Manage your WServerNews profileWServerNews privacy policy
WServerNews (formerly W2Knews)
Vol. 12, #13 - Apr 1, 2007 - Issue #619
Vista Very Slow To Copy Files

  1. Editor's Corner
    • Sunbelt's Island In Second Life
    • Webcast: Preview Of CounterSpy Enterprise V2.0
    • Quote Of The Week
  2. Admin Toolbox
    • Admin Tools We Think You Shouldn't Be Without
  3. Tech Briefing
    • Vista Very Slow To Copy Files
    • In Vista, Drive Mappings Not Preserved Across Admin & User Apps
    • Tip: Paravirtualization Explained
    • Charting A Disaster Recovery Plan
    • Revived DSI Initiative Promises To Unify Systems Management
    • Podcast: Windows Vista - Inside UAC
    • What to expect in Exchange Server 2007 Service Pack 1
  4. Windows Server News
    • DST2007, Microsoft and Dollars
    • Communications Server 2007 Goes Public
  5. WServer Third Party News
    • SNSI - Oh Boy The Amount Of Holes...
    • Webcast: The Big Picture in Disaster Recovery
  6. WServerNews Fave Links
    • This Week's Links We Like. Tips, Hints And Fun Stuff.
  7. WServerNews - Product of the week
    • Looking For An Affordable, but 'MilSpec' Vulnerability Scanner?
Looking For An Affordable, but 'MilSpec' Vulnerability Scanner?

Sunbelt's Network Security Inspector is based on the vulnerability
database that is used by many three-letter U.S. Govt agencies. This
is a top-of-the line scanner, with a great interface and clear
instructions how to solve the problems. Best thing is that it is
licensed per Admin, and not by IP. That means it's AFFORDABLE,
and you get high quality security scans. You should really check
out SNSI. See below how many new holes are being scanned for, and
then check out the price per admin. This scanner is a steal:
http://www.wservernews.com/070402-SNSI

Editor's Corner

Sunbelt's Island In Second Life

I have been busy creating a 'Sunbelt Island' in Second Life for the last couple of months. It's done now, and to prevent traffic jams, you will get individual invites over the next few weeks. That way you can check out Sunbelt's virtual buildings to start with, and get yourself familiar with Second Life. The main building in Second Life is a close copy of our original in Tampa Bay, Florida.

We are going to have regular events in Second Life, like lectures, product training, parties and other ideas -you- might come up with. It's also a place where you can hang out with other 'Sunbelters' in the gathering area and talk about anything you want. I see it as an -addition- to our existing forums, not a replacement. You will hear more about Second Life later! You can go to our website, click on 'About' and you can find a page that describes Sunbelt in SL.

Webcast: Preview Of CounterSpy Enterprise V2.0

Alex Eckelberry and Greg Kras will be giving a preview of our new CounterSpy Enterprise 2.0 next Tuesday. The new features are too many to mention, but one thing stands out: it includes our new VIPRE malware engine! If you want to take a look, please join us:

A First Look at CounterSpy Enterprise 2.0
When: Tuesday, April 3, 2007 2:00 PM (EDT)
To join the day of the event please visit:

http://www.wservernews.com/070402-CSE-Webcast

Meeting ID: 92SSQC
Attendee Meeting Key: XR*mw9Z
Audio: Toll free: +1 (800) 416-4956
Toll: +1 (978) 964-0050
Participant code: 104764

Quote Of The Week

"Words may show a man's wit but actions his meaning." -- Benjamin Franklin

Hope you enjoy this issue of WServerNews! Warm regards, Stu Sjouwerman  |   Email me: [email protected]


Admin Toolbox

Admin Tools We Think You Shouldn't Be Without

Looking for a good summary of all the Outlook 2007 known issues? Check out the slipstick site, it's great for all things Outlook:
http://www.wservernews.com/070402-Slipstick

Reclaim up to 95% of your .pst files with PSTCompress 3. Download FREE trial copy today.
http://www.wservernews.com/070402-PSTCompress3

Must Have FREEWARE. Self Service Password + Web Active Directory. Download now!
http://www.wservernews.com/070402-NameScape

NEW CounterSpy Enterprise V2 Webcast. Come see all the new features and find out how the new VIPRE engine catches all kinds of malware:
http://www.wservernews.com/070402-CSE-Webcast


Tech Briefing

Vista Very Slow To Copy Files

Slashdot Post: "Bruce Schneier has said that trying to make digital files uncopyable is like trying to make water not wet. With Vista, Microsoft seems to have done a pretty good job of making premium content files not copyable. Now a few readers have tipped us to a new wrinkle: Vista also makes it very, very slow to copy, rename, or delete ordinary files. Here is a Microsoft TechNet thread on the problem. The Reg reports that Microsoft has a hotfix for what sounds like a subset of the more general problem complained about on TechNet; but they will only give it to customers who ask nicely. And a hotfix is fussier to install than a proper patch.
http://www.wservernews.com/070402-Vista-Slow

http://www.wservernews.com/070402-KB


In Vista, Drive Mappings Not Preserved Across Admin & User Apps

Admins will often create a drive mapping to a deeply-nested directory in current use through the SUBST command. In Vista, when the user tries to elevate privileges on a process and then access the material in the folder through the share, they can't. It's not a bug. In this tip learn why.
http://www.wservernews.com/070402-Drive-Mappings


Tip: Paravirtualization Explained

In this tip, SearchServerVirtualization.com contributor Ronald McCarty explains exactly how paravirtualization stacks up against full virtualization, complete with advice on when to use it and product considerations. (registration required)
http://www.wservernews.com/070402-Paravirtualization


Charting A Disaster Recovery Plan

In this two part-series, expert Russell Olsen offers tips on how to create a thorough disaster recovery plan by establishing your company's universe, creating your plan and integrating that plan into daily operations. (registration required)
http://www.wservernews.com/070402-Disaster-Recovery-Plan


Revived DSI Initiative Promises To Unify Systems Management

IT managers at the Microsoft Management Summit say they are encouraged by the company's pledge to finally move beyond tools that manage only Windows platforms. Microsoft said it is revitalizing its dormant Dynamic Systems Initiative in an effort to lay the groundwork for a more unified systems management terrain that IT managers will find easier to navigate.
http://www.wservernews.com/070402-DSI-Initiative


Podcast: Windows Vista - Inside UAC

User Account Control (UAC) is one of Windows Vista's new security features. In this podcast, security expert Serdar Yegulalp shares his experiences -- the good ones and the bad -- working with UAC.
http://www.wservernews.com/070402-UAC


What to expect in Exchange Server 2007 Service Pack 1

Slated for release sometime in the second half of 2007, Exchange Server 2007 Service Pack 1 promises to expand on Exchange 2007's Outlook Web Access capabilities, extend the Exchange Management Console and improve Standby Continuous Replication. For more:
http://www.wservernews.com/070402-Exchange-2007-SP1


Windows Server News

DST2007, Microsoft and Dollars

This is a letter that was sent to me by Bill Prehl, Dir of IT at K12 Systems. A very interesting observation about the recent Daylight Savings Time issue.

"Hi Stu, I'm finally recovering from the mini-Y2K. The school district I work for has been running an NT4/Exch5X domain since 1998. The plan was to address the upgrade with a cautious approach. Essentially the district is a Netware shop and probably should look at Groupwise and there were plans to look at the options.

But, DST2007 and Microsoft's authoritative hammer made the decision for us in less than 5 days. After calling Microsoft to see if they would sell us a patch for Exch55 it took two calls to confirm they would not sell it to us. Meaning, they had it but they would not release it unless we were currently in a customer support agreement (which we were not). Mind you, we had been purchasing client licenses as more and more users were put into the email system. The first call reported that the cost would be $4000.00 for the patch. Hurrah!! We thought we were in the clear of doing a full-blown upgrade.

Nope, made a confirmation call to get the ordering information and was told to upgrade. Exch2k7 was not an option - too new and required 64-bit hardware. But, we could still get Exch2k3. As a school district we spent about $12,000 on hardware and software (including AV and backup software). That cost didn't include the insane hours I worked to upgrade the domain to AD2k3 then do a swing migration of Exch55 to Exch2k3 AND THEN do the DST patching and calendar updates. I truly had about 1 week to prepare for the upgrade plus we had to expedite a new server from HP.

Today, I still shake my head in amazement that something huge didn't bring down this house of cards during the upgrade. Over 800 accounts/mailboxes had to be preserved but I have to admit that it is mostly a simple Exchange environment: No public folder use, one site, one server, already had user's with quota limits so no huge mailboxes, and no other use of the domain - email system only.

