Vol. 15, #31 - Jul 26, 2010 - Issue #789
End-Times For Server Virtualization?
- Editor's Corner
- Apple 2010 Survey Executive Summary
- Homeland Security Unveils Intrusion Detection Engine
- Quotes of the Week:
- Admin Toolbox
- Admin Tools We Think You Shouldn't Be Without
- Webinars & Seminars
- Sunbelt Exchange Archiver? Product Demonstration - July 27
- Tech Briefing
- Learning The Basics Of Citrix XenApp 5
- Microsoft Backtracks On Windows XP 'downgrade' Extension
- Cloud Computing Explained
- Intelligence: Ten Habits of Bad Web Design
- Should I Use That MS One-Click Fix-It?
- Desktop Infrastructure and Cloud Services Survey
- Windows Server News
- End-Times For Server Virtualization?
- Dell Warns Of Malware On Server Motherboards
- Microsoft Readies Virtual Machine Manager Self-Service Portal
- Virtual Server Deployment: A Step-By-Step Guide
- Private Clouds On The Horizon
- Third Party News
- NEW BOOK: Hacking Exposed Wireless
- WServerNews Fave Links
- This Week's Links We Like. Tips, Hints And Fun Stuff.
- WServerNews - Product of the Week
- VIPRE Enterprise Success Story #342
From Redmond Channel Partner Online. "How VIPRE Could Be Improved."
One reader gives some thoughts on how Sunbelt can improve their software:
"There's nothing to not like about Sunbelt and its VIPRE suite. I'm about to
re-up and expand my subscriptions. Well, in the interests of full disclosure,
I did e-mail some Sunbelt managers this "complaint" message: Years ago, I
kinda liked the dangerous, exciting adventures I had with Symantec/Norton
and Panda. By comparison, VIPRE is boresome. It gives me no emergencies.
Not even close calls. No pirated browsers. Nothing! Where's the fun?
For your PR benefit, let me suggest:
You get the idea, right? Enough of this quiet, behind-the-scenes efficiency!
Jazz it up! I'm still awaiting those product improvements. -- Jon
- As scans run, display mock battles on the screen where Vipres eat canny,
wiggly, fast-moving viruses.
- Display messages like: "Today, 4,892,643 Windows users were infected with
KarmaGeddon99. You weren't."
- Each time VIPRE stops malware on its way in, play an audio-visual "SNAP!"
like a mosquito-zapper incinerating its prey.
- Give users a slick, on-screen TurboButton. It doesn't have to do anything.
But pressing it will give us some feeling of participation.
Apple 2010 Survey Executive Summary
Thanks to all 600+ of you who participated in the ITIC/Sunbelt Software
Apple 2010 Consumer & Enterprise Survey. As usual, your responses provide
great insight into the issues and trends that impact the popular brand.
Not surprisingly, you told us what you liked and disliked about the various
Apple devices. Your essay comments were thought provoking, insightful and
offered some great constructive criticism. From your keyboards to Apple?s
ears! And the Winners Are...
Your outstanding and insightful comments make it very tough for Stu and
I to choose the winners. However, after much careful consideration, the
The iPad winner is: Adam Caccavio
The iPod Touch winners are: Brad Knust and Pat Havener
We will be contacting all of you directly very shortly.
In a clear indication of Apple?s continuing strength with business customers,
a new survey of enterprise technology managers shows accelerating interest in
purchasing first-time or additional Mac OS computers and iPhones.
Satisfaction with the performance, reliability and security of Apple devices -
particularly Mac hardware, OS X 10.x operating systems and the iPhone 3 and 4
(the antenna problems of the newest iPhone 4 notwithstanding) were very high.
On average, approximately two-thirds of the survey participants rated the
performance and reliability of Apple devices as "Excellent" or "Very Good."
In addition, the survey responses validate the record breaking iPad sales
statistics. As of June 22, Apple said it had sold over three million iPads
in the 80 days since its? April release. The figure is presumably much higher
today. The ITIC/Sunbelt survey also found that the iPad is off to a very
strong start, with 23 percent or nearly one in four IT managers stating
they?ve already purchased or ordered the new Apple tablet. Another 18 percent
said they plan to purchase an iPad within the next nine months, while just
over half -- 51 percent -- said they have no definitive timetable. The
remaining 8 percent said they plan to wait until Apple cuts the iPad prices
for the first time.
And 86% of the respondents who have already bought an iPad say they are using
it for both personal and business functions. The responses to the question,
"How often do you or your business experience technical issues with Apple
products/devices?" were very positive and encouraging. Some 12 percent
said they never had any problems; 50 percent or half the respondents said
they "rarely" experienced problems; 20 percent said they "occasionally"
encountered technical issues every few months; 5 percent said "once a month;
"6 percent said "two or three times per month;" 5percent said "regularly or
once a week," while a very small 2 percent minority indicated they/their
businesses encountered technical issues on a daily basis.
