Redmondmag.Com Group Policy Grows with Windows

Total Page:16

File Type:pdf, Size:1020Kb

Redmondmag.Com Group Policy Grows with Windows 0506red_cover.v6 4/18/06 1:31 PM Page 1 AttackAttack ofof thethe Ball-PointBall-Point PensPens 6161 MAY 2006 WWW.REDMONDMAG.COM New Admin Features Are Tough to Beat page 29 > $5.95 05 • MAY Readers’ Choice Awards Apps To Go: 20 Programs Nobody Does It Better 38 That Fit on Your Keychain 53 25274 867 27 71 Project1 4/11/06 3:14 PM Page 1 8)&/ %*4"45&3 i)FMMP IFMQEFTL w 453*,&4 3&"$) '03 "%.*/*453"5034 1", 3FQBJS BO VOCPPUBCMF TZTUFN $IBOHF B MPTU "ENJOJTUSBUPS QBTTXPSE 3FDPWFS EFMFUFE PS MPTU EBUB %JBHOPTF TZTUFN BOE OFUXPSL JTTVFT 3FNPWF NBMXBSF XIJMF B TZTUFN JT PGnJOF #VZ POF "ENJOJTUSBUPST 1BL BOE HFU B TFDPOE GPS 4FFCBDLGPS EFUBJMT '3&& &WBM 8JOUFSOBMTDPN#VZ(FU Project1 4/11/06 3:15 PM Page 2 #VZ POF "ENJOJTUSBUPST 1BL BU MJTU QSJDF BOE HFU B TFDPOE DPQZ GPS POMZ 5XJDF UIF QSPUFDUJPO " GSBDUJPO PG UIF DPTU 5IF5PQ5FO5PPMT"CTPMVUFMZ&WFSZ"ENJOJTUSBUPS/FFET SBUPST 1BL MJTU QSJDF JT $FSUBJO &3%$PNNBOEFS 'JMFNPO #PPUBEFBETZTUFNGSPN$%JOUPBGBNJMJBS8JO 7JFX SFBMUJNF SFQPSUT PG BMM mMF TZTUFN EPXTMJLF SFQBJS FOWJSPONFOU BDUJWJUZ PO B TZTUFN FDUJWF PXOFST JO UIF 64 BOEPS PUIFS DPVOUSJFT 8JOUFSOBMT $SBTI"OBMZ[FS8J[BSE 3FHNPO 1JOQPJOU UIF DBVTF PG TZTUFN DSBTIFT TP UIBU ZPV DBO 7JFX SFBMUJNF SFQPSUT PG BMM SFHJTUSZ BDUJWJUZ PO B NBLF SBQJE SFQBJST TZTUFN 3FNPUF3FDPWFS *OTJHIUGPS"DUJWF%JSFDUPSZ 3FNPUFMZ BDDFTT BO VOCPPUBCMF TZTUFN UP NBLF 7JFX SFBMUJNF SFQPSUT PG BMM -%"1 USBGmD PO B TZTUFN SFQBJST /5'4%041SPGFTTJPOBM "%&YQMPSFS "DDFTT /5'4 WPMVNFT GSPN %04 &YQMPSF UIF "% TUSVDUVSF UP mOE BOE NPEJGZ PCKFDUT BOE UIFJS BUUSJCVUFT 'JMF3FTUPSF 5$15PPMT 3FTUPSF EFMFUFE mMFT FWFO XIFO UIFZ IBWF CFFO %JTQMBZT BMM BDUJWF 5$1 BOE 6%1 FOEQPJOUT BOE SFMBZT EFMFUFE GSPN UIF SFDZDMF CJO SFBMUJNF 5$1*1 BDUJWJUZ EBUB (FU :PVS '3&& &WBMVBUJPO 5PEBZ 8JOUFSOBMTDPN#VZ(FU PSDBMM SFTUSJDUJPOT BQQMZ 0GGFS FYQJSFT ª 8JOUFSOBMTEJTDMBJNT 4PGUXBSF -1 QSPQSJFUBSZ "MM JOUFSFTU USBEFNBSLT JO BSF UIF QSPQFSUJFT NBSLT PG BOE UIFJS SFTQ OBNFT PG PUIFST 0GGFS MJNJUFE UP B TJOHMF "ENJOJTUSBUPST 1BL QFS DVTUPNFS "ENJOJTU 0SDPOUBDUZPVS8JOUFSOBMT1BSUOFS0GGFSFYQJSFT Project2 4/6/06 4:54 PM Page 1 0506red_TOC_1.v5 4/18/06 12:31 PM Page 1 MAY 2006 WWW.REDMONDMAG.COM Winner for Best Computer/Software Magazine 2005 RedmondTHE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY REDMOND REPORT 9 Hasta La Vista Is the latest Vista slip a disaster or just a distraction? COVER STORY Tour de SQL Part II: Administrative Features 12 Microsoft and Every year, the Tour de France is won or EU in Showdown lost in the mountains. In this stage of our Attacks on EU tour of SQL Server 2005, we look at the monitoring trustee fail to slow critical administrative features that make down pace of ruling. or break the new database. Page 29 Shades of Netscape Microsoft, VMware in virtualization showdown. PHOTO BY GRAHAM WATSON 14 Beta Man FEATURES Exchange 12: Unified Messaging Rules 38 The Best of the Best COLUMNS The 2006 Redmond Readers’ Choice Awards 4 Barney’s Rubble: Doug Barney The readers have spoken. Computers Make You Stupid Here are the results of the 21 Mr. Roboto: Don Jones 2006 Redmond Readers’ Choice Does Anybody Really Know What survey—45 categories of the Time It Is? tools and utilities that keep your networks running smoothly. 61 Never Again: David Harding Out of Control 53 Productivity on the Go Never install software again! We 62 Windows Insider: Greg Shields look at 20 top portable apps, from Extending Security office suites to IP scanners. Page 39 67 Security Advisor: Joern Wettern Microsoft at Your Service REVIEWS 72 Foley on Microsoft: 16 Still Beating 22 Reader Review Mary Jo Foley Neverfail can keep your SQL Server 2005 Is the Microsoft Live: A Six-Month Exchange server running One to Beat Report Card through just about any disaster. Super-fast performance, robust ALSO IN THIS ISSUE toolset and better security options make Microsoft’s latest database 2 Redmond Magazine Online management system a must for 6 [email protected] most shops. 71 Ad and Editorial Indexes COVER IMAGE BY GRAHAM WATSON 0506red_OnlineTOC_2.v6 4/18/06 12:06 PM Page 2 Redmondmag.comMAY 2006 MCP Radio/ENT Questions With ... Emmett Dulaney Group Policy Grows with Emmett Dulaney, author of Windows Vista Redmondmag.com’s new Linux/Windows integration column, esides security enhancements, Group Policy undergoes FullArmor CTO Integration Station (FindIT code: Bvast improvements in Windows Vista, and that’s what Danny Kim says LinWin), on the state of interop today: Microsoft has gets FullArmor CTO Danny Kim excited. “The number of been focusing Group Policy settings is doubled in [the beta version of] lots of attention Biggest challenge for Windows IT on refining Windows Vista,” says Kim—upward of more than three thousand. Windows Vista pros who want to integrate Linux But he loves that Microsoft provides a nifty search filter to help Group Policy. and Windows? you narrow down what you’re looking for. “Kind of like a Convincing management not to blindly Google for Group Policy,” he adds. It’s among several of Kim’s favorite features believe everything they read or hear. he discusses with MCPmag.com Editor Michael Domingo on MCP Radio. FindIT code: MCPDK One piece of Linux software that For in-depth coverage, ENTmag.com reporter Stuart J. Johnston looks at every Windows admin should have? which Windows Vista and IE7 features will favor the IT environment. The latest Samba docs in a form FindIT code: ENTFeat you’re comfortable with. Samba is simple, yet robust; it’s important to know how to interact with it to get MCPmag.com exactly what you need. What’s the most compelling aspect Who Wins with Vista, Office Delays? of Linux/Windows integration? FileEngine is leasing Linux servers to ho benefits most from the announced delays in Win- companies running Windows clients. dows Vista and Office 2007? According to a recent W [Its] marketing strategy is that users MCPmag.com Web poll that garnered 90 responses, more never need to be concerned with than 30 percent believe early adopters are the true winners, what’s on the server, they just need who will eventually get more secure, solid releases from the the server to perform the functions Redmond giant. In a close second at 22 percent is Apple, who you believe may expected of it. It’s a brilliant idea. be selling more of those dual-boot, Intel-based Macs during the 2006 holiday shopping season. See the results of the also-rans. FindIT Code: MCPDelay FACTOID “Global PC shipments REDMONDMAG.COM RESOURCES [will] grow by 10.5 percent this year to 229.4 Resources Enter FindIT Code million units, up from >> Daily News News 207.6 million last year.” >> E-Mail Newsletters Newsletters — From Redmondmag.com news >> Free PDFs and Webcasts TechLibrary story “PC Market Growth To Slow for a Few Years” >> Subscribe/Renew Subscribe (FindIT code: RRPCship) >> Your Turn Editor Queries YourTurn REDMOND MEDIA GROUP SITES: Redmondmag.com • RCPmag.com • ENTmag.com MCPmag.com • CertCities.com • TCPmag.com • TechMentorEvents.com 2 | May 2006 | Redmond | redmondmag.com | Project2 3/31/06 12:09 PM Page 1 WE FIND THEM BEFORE THEY FIND YOU. Web Security Web Filtering Endpoint Security Websense® Security LabsTM You can’t afford to sit around and wait for the next attack, and neither can we. Websense® Security Labs™ scans over 450 million websites a week, discovering spyware, viruses and other web-based threats before they get to you. Get proactive. www.websense.com/security © 2006 Websense, Inc. All rights reserved. 