But still, the instructions Microsoft provided were very good. It took 36+ working hours to the entire migration to the point where we could let the users back on. I truly can say I haven't done that kind of mental gymnastics in a long time in such a short period. It was like cramming for a test but this one I had to ace the first time.

And that leaves me with the last piece to this DST crisis. After it was all said and done, we only had 20 out of 800+ that had ANY recurring appointments in their calendar! In addition, every user is required to use the OWA unless they are staff (Principal or Secretary) who use Outlook. So, moving them without any training time from Exch55 OWA to Exch2k3 OWA - yeah, stop laughing. I'd say it was 80% of the people were happy to see a better interface but the other 20% was louder.

So, that's my DST2007 story. My true belief is Microsoft knew about this from 2005. I agree with people who said that there should not have been a cost for the patch for Exchange 2000 (I talked to several IT guys who were supporting Exch2k and had to pay $4000 for the patch) that Exchange 2000 WAS in mainstream support in 2005 when the legislation was passed. Microsoft conveniently waited until Jan 30, 2007 to release the HOW TO information on doing the updates to the OSes and other products. Notice Vista and Exch2k7 did not require any patching? I'm sure that was programmed in early on in the development - not in August of 2006.

A lot of people are blaming the US Government for making this crisis. I'm blaming the software companies who are writing clumsy software. Microsoft was the only vendor we had any issues with. Novell and Sun had their patches done and released in 2006. It's so obvious Microsoft put the screws to those who didn't stay current. Novell event released a patch that went back to Netware 4.1 - for free! I hope you enjoyed the story. Have a great weekend.

Communications Server 2007 Goes Public

With grateful acknowledgments to Paul Robichaux, Exchange Editor at WindowsITPro.

On March 26, Microsoft announced the release of the public beta of Microsoft Office Communications Server 2007, the latest version of Microsoft's real-time communications platform. Communications Server 2007 includes great improvements in the presence and IM features over what Live Communications Server 2005 offered, plus some major new chunks of functionality that help make Communications Server 2007 a key part of Microsoft's unified communications strategy.

The business value of real-time communications is obvious to anyone who's even casually used commercial IM systems. However, Communications Server 2007 is much more than basic text IM. Live Communications Server 2005 offered text IM along with voice and video conferencing, but Communications Server 2007, in conjunction with Microsoft Office Communicator 2007, can do a lot more.

Let's start with IM because that's a common business requirement. Not only can you do two-person and multiparty text IM, but you can also log your conversations to a Microsoft Office Outlook 2007 folder. You can take notes during a conversation and send them directly to Microsoft Office OneNote 2007; this is a terrific feature because it lets you preserve the context of the conversation and keep searchable, indexed notes (complete with audio, digital ink, and all the other data types that OneNote 2007 supports). Communications Server 2007 supports single and multiparty voice and video, too, provided you have compatible audio and video hardware on your laptops.

To read the rest of this article and find out what other valuable features Communications Server 2007 offers, click here:
http://www.wservernews.com/070402-Communications-Server-2007


WServer Third Party News

SNSI - Oh Boy The Amount Of Holes...

You gotta scan for vulnerabilities. Just look at the new batch that SNSI scans for! SNSI version 1.6.64.0 was released March 29, 2007. To update from within the SNSI console, select Settings, enter your full registration key and click on Check Now button. New vulnerability updates for this release include:
ID     Name
H174   Java JRE GIF image validation - HP-UX 11
W3050  Kernel memory manager may induce stop conditions - XP SP2   
W3052  Service Pack 2 not installed - W2K3   
W3053  Windows Media Format 11 synchronization of metering data - XP   
W3054  Citrix Presentation Server Client Vulnerability
W3055  McAfee ePolicy Orchestrator SiteManager.dll Vulnerability 

W3046  QuickTime Heap-based Overflow Vulnerabilities 
W3047  Thunderbird SSLv2 Buffer Overflow Vulnerabilities
W3048  SeaMonkey SSLv2 Buffer Overflow Vulnerabilities
W3049  Daylight Saving Time Update Missing - Exchange 2003 
S449   Postgres SQL susceptibility to crash or information leakage - Solaris 10
S451   Svc.startd attempt to access freed memory - Solaris 10
S452   Xfont server file and protocol validation - Solaris 8 - 10
S453   Mozilla 1.7 browser, mail client vulnerabilities - Solaris 8 - 10
M110   QuickTime movie, QTIF, PICT viewing vulnerabilities - Mac OS X

W3044  Time Zone Update Patch Missing - XP   
W3045  Firefox Memory Corruption Vulnerabilities 
 