Overall, the survey results were positive with respect to the Apple usage
experience for consumers and enterprise users, although a significant
portion of IT managers complained of problems and voiced concerns regarding
integration, interoperability and manageability of Apple devices in an
enterprise setting. Among the other survey highlights:
- Nearly two-thirds of respondents -- 63 percent -- indicated they/their
organizations use the various Apple devices for both personal and business
- An overwhelming 82 percent majority of survey participants said they use
their iPhones to access corporate Email and data.
- 24 percent, who did not currently own an iPhone, said they "have already
decided" or are "very likely to switch" with an additional 35 percent saying
"it?s possible we?ll switch when the current contract expires."
- Eight out of 10 organizations said they are "more likely to allow more
users to deploy Macintoshes as their enterprise desktops" in 2010-2011,
up from 68 percent in the 2009 survey.
- The number of organizations reporting large complements of Macs and
OS X 10.x in their organizations continues to climb. Some 7 percent of
respondents said they have more than 250 Macs in their enterprise. In the
2008 survey, only 2 percent had more than 250 Macs.
- The percentage of mobile/remote users using Apple devices is rising
quickly & significantly
- The line between Apple consumer and enterprise usage continues to
blur : 79 percent of survey respondents said that their firms will
increase integration with existing Apple consumer products such as the
iPhone to allow users to access corporate e-mail and other applications
in the 2010-2011 timeframe. This is an 11 percent increase from the 68
percent of respondents who answered that query in the ITIC/Sunbelt 2009
Apple Enterprise Usage survey.
The growing popularity of Apple products in the personal lives of IT
managers is having a continued spillover effect in the enterprise. The
acceleration of interest compared to our previous surveys tells me this
trend will continue unabated during the next 12 to 18 months.
This is the third Apple Consumer and Enterprise Survey conducted by ITIC
and Sunbelt since 2008. Each successive survey has shown a steady increase
in both the number of Macs and Apple devices being deployed by corporate
enterprises. ITIC will release the results of additional survey questions
on Apple product satisfaction, reliability, security and ease of adoption/
integration in August, 2010.
Particularly noteworthy is the survey participants? strong interest and
enthusiasm for the iPad, a product just a few months old. Plus the
already strong iPhone adoption will continue as old wireless contracts
expire. One can only project that if iPhone becomes available on Verizon
in the U.S., the numbers of additional enterprise-based units could be
Thus far, consumer and corporate users appear to be nonplussed and largely
unaffected by the iPhone 4?s much publicized antenna problems which have
led to reports of dropped calls the essay comments and first person customer
interviews. First person customer interviews on the topic have elicited
little more than a shrug. One user said, "So what? All mobile phones and
PDAs drop calls."
Still, Apple must respond decisively and quickly to address any performance,
quality and reliability issues related to any and all of its products. Apple
has a press conference scheduled for later today to address the issues. At
present however, these issues do not appear to be having an adverse impact
on iPhone 4 sales. With Apple?s enterprise success though, will come new
challenges. IT managers who participated in the ITIC/Sunbelt survey extolled
the features and functions of the Apple Macs, OS X 10.x, iPhone and iPad
However, as more and more Apple devices make their way into the enterprise,
the lack of enterprise-class third-party management and performance
enhancement tools and technical support is becoming a significant barrier
and impediment to widespread enterprise adoption. It is not as
problematic though, for organizations that currently have just a few Macs
or isolated pockets of Macs and OS X 10.x in specific departments such as
graphics. Still, Apple will have to address these issues if it is to mount
a serious challenge to Microsoft?s dominance. So far, the company has been
silent about its enterprise strategy.
A new consortium of five third-party vendors calling itself the Enterprise
Desktop Alliance (EDA) has taken the lead to promote the management,
integration and interoperability capabilities of the Mac in corporate
environments. Apple is well advised to forge a closer relationship with the
EDA and its member organizations to foster greater third party integration
and interoperability between Apple devices and rival platforms.
Part 2 of the Apple survey results as they relate to security issues will
appear in a subsequent issue. - By Laura DiDio.
Homeland Security Unveils Intrusion Detection Engine
An open source foundation partially funded by the U.S. Department of Homeland
Security unveiled an open source engine it said improves on past technologies
built to detect and prevent network intrusions. This is interesting. You can
read ore about this at ComputerWorld:
Quotes of the Week:
"When the whole world is against you paranoia is just good sense"
-- Johnny Fever
"An investment in knowledge pays the best return." -- Benjamin Franklin
Warm regards, and thank you for being a WServerNews subscriber. No trees
were killed in the sending of this message, but a large number of electrons
were terribly inconvenienced. Please tell your friends about us.