0506red_Rubble4.v3 4/18/06 12:26 PM Page 4 Barney’sRubble Doug Barney RedmondTHE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY Computers MAY 2006 ■ VOL. 12 ■ NO. 5 Group Publisher Henry Allain Make You Stupid Redmond Media Group Editorial Director Doug Barney Redmond Media Group hat happened the last time your computer Group Associate Publisher Matt N. Morollo Redmond Media Group croaked? Did you feel lost, paralyzed, unable to Editor in Chief Doug Barney [email protected] work or communicate? Editor Keith Ward W [email protected] One day this winter, the power died in goes down. Then we have no idea who Executive Editor, Reviews Lafe Low our plush, normally well-lit Redmond to call or how. [email protected] Editor at Large Michael Desmond offices. Writers, artists and editors slunk E-mail and IM has replaced the phone [email protected] out of their caves, rubbed their eyes and or a walk down the hall. We use emoti- News Editor Scott Bekker stood around talking sports. (This is cons to mimic the real thing. Personal [email protected] Managing Editor, Wendy Gonchar when I discovered my co-workers don’t relationships and business relationships Web Editor [email protected] consider pro wrestling to be a real sport.) have become automated. Editor, Redmondmag.com, Becky Nagel CertCities.com [email protected] One by one, we drove home to where Redmond readers share these concerns. Editor, MCPmag.com Michael Domingo our wireless networks hummed along “Everyone’s been ‘stupidized’ by comput- [email protected] merrily so we could get some real work ers these days. Here’s an example: retail Editor, ENTmag.com Scott Bekker done. It could have been store, computers crash, [email protected] Associate Editor, Web Dan Hong worse. If we were home lines of people. Heaven [email protected] when the power went out, forbid that they get Contributing Editors Mary Jo Foley we’d be forced to interact out the paper pads and Don Jones with our loved ones or do write up the sales!” Greg Shields something really crazy complains Don.
Recommended publications
  • Cluster Server Installation Guide
    Veritas™ Cluster Server Installation Guide Solaris 5.0 N18534F Veritas Cluster Server Installation Guide Copyright © 2006 Symantec Corporation. All rights reserved. Veritas Cluster Server 5.0 Symantec, the Symantec logo, Veritas are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THIS DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID, SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be “commercial computer software” and “commercial computer software documentation” as defined in FAR Sections 12.212 and DFARS Section 227.7202. Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 www.symantec.com Third-party legal notices Third-party software may be recommended, distributed, embedded, or bundled with this Symantec product. Such third-party software is licensed separately by its copyright holder. All third-party copyrights associated with this product are listed in the accompanying release notes.
    [Show full text]
  • VERITAS Cluster Server 4.0 Installation Guide for Linux
    VERITAS Cluster Server 4.0 Installation Guide Linux N10923H August 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. VERITAS Software Corporation shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. VERITAS Legal Notice Copyright © 1998-2004 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS logo, VERITAS Cluster Server, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation. VERITAS and the VERITAS logo, Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. VERITAS Software Corporation 350 Ellis Street Mountain View, CA 94043 USA Phone 650–527–8000 Fax 650–527–2908 www.veritas.com Third-Party Copyrights Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. “License” shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. “Licensor” shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. “Legal Entity” shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity.
    [Show full text]
  • Symantec™ Cluster Server 6.2.1 Installation Guide - Linux
    Symantec™ Cluster Server 6.2.1 Installation Guide - Linux Platform Release OL7 UEK R3 April 2015 Symantec™ Cluster Server Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: 6.2.1 Document version: 6.2.1 Rev 0 Legal Notice Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, Veritas Storage Foundation, CommandCentral, NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations, whether delivered by Symantec as on premises or hosted services.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Wxrt VCS for Windows 5.1 SCL Based GA Version
    Release Revision 1.6 25 Oct 2012 Software Compatibility List (SCL) Veritas Cluster Server 5.1 Service Pack 2 for Windows® Symantec Veritas Cluster Server for Windows 5.1 SP2 S x86, IA64, x64 Note 01, 02 5.1, 5.1AP1, Symantec Veritas Cluster Server for Windows U x86, IA64, x64 5.1SP1,5.1SP1AP1 Symantec Veritas Cluster Server for NetApp SnapMirror 5.0 RP1a, 5.0RP2 U x86, IA64, x64 Symantec Veritas Cluster Server Agent for Websphere 5.1 S x86, x64 Note 05 Symantec Veritas Cluster Server Agent for Websphere MQ 5.0 S x86, x64, IA64 Note 06 Symantec Veritas Cluster Server Agent for SAP NetWeaver 4.3.01.0 S x86, x64, IA64 Note 07 Symantec Veritas Storage Foundation for Windows All versions X x86, x64, IA64 Note 02 Symantec Veritas Enterprise Vault 8.0 SP1-SP5, 9.0.x S x86 Symantec Veritas Enterprise Vault C Note 31 10.0 x86 Note 21, 22, 23, 28, Veritas NetBackup 6.0 MP1-MP3 Symantec L x86 29 Symantec Veritas NetBackup 6.0 MP4-MP6 C x86 Note 22, 23,28, 29 Symantec Veritas NetBackup 6.5, 6.5.2-6.5.4 C x86, x64 Note 22, 23, 28, 29 Symantec Veritas NetBackup 6.5.1 L x86, x64 Note 22, 23, 28, 29 Symantec Veritas NetBackup 7.0, 7.0.1 L x86, x64 Note 22, 23, 27, 28 Symantec Symantec Backup Exec for Windows Servers 10.x X x86 Note 28 Symantec Symantec Backup Exec for Windows Servers 11.0, 11d C x86 Note 28 Symantec Symantec Backup Exec for Windows Servers 12.0, 12.5 C x86 Note 28 Symantec Symantec Backup Exec for Windows Servers 2010, 2010 R2 L x86 Note 24, 25, 28 Symantec Symantec Backup Exec System Recovery 6.5, 7.0 C x86 Note 28 Symantec Symantec
    [Show full text]
  • Cluster Server 5.0 MP2 Release Notes
    Veritas™ Cluster Server Release Notes HP-UX 5.0 Maintenance Pack 2 Veritas Cluster Server Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: 5.0 MP2 Document version: 5.0MP2.0 Legal Notice Copyright © 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Storage Foundation and Veritas are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
    [Show full text]
  • Wxrt VCS for Windows 5.1 SCL Based GA Version