L1488  ClamAV file descriptor & directory traversal errors - MDV   
L1489  Ekiga format string vulnerabilities - MDV, FC   
L1490  Gnucash symlink vulnerabilities - MDV    
L1491  Mandriva Kernel multiple vulnerabilities - MDV 
L1492  PHP multiple vulnerabilities - MDV, FC    
M107   Java applet font creation / Daylight Saving Time patch - Mac OS X 
S446   Snort DCE/RPC preprocessor mishandles packets - Solaris 2.5 - 10
S447   Java Calendar Server Daylight Saving Time update - Solaris      
W3043  Snort Preprocessor Buffer Overflow Vulnerability
L1474  Java 1.5 - Multiple vulnerabilities - RHE    
L1475  Java 1.4 - Multiple vulnerabilities - RHE, SuSE 
L1476  Kernel - Multiple vulnerabilities - RHE  
L1477  Imagemagick - DCM, PALM, and SGI decoding - RHE, SuSE   
L1478  ImageMagick PALM image handling error - MDV  
L1479  SMB4k multiple vulnerabilities - MDV
L1480  Kernel - Fedora Core key alloc dereference - FC   
L1481  SpamAssassin long URL handling error - FC 
L1482  Dhcp-Server - DHCP request processing - SuSE   
L1484  Xfree86-Server - Render/DBE extensions - SuSE  
L1485  Xloader - Render/DBE extensions - SuSE
L1486  Bash - rbash not functioning - SuSE 
L1487  Java 1.3 - Multiple vulnerabilities - RHE, SuSE      
S445   In.telnetd authentication bypass - Solaris 10  
W3031  Malware Protection Engine Vulnerability - Forefront for Sharepoint  
W3032  MFC Memory Corruption Vulnerability - XP
W3033  MFC Memory Corruption Vulnerability - W2K3
W3034  Malware Protection Engine Vulnerability - Forefront for Exchange   
W3035  Malware Protection Engine Vulnerability - Antigen for Exchange     
W3036  MFC Memory Corruption Vulnerability - Visual Studio .Net 2002
W3037  MFC Memory Corruption Vulnerability - Visual Studio .Net 2002 SP1
W3038  Malware Protection Engine Vulnerability - Antigen for SMTP   
W3039  MFC Memory Corruption Vulnerability - Visual Studio .Net 2003
W3040  MFC Memory Corruption Vulnerability - Visual Studio .Net 2003 SP1
W3041  Time Zone Update Patch Missing
W3042  Trend Micro Antivirus UPX Vulnerability    
 
L1469  Mpg123 httpget early close error - MDV
L1470  Samba CIFS session & afsacl.so VFS errors - MDV, FC
L1471  PHP multiple vulnerabilities - MDV
L1472  GTK+2 PixbufLoader malformed image - MDV
L1473  Wireshark multiple denial of service vulnerabilities - FC
W3006  Wireshark HTTP, LLT, TCP Dissector Vulnerabilities
W3007  WinProxy Heap Overflow Vulnerability
W3008  Step-By-Step Interactive Training Bookmark Vulnerability
W3009  Windows Shell Hardware Detection Vulnerability
W3010  Windows Image Acquisition Service Vulnerability
W3011  HTML ActiveX Control Parameter Validation Vulnerability
W3012  MDAC ActiveX Vulnerability - W2K
W3013  MDAC ActiveX Vulnerability - XP
W3014  MDAC ActiveX Vulnerability - W2K3
W3015  OLE Dialog Vulnerability
W3016  MFC Memory Corruption Vulnerability
W3017  RichEdit Vulnerability - W2K,WXP,W2K3
W3018  RichEdit Vulnerability - Office 2000
W3019  RichEdit Vulnerability - Office XP
W3020  RichEdit Vulnerability - Office 2003
W3021  Malware Protection Engine Vulnerability - Live OneCare
W3022  Malware Protection Engine Vulnerability - Defender
W3023  Word Data Structures Vulnerabilities - Word 2000
W3024  Word Data Structures Vulnerabilities - Word 2002
W3025  Word Data Structures Vulnerabilities - Word 2003
W3026  Word Data Structures Vulnerabilities - Word Viewer 2003
W3027  Office Malformed Record Vulnerabilities - Office 2000
W3028  Office Malformed Record Vulnerabilities - Office 2002
W3029  Office Malformed Record Vulnerabilities - Office 2003
W3030  Internet Explorer Cumulative Patch (Feb 2007)
 