They can subscribe here:
PS: Did you know this newsletter has a sister publication for XP users
called WXPnews? You can subscribe here, and tell your friends:
PPS: And now we have our new Win7News! You can subscribe here, and tell
Get Answers in our LIVE daily Demo of VIPRE Enterprise v.4
Register for a live demonstration of VIPRE Enterprise Version 4.
See VIPRE Enterprise Version 4 live and in action
Learn about the features and functionality
Receive tips and best practices for configuration
Get LIVE answers to your questions from our Support team.
VIPRE Enterprise Version 4 combines antivirus, antispyware, client
firewall (with VIPRE Enterprise Premium) and malicious website filtering
technologies into a single agent to protect against the ever-changing
wave of malware in the most comprehensive, highly efficient manner.
Register for one of our daily demos today and learn why VIPRE delivers all
the necessary endpoint security you need, and nothing you don't:
||Webinars & Seminars
Sunbelt Exchange Archiver? Product Demonstration - July 27
Exchange performance is suffering. Your users complain about email storage
and don't want any quotas. Your CEO requires legal compliance. Want a
high-end, feature-rich, admin-friendly product that solves all these issues
at a very affordable price? Then join us for a demonstration of Sunbelt
Software's Microsoft Exchange email archiving and compliance solution,
Sunbelt Exchange Archiver. This powerful, easy to use, enterprise-class
email archiving tool automatically enables you to comply with all
requirements, and allows you or your end-users to transparently retrieve
any archived email. Register here for:
Tuesday, July 27, 2010, 2:00pm - 2:30pm ET
Learning The Basics Of Citrix XenApp 5
WServerNews Reader and NTSYSADMIN contributor Carl Webster has finished
his book about Windows XenServer. I checked it out and it comes warmly
recommended: With this book you will learn to create a MyCitrix.com account,
download, install and update XenApp and XenServer, publish applications,
perform basic Farm maintenance, provide external access to published
applications and use an Apple iPad with the Receiver for iPad:
The print version is here:
And the Kindle version is here:
Microsoft Backtracks On Windows XP 'downgrade' Extension
Remember last week when I reported you could get XP until 2020? Well, Sorry,
but Windows XP 'downgrades' won't be available that long. Microsoft says
that you can't 'downgrade' Windows 7 Pro and Ultimate to Windows XP for
as long as reported. More at InfoWorld:
Cloud Computing Explained
OK, the buzzword is all over the place, but how do you really deploy it?
Educause has a good article here, with video examples, that starts out
with this: "While many talk about the cloud, few actually understand it.
Three organizations' definitions come to the forefront when defining the
cloud: Gartner, Forrester, and the National Institutes of Standards and
Technology (NIST). Although both Gartner and Forrester provide definitions
of cloud computing, the NIST definition is concise and uses industry-standard
This article takes an in-depth look at the NIST definition of cloud computing.
Each of the NIST definition's points is defined in greater detail, and
examples of cloud-based technologies will help the reader gain a better
understanding of the cloud. NIST defines cloud computing as:
...a model for enabling convenient, on-demand network access to a shared
pool of configurable computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned and released
with minimal management effort or service provider interaction. This
cloud model promotes availability and is composed of five essential
characteristics, three service models, and four deployment models.
The remainder of this article discusses these five characteristics, three
service models, and four deployment models. Worth it!
Intelligence: Ten Habits of Bad Web Design
Is your CEO telling IT that the website looks like a Korean Candy Store?
He may have a point. Baseline Mag has an entertaining slide show that
shows how NOT to do it. Here is how they started it: "Awful websites remain
a hazard for businesses and customers. Fifteen years have elapsed since
the Web reached the mainstream, but the bad old days of roll-your-own
GeoCities pages never seem too far away. It is one thing for a teenager
to create a headache-inducing introduction to her band on MySpace, quite
another for your company's front door to the world to look like the result
of an explosion at the font factory.
Despite the success of Google, which rode to dominance on one of the
cleanest page designs imaginable, and other models of efficiency and
user-friendly flow, an alarming percentage of Web sites continue to be
plagued by eye-straining, illogical, and otherwise displeasing and
dysfunctional layouts. Let's face it: this really should not be so
difficult. Below are Ten Egregious Web Site Offenses that any site taking
itself seriously should be careful to avoid.
Yeah, we might be guilty of some of these ourselves. Do not be shy about
letting us know how our own sites could look and perform better:
Should I Use That MS One-Click Fix-It?