    Release Revision 1.6 March 11, 2013 Software Compatibility List (SCL) Veritas Storage Foundation™& High Availability Solutions 6.0.2 ® Vendor Product Version Support Level Platform Notes VMware VMware ESX/ESXi Server 4.1U2, 5.0U1, 5.1, 5.1.0a S x64 VMware VMware ESX/ESXi Server 4.0 X x64 VMware VMware vCenter server 4.1U2, 5.0U1, 5.1, 5.1.0a S x64 VMware VMware vSphere Client 4.1U2, 5.0U1, 5.1, 5.1.0a S x64 VMware VMware vSphere vMotion 4.1U2, 5.0U1, 5.1, 5.1.0a S x64 VMware VMware Storage vMotion 4.1U2, 5.0U1, 5.1, 5.1.0a S x64 VMware VMware High Availability 4.1U2, 5.0U1, 5.1, 5.1.0a S x64 VMware VMware Distributed Resource Scheduler 4.1U2, 5.0U1, 5.1, 5.1.0a S x64 VMware VMware Tools 4.1U2, 5.0U1, 5.1, 5.1.0a S x64 Symantec Veritas Storage Foundation (SF) 6.0.1 S x64 Symantec Veritas Storage Foundation High Availability (SFHA) 6.0.2 S x64 Symantec Symantec Endpoint Protection 12.1 RU2 S x64 Symantec Symantec NetBackup 7.5 S x64 Symantec Veritas Operations Manager 5.0 S x64 Symantec Symantec Virtual Store 6.0 S x64 Symantec Veritas Dynamic Multi-Pathing 6.0.1 S x64 5.5, 5.6, 5.7, 5,8, 6,1, 6.2, x64 RedHat RedHat Enterprise Linux (RHEL) 6.3 S Novell SUSE Linux Enterprise Server (SLES) 10SP4, 11SP1, 11SP2 S x64 Oracle Oracle Linux (OL) 5.6, 5.7, 5.8, 6.1, 6.2, 6.3 S x64 Note 1 Oracle Oracle Database 11g, 11gR1, 11gR2 S x64 SAP SAP Netweaver 7.1,7.3 S x64 IBM IBM WebSphere MQ 7.0, 7.1 S x64 Support Legend Tested and Supported S Supported with Limitations L Compatible and Supported, but not tested by Symantec C x64 = Extended 64-bit Windows architecture Not Supported X Upgradeable to latest version U NOTES: Support is conditional according to the Notes corresponding to the individual platform or application.
    [Show full text]
  • List of New Applications Added in ARL #2586
    List of new applications added in ARL #2586 Application Name Publisher NetCmdlets 2016 /n software 1099 Pro 2009 Corporate 1099 Pro 1099 Pro 2020 Enterprise 1099 Pro 1099 Pro 2008 Corporate 1099 Pro 1E Client 5.1 1E SyncBackPro 9.1 2BrightSparks FindOnClick 2.5 2BrightSparks TaxAct 2002 Standard 2nd Story Software Phone System 15.5 3CX Phone System 16.0 3CX 3CXPhone 16.3 3CX Grouper Plus System 2021 3M CoDeSys OPC Server 3.1 3S-Smart Software Solutions 4D 15.0 4D Duplicate Killer 3.4 4Team Disk Drill 4.1 508 Software NotesHolder 2.3 Pro A!K Research Labs LibraryView 1.0 AB Sciex MetabolitePilot 2.0 AB Sciex Advanced Find and Replace 5.2 Abacre Color Picker 2.0 ACA Systems Password Recovery Toolkit 8.2 AccessData Forensic Toolkit 6.0 AccessData Forensic Toolkit 7.0 AccessData Forensic Toolkit 6.3 AccessData Barcode Xpress 7.0 AccuSoft ImageGear 17.2 AccuSoft ImagXpress 13.6 AccuSoft PrizmDoc Server 13.1 AccuSoft PrizmDoc Server 12.3 AccuSoft ACDSee 2.2 ACD Systems ACDSync 1.1 ACD Systems Ace Utilities 6.3 Acelogix Software True Image for Crucial 23. Acronis Acrosync 1.6 Acrosync Zen Client 5.10 Actian Windows Forms Controls 16.1 Actipro Software Opus Composition Server 7.0 ActiveDocs Network Component 4.6 ActiveXperts Multiple Monitors 8.3 Actual Tools Multiple Monitors 8.8 Actual Tools ACUCOBOL-GT 5.2 Acucorp ACUCOBOL-GT 8.0 Acucorp TransMac 12.1 Acute Systems Ultimate Suite for Microsoft Excel 13.2 Add-in Express Ultimate Suite for Microsoft Excel 21.1 Business Add-in Express Ultimate Suite for Microsoft Excel 21.1 Personal Add-in Express
    [Show full text]
  • List of TCP and UDP Port Numbers - Wikipedia, the Free Encyclopedia List of TCP and UDP Port Numbers from Wikipedia, the Free Encyclopedia
    8/21/2014 List of TCP and UDP port numbers - Wikipedia, the free encyclopedia List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) which needed two ports for half duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for bidirectional traffic. The even numbered ports were not used, and this resulted in some even numbers in the well-known port number range being unassigned. The Stream Control Transmission Protocol (SCTP) and the Datagram Congestion Control Protocol (DCCP) also use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Use Description Color Official Port is registered with IANA for the application[1] White Unofficial Port is not registered with IANA for the application Blue Multiple use Multiple applications are known to use this port. Yellow Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports or system ports.[2] They are used by system processes that provide widely used types of network services.