L1457  Neon non-ASCII uri_lookup handling error - MDV
L1458  Xpdf based applications buffer overflow - MDV
L1459  Libgtop2 glibtop_get function error - MDV
L1460  Squid proxy multiple vulnerabilities - MDV, FC
L1461  Xine-ui errors.c and long EXTINF errors - MDV
L1462  Libsoup headers_parse error - MDV, FC
L1463  ISC BIND server multiple vulnerabilities - MDV, FC
L1464  SquirrelMail XSS and MIME header errors - FC, RHE
L1465  Fedora Core Kernel Multiple vulnerabilities - FC
L1466  Ed open_sbuf vulnerability - FC
L1467  Gtk2 - GdkPixbufLoader() - RHE
L1468  Fetchmail - TLS encryption - RHE
N62    Cisco - Multiple Vulnerabilities
W2999  QuickTime RTSP Vulnerability
W3000  Store Password Using Reversible Encryption Enabled
W3001  Limit Local Account Use of Blank Passwords Disabled
W3002  Digitally Encrypt Or Sign Secure Channel Data (Always) Disabled
W3003  Digitally Encrypt Secure Channel Data (When Possible) Disabled
W3004  Digitally Sign Secure Channel Data (When Possible) Disabled
W3005  Prompt Password User To Change Password Not Set To Default Value
 
S442   Sun Ray Server Admin GUI password exposure - Solaris 8 - 9
S443   Xorg   CMAP and CID font data handling - Solaris 9 - 10
S444   Freetype2 font engine multiple vulnerabilities - Solaris 8-10
W2993  BrightStor ARCserve Backup Utilities Vulnerabilities
W2994  Firefox Watch Point Vulnerability
W2995  SeaMonkey Watch Point Vulnerability
W2996  Thunderbird Watch Point Vulnerability
W2997  Windows Media Player 6.4 Format Vulnerabilities - W2K3
W2998  Citrix Presentation Server Vulnerability
 
L1439  Mozilla packages multiple vulnerabilities - FC, MDV
L1440  OpenOffice - multiple errors - FC, MDV, RHE
L1441  Xterm write vulnerability - FC
L1442  Xorg-x11-server procrender error - FC, MDV
L1443  Wget ftp_syst error - FC, MDV
L1444  Adobe Flash Player - Http headers - RHE
L1445  Kerberos Krb5 RPC and mechglue GSS - FC
L1446  Xorg - X.org Render/DBE extensions - RHE
L1447  Mono class library web server error - FC, MDV
L1448  Acrobat Reader - Multiple vulnerabilities - RHE
L1449  Wm3 Common Name SSL vulnerability - FC
L1450  Fetchmail cleartext pw & null pointer errors - FC, MDV
L1451  ProFTP mod_ctrls reqarglen error - MDV
L1452  MODPlug ITP string errors - MDV
L1453  Mandriva kernel multiple vulnerabilities - MDV
L1454  Nvidia Xorg text glyph buffer verification flaw - MDV
L1455  KDEnetwork PRIVMSG string error - MDV
L1456  Kerberos Krb5 RPC and mechglue GSS - MDV
M103   Adobe Reader / Firefox plugin vulnerabilities - Mac OS X
S437   Libnsl, rpcbind malformed RPC handling - Solaris 8 - 9
S438   Gzip LZH, unlhz related vulnerabilities - Solaris 8 - 10
S439   Adobe Reader plugin vulnerabilities - Solaris
S441   Java JRE applet GIF image processing - Solaris
W2984  Adobe Reader Cross-Site Scripting Vulnerabilities
W2985  Adobe Acrobat Cross-Site Scripting Vulnerabilities
W2986  Oracle Database Server Vulnerabilities (Jan 2007)
W2987  Oracle Application Server Vulnerabilities (Jan 2007)
W2988  Oracle E-Business Suite Vulnerabilities (Jan 2007)
W2989  Oracle Enterprise Manager Vulnerabilities (Jan 2007)
W2990  Java Runtime Environment 1.3 GIF Image Vulnerability
W2991  Java Runtime Environment 1.4 GIF Image Vulnerability
W2992  Java Runtime Environment 5 GIF Image Vulnerability
 
L1432  Mod_Auth_Kerb - Malformed authentication request - RHE
L1435  Kernel - Multiple vulnerabilities - SuSE
L1436  Gv - Improper file handling - SuSE
L1437  Apache2 - mod_cache/mod_proxy modules - SuSE
L1438  Kdegraphics3 - EXIF handling - SuSE
W2980  Brazilian Portuguese Grammar Checker Vulnerability - Office 2003 (MS07-001)
W2981  Snort Backtracking Vulnerability
W2982  Snort GRE Packet Decoding Vulnerability
W2983  Sagevo Worm Detected
 
L1428  Tar - Path traversal flaw - RHE
L1429  Firefox - Javascript/Page rendering - RHE
L1430  SeaMonkey - Javascript/Page rendering - RHE
L1431  Thunderbird - Javascript/Page rendering - RHE
S434   Mozilla 1.4/1.7 permit execution of hostile website content - Solaris 8 - 10
S435   UFS file systems may panic system if logging is disabled - Solaris 8
W2967  Firefox SVG Processing Vulnerability
W2968  SeaMonkey SVG Processing Vulnerability

2969   Thunderbird Mail Header Vulnerability
W2970  Symantec Veritas NetBackup bpcd Daemon Vulnerability
W2971  Opera Object Typecasting Vulnerability
W2972  Excel Malformed Record and String Vulnerabilities - Excel 2000
W2973  Excel Malformed Record and String Vulnerabilities - Excel 2002
W2974  Excel Malformed Record and String Vulnerabilities - Excel 2003
W2975  Excel Malformed Record and String Vulnerabilities - Excel Viewer 2003
W2976  Outlook Advanced Find Vulnerability - Outlook 2000
W2977  Outlook Advanced Find Vulnerability - Outlook 2002
W2978  Outlook Advanced Find Vulnerability - Outlook 2003
W2979  Vector Markup Language Buffer Overrun Vulnerability
SNSI uses the latest Mitre Common Vulnerabilities and Exposures (CVE) list of computer incidents. It also contains the latest SANS/FBI top 20 vulnerability list. SNSI also uses the latest CERT, CIAC Microsoft and FedCIRC (Department of Homeland Security) advisories. To get the latest SNSI version, visit:
http://www.wservernews.com/070402-SNSI-Update


Webcast: The Big Picture in Disaster Recovery

WEBCAST Tying Together Virtualization, Replication and WAN Acceleration for Better Business Continuity. Date: April 25th, 2007.
Time: 11:00am EST - 12:00pm EST

Speakers:
Bob Roudebush, Director of Solutions Engineering, Double-Take Software Jeff Aaron, Director of Product Marketing, Silver Peak Systems, Inc. Parag Patel, Senior Director of Storage Ecosystem Alliances, VMware.

Most enterprises have well defined Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) as part of their business continuity plans. However, it is often quite difficult to meet these objectives. For example, while 83% of enterprises have a goal of complete backup/replication in less than 5 hours, only 40% are actually achieving this goal. These problems are only getting worse due to an enormous increase in the volume of data that is being protected and an increase in geographic distances between data centers as enterprises look to protect themselves from catastrophic disasters, such as a hurricane or terrorist attack.

Enterprises are barraged by different technologies that help solve their disaster recovery challenges, such as virtualization, data replication, and WAN acceleration. Because these technologies span a variety of IT segments (i.e. servers, storage, and network infrastructure), they might appear to be disjoint on the surface. However, they are quite complimentary to one another, and can easily be combined to create an effective end-to-end disaster recovery solution.

In this discussion, industry experts from VMware, Double-Take Software, and Silver Peak discuss how to "put the pieces together" for an effective disaster recovery plan. They discuss new trends in data protection technology that span all areas of IT, citing specific examples of how real-world customers have put combined DR solutions into practice for improved business continuity.

Register:
http://www.wservernews.com/070402-Webcast


WServerNews Fave Links

This Week's Links We Like. Tips, Hints And Fun Stuff.



WServerNews - Product of the week

Looking For An Affordable, but 'MilSpec' Vulnerability Scanner?

Sunbelt's Network Security Inspector is based on the vulnerability database that is used by many three-letter U.S. Govt agencies. This is a top-of-the line scanner, with a great interface and clear instructions how to solve the problems. Best thing is that it is licensed per Admin, and not by IP. That means it's AFFORDABLE, and you get high quality security scans. You should really check out SNSI. See above how many new holes are being scanned for, and then check out the price per admin. This scanner is a steal:
http://www.wservernews.com/070402-SNSI-MilSpec