beta, and then download a whopping 450MB or order a CD. Keep in mind this beta expires in 360 days. The final version of this OS is not expected until Q4 this year.

IM CON: The Business Case Against Instant Messaging

ENTMag has an interesting article for the detractors of IM. Personally I have to admit I am not using it, so I'm biased. Call me an old fart, a reactionary "status quo" freak. But when I'm working on something I just don't like to have my "cycle of action" interrupted. I want to start something, and wrap it up before I start on something else. Can't believe the amount of time I have saved with that. I can see some uses though, in specific circumstances. OK, here goes for the Con's of instant messaging: Insecurity, negative effects on productivity, risk of litigation and identity management problems are among the pitfalls that every organization should consider before committing to instant messaging. Read more at:

Microsoft Firewall Dispels Myth Of Hardware Superiority

An updated version of Microsoft's Internet Security and Acceleration (ISA) Server is proof that software firewalls have surpassed their hardware counterparts, one expert says. More at the SearchWin2000 site:


Spam In Europe: 53% Of All Email

The Wall Street Journal just wrote an article about the spam wave in Europe. It mostly comes from the USA. 80% of the spam received in the 12 language areas of Europe is in English, and 80% claims its origin is the USA. European law requires opt-in, but the new USA CAN-SPAM law is opt-out. That makes it practically impossible for European countries to enforce local spam laws, since most of it comes from outside Europe. Europe wants the USA to crack down on spammers, since no country alone can handle this problem. It's currently a lot of finger pointing between Europe and the Federal Trade Commission. Most spam experts say the CAN-SPAM act is too little, too late and will not make a dent in spamming. We tend to agree but we'd like your input as well in the new SunPoll about the CAN-SPAM Act. Please vote here, rightmost column:

Survey: IT Spending Back From The Dead

TechTarget's exclusive 2004 spending research found that many of the nearly 750 IT professionals surveyed have some reason for optimism. More at:

Antivirus: How Come These Things Keep Creating Havoc?

I was speaking with the tech folks at Panda the other day, in the aftermath of the latest virus outbreak. They filled me in on some key stuff that I think is worthy of your attention. One of the important factors is that more and more virus writers are creating viruses that utilize communications ports and are not just email dependent. Examples of this kind of malicious code are obviously the recent Mydoom.A and Mydoom.B.

These hackers and virus writers not only cause havoc but can steal confidential information, launch denial of service attacks against servers or even gain remote control of the computer or network. Here is a brief description of just how a malicious code like Mydoom.A does its dirty deeds.

First it spreads via e-mail in a message with variable characteristics and through the peer-to-peer file sharing program like KaZaA. This then triggers a distributed denial of service attack against the website www.sco.com by launching GET / HTTP/1.1 requests every 1,024 milliseconds. Mydoom.A then drops SHIMGAPI.DLL, creating a backdoor by opening the first available TCP port. This backdoor component downloads and runs an executable file, and acts as a TCP proxy server, allowing a hacker to gain remote access to network resources. Mydoom.A is easy to recognize once it has affected the computer, as it opens the Windows Notepad and shows junk data.

I think I told you that Panda has reinstated their ITatHome program which gives IT professionals a free copy of their award winning Platinum 7 software. Remember this is unfortunately for the US only. Click here and get a free one year subscription. I did and am thankful, gotta love those true daily updates.


This Week's Links We Like. Tips, Hints And Fun Stuff


Why Is Redmond's 1B$ Hole Going To Cost You Money?

You may not be aware of it, but Microsoft has a One Billion + hole in their yearly budget. It's because deferred revenue is down. OK, so what IS that anyway? They cannot recognize money paid for maintenance (per accounting rules), since the service was not (yet) delivered. And maintenance sales are down. In Redmond speak maintenance is called "Upgrade Advantage". Most of these contract will expire later this year, and it is not clear to MS how many people will renew. A good chunk of you might not renew at all, since the costs might be prohibitive. And that is the Billion Dollar hole. They will do everything to get that caught up somehow, including trying to get you to sign up. That is why the product of the week this time is the new, updated report on Software Licensing 6.0 which will give you a very detailed overview of the costs, and why or why not sign up for Microsoft software maintenance. On the Sunbelt OnlineShop for a measly $149.00. I'll refund you the full amount if this is not going to save you money!