Exchange 2010 (codenamed Exchange 14) is available for download today

Ho ho, just three days after we migrated to Exchange 2007, there comes Exchange 2010.
 
The first public beta of the next Exchange generation is made available for download today.

Exchange 2010 (codenamed Exchange 14) can be downloaded here:

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=1898ed2c-2f88-48ac-824e-d3d20fad77d7

 
Exchange 2010 official website unveiled:
 

Never ever install this kind of software! There is no free lunch!

近来, 文学城没有了跳出式广告, 却引进了如下的恶意软件链接.

Recently, a website I access everyday started popping up this kind of message.  Be careful, the ‘antivirus’ software it introduces is Trojan malware, which could affect your system very badly.

Here is how it looks, gets your attention, and eventually lets you install the software.

You will see this pop-up first.  What?  My PC is affected.  I don’t believe you, close this pop-up.

Clicking the ‘X’ or ‘Cancel’ or whatever will bring you to the next window.  Is this your system?  See it again?  I don’t think so.  Close the window.

Again, it won’t close, just gives you another pop-up message.  You know, at this stage you cannot get rid of it, just click ‘Cancel’ or ‘X’.

Another pop-up, actually this is not a pop-up, just another web page from securedvirusscanner.com.  See, it can scan your system so quickly.  Too good to be true.  Don’t believe it, just try to close the window.

It will give your warning again,

and again.

Finally, it will show you what it wanted you to do.  DO NOT CLICK RUN!!!  If you download and run the exe, your PC will become a zombie.

Just click ‘Cancel’, this time you can close it.  Don’t forget to run a legitimate virus scan after all, and also tell your friends to be careful.  There is no free lunch, just buy one from a decent software vendor.

There are two websites talk about this malware site, it seems there is solution if your PC got affected.  You need to know how to modify Windows registry and there is no prove of the solution, also I do NOT encourage you download the “automatic remover” from these websites.  You either do it manually by yourself or give it to someone you can trust.

Here are the websites:

http://remove-malware.net/how-to-remove-securedvirusscannercom-hijacker/

http://windowsprotection.net/how-to-remove-securedvirusscannercom-hijacker-securedvirusscannercom-removal-guide/

This is my daily job, part of.

"Unlike other products, ISA and TMG firewalls can be configured to work in an almost unlimited number of deployment scenarios. For each scenario, the ISA or TMG firewall brings in a number of options and settings that you have to understand and think about, so that you have the optimal configuration to meet the deployment’s design goals."
 
— Dr. Shinder

Using Log Parser to analyse, view and export ISA logs in W3C format

Here is the official description and download site:

Log parser is a powerful, versatile tool that provides universal query access to text-based data such as log files, XML files and CSV files, as well as key data sources on the Windows operating system such as the Event Log, the Registry, the file system, and Active Directory.

Download: http://www.microsoft.com/downloads/details.aspx?FamilyID=890cd06b-abf8-4c25-91b2-f8d975cf8c07&displaylang=en
Some more info about this tool in TechNet ScriptCenter:
Log Parser 2.2: http://www.microsoft.com/technet/scriptcenter/tools/logparser/default.mspx

This blog (http://www.codinghorror.com/blog/archives/000369.html) gives more explaination and examples, although most articles on the Internet are about analysing IIS logs, but it also applies to ISA W3C logs if this is the way you choose for your ISA logging.
I borrowed this picture from the blog:
Besides basic SQL queries, another thing you need to know is the fields of ISA logging, here is the official info:
 
If the command line is too hard for you, there are a couple visual tools – freeware that can do the better job for you:
These two visual tools are very helpful if you are looking at a relatively large query results, like thousands of access records from a 2GB log file.  However, both tools have a bug in getting the values of date and time, they add 12:00:00AM in the date field and a date in the time field (LogParser Lizard adds year 0001, and Virsual Logparser adds year 2001), which is not necessary and when exported to Excel, year 0001 will make the time field overflow.  I will report this to the author.
 
P.S. If you need a quick look at the SQL query, here are some reference sites:
 
That’s almost all I’ve got since last night.  Have fun!