    [Show full text]
  • Veritas™ Cluster Server Release Notes
    Veritas™ Cluster Server Release Notes Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0 March 2013 Veritas Cluster Server Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: 6.0 Document version: 6.0.0 Legal Notice Copyright © 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, Veritas Storage Foundation, CommandCentral, NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. See the Third-party Legal Notices document for this product, which is available online or included in the base release media. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
    [Show full text]
  • Overall Messaging/Description (We'll Want to Highlight
    Storage and Availability Management Group Data Protection Group At-a-Glance PROFILE Symantec provides enterprise customers with storage management, high availability and data protection solutions across heterogeneous storage and server platforms in both physical and virtual environments. These solutions enable companies to standardize on a single layer of infrastructure software that works on every major distributed operating system and supports every major storage device, database and application. Storage and Availability Management – Symantec’s storage management and high availability family of products provide storage management, storage resource management, storage utilization management, storage area network, or SAN management, storage virtualization and replication, allowing enterprises to ensure the availability of critical applications and data. Products include Veritas CommandCentral Storage, Veritas Storage Foundation and Veritas Cluster Server. Data Protection – Symantec’s data protection family of products is designed to ensure successful backup and recovery of information and systems for organizations across all market segments, from small and medium-sized businesses to large enterprises, using the latest disk, tape, deduplication, indexing and virtual technologies. Products include Veritas NetBackup Platform, Symantec Backup Exec and Symantec Backup Exec System Recovery. LEADERSHIP • Rob Soderbery, senior vice president, Storage and Availability Management Group • Deepak Mohan, senior vice president, Data Protection Group Symantec Corp., 2008 1 STORAGE AND AVAILABILITY MANAGEMENT PRODUCTS Veritas Storage Foundation Veritas Storage Foundation from Symantec provides a complete solution for heterogeneous online storage management. Based on the industry-leading Veritas Volume Manager and Veritas File System, it provides a standard set of integrated tools to centrally manage explosive data growth, maximize storage hardware investments, provide data protection and adapt to changing business requirements.
    [Show full text]
  • Veritas Cluster Server User's Guide
    Veritas™ Cluster Server User’s Guide HP-UX 5.0 N18472G Veritas Cluster Server User’s Guide Copyright © 2006 Symantec Corporation. All rights reserved. Veritas Cluster Server 5.0 Symantec, the Symantec logo,Veritas, are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THIS DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID, SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be “commercial computer software” and “commercial computer software documentation” as defined in FAR Sections 12.212 and DFARS Section 227.7202. Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 www.symantec.com Third-party legal notices Third-party software may be recommended, distributed, embedded, or bundled with this Symantec Corporation product. Such third-party software is licensed separately by its copyright holder. All third-party copyrights associated with this product are listed in the accompanying release notes.
    [Show full text]