RE: RFC Articles

  • From: "Thomas W Shinder" <tshinder@xxxxxxxxxxxxxxxxxx>
  • To: "[ExchangeList]" <exchangelist@xxxxxxxxxxxxx>
  • Date: Thu, 3 Jul 2003 20:33:32 -0500

Hi David,

Thanks for the ideas! As for the "firewall expert", he's clearly one in
his own mind, since all firewalls run on software. I sometimes think
these firewall experts "manque" believe that God somehow breathed life
into a stone and it become "hardware firewall" -- not requiring software
to run and deriving its logic and rulebase from the celestial bodies,
resonating perfectly with the "music of the spheres". I.e., the guy was
an arrogant blowhard  :-)

Thanks for the ideas!


Thomas W Shinder 
ISA Server and Beyond: 
Configuring ISA Server: 

-----Original Message-----
From: david [mailto:apba08@xxxxxxxxxxxxx] 
Sent: Thursday, July 03, 2003 4:09 PM
To: [ExchangeList]
Subject: [exchangelist] RE: RFC Articles

Dear Tom,

I started subscribing to this group about 18 months ago when I became a
systems administrator for small networks at two schools. I have looked
on in
awe at the technical expertise in the group and have marvelled as to how
anyone could have developed systems of such complexity which seem to be
inherently unstable!-)

The best advice I picked up from this group was to build a server 2 or 3
times myself and then employ some experts (consultants) to do the actual

This I did and have a very sound Win2k / E2K network at one school.

But, it has left me with gaps in my knowledge at a very basic level.
These I
try to fill with some measure of success. Now it may well be that such
things are too simple for this group (as witnessed by recent exchanges
our colonial friends!!) but it's what I need! I'm quite content, of
to be pointed elsewhere or just plain shown the door but there just may
others out there like me.

At my other location I have inherited a network with cable festooned
a rambling building and NT4 E5.5 set up in a similar rambling way.
profiles scattered across 3 or 4 hard drives, login scripts all over the
place, random allocation of permissions to files to name but a few.

One area that I haven't understood is the relationship between Exchange
Outlook. There are numerous papers on each but I haven't yet found one
covers the interface at the level I need. All e-mail sits on the server
is then accessed from any workstation by the user. Where is this
How do I change this? A "step-by-step" guide would be of great help.

Another area of total mystery to me is hardware firewall configuration.
heard one security expert describe a particularly popular software
as "about as much use as a paper umbrella". I have to say I haven't
researched this area at all but if you were willing to produce an
guide I'd be a reader.

Just one more and that is I suspect many of us are contemplating the
from ISDN to ADSL and again a step by step guide might be useful.

Hope this helps to point you!

Yours sincerely

David S.

I've stopped 76 spam messages. You can too!
One month FREE spam protection at

List Archives:
Exchange Newsletters:
Exchange FAQ:
Other Internet Software Marketing Sites:
Leading Network Software Directory:
No.1 ISA Server Resource Site:
Windows Security Resource Site:
Network Security Library:
Windows 2000/NT Fax Solutions:
You are currently subscribed to this Discussion List as:
To unsubscribe send a blank email to

Other related posts: