| Comments

some microsofties offer up some reasons why the team system bits were not included in the latest version of the whidbey beta 1 distribution:

http://blogs.msdn.com/buckh/archive/2004/07/22/191829.aspx

| Comments

check out the infopath form to write your blog entries:

http://weblogs.asp.net/guowu/archive/2004/07/20/187990.aspx

| Comments
if you haven't seen the sharepoint toolkit, check it out here: toolkit

| Comments

thanks to marcel for pointing to another sharepoint resource site on the internet:

check it out: http://sharepoint.advis.ch/

| Comments

last week (early last week) i was helping a client who's machine had been infected with a hack that was adding footers in the iis configuration of a site.  what this was doing was outputing javascript that was attempting to insert the download.ject virus on user machines that visited the site.

*last week* i noticed it and the companie's a/v software (mcafee) noticed it as JS/Exploit-DialogArg.B variant (not Download.Ject).  my a/v soft (norton desktop) didn't even notice it.  I could not find any information on the JS/Exploit-DialogArg.B virus def except on mcafee's site stating an “extremely low” warning.

guess what...it wasn't that “extremely low” -- as now download.ject (same thing) is all over the place...and this server *had* the appropriate suggested service pack from ms on it already.  i admit, the clients machine looked like a different hack to get in, but i found it interesting that just now a/v corps are heightening the threat...i contacted both symantec and mcafee with the copy of my variant and they responded with “this is already been designated a low warning as microsoft already has patches that solve this” -- argh.