There is this new nasty zero-day attack vector in all modern versions of
Windows. You may know it as the "LNK zero day" or the "USB zero day."
Microsoft's Security Bulletin 2286198 advises that the "Vulnerability
in Windows Shell Could Allow Remote Code Execution." Your users can get
infected by simply opening the folder that contains the infected files.
Redmond came out with an advisory that has a one-click fix for end-users
and some instructions for enterprise deployment:
Use it? Well, I would wait a bit and scout around for possible unintended
consequences and unhappy campers. The free NTSYSADMIN list (bottom left)
is a really good community to discuss things like this. Subscribe here:
Desktop Infrastructure and Cloud Services Survey
The last several years have been trying ones for organizations and their
IT departments as everyone struggles to cope with keeping their desktop
infrastructure running at peak efficiency in the face of budget cuts and
hiring freezes. At the same time companies are grappling with deploying
new technologies like desktop virtualization and managing, provisioning
and securing new applications, desktops and dealing with an increase in
remote workers. How is your organization coping? We want to know. Once
again, Sunbelt Software and ITIC are partnering on a new Desktop
Infrastructure and Cloud Services survey The survey consists of multiple
choice and one essay questions. It should only take you about five minutes
to complete. All responses are kept confidential. We're giving away two
(2) iPods to the survey respondents who give us the most thoughtful and
insightful essay comments. So please spend five minutes and tell us what
you think about managing and securing your desktop infrastructure and what
role cloud services may play. Remember to leave both your Email address
and your comments in order to be eligible to win any of the prizes, so
we can contact you if you're a winner. Here's the survey link:
||Windows Server News
End-Times For Server Virtualization?
Wow, it never amazes me how fast things change. Look what I got in my
mailbox just now from InfoWorld. Never a dull day in IT, I tell ya.
"Server virtualization created cloud computing. Without the ability to
run multiple logical server instances on a single physical server, the
cloud computing economics we know today wouldn't be possible. Most assume
that server virtualization as we know it today is a fundamental enabler
of the cloud, but it is only a crutch we need until cloud-based application
platforms mature to the point where applications are built and deployed
without any reference to current notions of servers and operating systems:
Dell Warns Of Malware On Server Motherboards
Dell is warning customers that "a small number" of its server motherboards
may contain malicious software. "The potential issue involves a small number
of PowerEdge server motherboards sent out through service dispatches that
may contain malware," according to post on a Dell support forum. "This
malware code has been detected on the embedded server management firmware."
Here is the forum post. Ouch:
Microsoft Readies Virtual Machine Manager Self-Service Portal
Microsoft is nearing completion of a self-service portal to help Windows
administrators with common virtual machine resource management tasks.
Learn about the features and potential benefits of this portal for your
organization in this exclusive article:
Virtual Server Deployment: A Step-By-Step Guide
There are many clear advantages of a virtual server deployment, but the
process can be intimidating. Learn about the four critical phases of
implementing server virtualization and ensure a successful project with
this step-by-step guide.
Private Clouds On The Horizon
Many IT pros are hesitant to implement cloud computing in their
organizations due to a fear of security and privacy implications.
The industry has responded to these concerns with private cloud.
Check out this featured content for strategies and technical advice
on how to architect your IT environment for this new delivery model:
||Third Party News
NEW BOOK: Hacking Exposed Wireless
Leading experts in wireless security reveal tactical security information
in HACKING EXPOSED WIRELESS: Wireless Secrets & Solutions, Second Edition
(McGraw-Hill; August 2010; Softcover: $49.99). This thoroughly updated
new edition covers today?s established and emerging wireless technologies,
and reveals how attackers use readily available and custom tools to target,
infiltrate, and hijack vulnerable systems.
The authors discuss the latest developments in Wi-Fi, Bluetooth, ZigBee,
and DECT hacking, and explain how to perform penetration tests, reinforce
WPA protection schemes, mitigate packet injection risk, and lock down
Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi
clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption
are also covered in this fully revised guide. Readers will be able to
master attack tools to exploit wireless systems, including Aircrack-ng,
coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, and the all new KillerBee, and
"Walks you through wireless security fundamentals, attack methods, and
remediation tactics in an easy-to-read format with real-world case studies.
Never has it been so important for the industry to get its arms around
wireless security, and this book is a great way to do that."
-- Jason R. Lish, Director, IT Security, Honeywell International. More:
||WServerNews - Product of the Week
VIPRE Enterprise Success Story #342
"It's only been a couple of weeks since switching to VIPRE and I wanted you
to know that so far I've been very happy with the change in software and
the GREAT improvement of support for this product. The difference in speed
as we run Utilities and Reports through our management system is astounding.
I never knew what a drag Symantec was until the switch."
Kindest Regards, -- J.R.