Development

RSS
Application development news, tools, and how-tos for programmers
  • VPN users to get mgmt. help

    Posted March 14, 2001 - 5:04 pm

    Two leading players in the VPN market are launching products to ease and coordinate management of VPNs and firewalls.
  • Advertising vulnerabilities

    Posted March 14, 2001 - 3:40 pm

    I would like to have information on vulnerabilities be distributed as quickly as possible so they could get fixed, but feel it would be a reckless disregard of Internet safety to publicize a security hole so the bad guys can exploit it before the good guys have ways to plug the hole.
  • Printer problems with Win NT and NetWare

    Posted March 14, 2001 - 3:25 pm

    We have several users on my network with Windows NT workstations. We also have a Novell NetWare 4 server. Some of our workstations lock up when we try to print. We have traced it back to the default printer on the workstation. If we stop the spooler service, we can then delete the printer. However, if we try to reinstall that printer with the NT wizard, it tells us that our printer name is invalid. Is there any reason for this?
  • Buying a core switch

    Posted March 14, 2001 - 3:02 pm

    My company is leaning toward purchasing Cisco's 65XX product for its core switch in our home office. Before we make a final decision, we want to review third-party product comparisons. Do you know where we can find comparisons?
  • Wireless access to an intranet

    Posted March 14, 2001 - 2:45 pm

    What protocols come into play when a user tries to access our intranet LAN through our Internet VPN using a wireless device like a PDA or mobile laptop? What hardware is required to connect these devices?
  • Who Let the Bugs Out?

    Posted March 14, 2001 - 2:29 pm

    The New the Hot the Unexpected Every time you think you're on top of security issues, another bug comes along to bite you. In a computer security report conducted last year by the Computer Security Institute and the San Francisco Federal Bureau of Investigations Computer Intrusion Squad, 70 percent of respondents (mostly large corporations) reported that they had experienced unauthorized use of computer systems in the past year.
  • Think Like a Hacker

    Posted March 14, 2001 - 2:17 pm

    The New the Hot the Unexpected If you want to beat the attackers, you've got to think like a hacker. That's the premise of computer security company Foundstone's four-day Ultimate Hacking course. Using Foundstone's self-contained network to hack into simulated systems, class participants learn the vulnerabilities of their own systems through the eyes of an attacker.
  • TCP security hole may be serious

    Posted March 13, 2001 - 7:51 pm

    It may be easier than previously believed for crackers to exploit a long-known and potentially dangerous weakness in the Transmission Control Protocol (TCP) used to drive Internet traffic, according to an advisory from security firm Guardent Inc.
  • Waiting for wireless

    Posted March 13, 2001 - 7:27 pm

    While a number of serious players - including Visto Corp., Wireless Knowledge and Hewlett-Packard - are building products and services for BREW, I wonder whether the wireless applications market based around cell phones with ambition is really of anything other than short-term significance.
  • Using an alternate ERD

    Posted March 13, 2001 - 7:20 pm

    I have had an NT 4 server crash on me and now it resorts to a blue screen every time I try to start it up. The message I receive says that it cannot find the boot device. I know that I had run an RDISK at some point but can't find the emergency repair disk (ERD) for that server. Is there anything I can try without having to reinstall NT and restore it from tape?
  • My funny valentine

    Posted March 13, 2001 - 6:37 pm

    Sysadmin pilot fish is weary of the constant tug of war - the fish pushing for e-mail security policies, Internet permissions and antivirus software, while the boss (himself a former sysadmin) tells fish to ease up on all those unnecessary security procedures fish keeps trying to implement.
  • GM's OnStar adds real-time stock trading to in-vehicle service

    Posted March 13, 2001 - 6:20 pm

    General Motors' OnStar unit is teaming with Fidelity Investments to provide stock quotes and market information as part of its in-vehicle communication service.
  • Internet Explorer 6 gets an early outing

    Posted March 13, 2001 - 5:54 pm

    ComNet-goers this week.

  • Career Adviser

    Posted March 13, 2001 - 3:11 pm

    Computerworld's Career Adviser Fran Quittel answers readers' questions about weighing Web-related job offers, the future of e-commerce opportunities, and getting the best compensation package when moving from CIO to COO.
  • Oracle's first applications conference on tap next week

    Posted March 13, 2001 - 2:03 pm

    The software vendor will hold the first U.S. version of its new Oracle AppsWorld conference, which has caused a major rift with the independent Oracle Applications Users Group.
  • Modeling the enterprise: The rule of identity

    Posted March 13, 2001 - 12:57 pm

    In the last few columns, we studied the rule of ownership. Now we turn our attention to the rule of identity. The rule of identity consists of the following four clauses:
  • Layered biometric tools boost security

    Posted March 13, 2001 - 12:16 pm

    In the race to improve security infrastructures faster than hackers can invent methods to penetrate firewalls, it is important to ascertain a user's identity before permitting access to protected data.
  • Microsoft spreads .Net support

    Posted March 13, 2001 - 12:00 pm

    Microsoft is preparing its .Net services to run on non-Windows OSs -- possibly even Linux -- and the company also plans to "embrace Java as a full member of the .Net suite."
  • eBay to adopt Microsoft .Net

    Posted March 13, 2001 - 11:44 am

    Microsoft and eBay have reached an agreement that, among other things, calls for eBay to employ the Microsoft software required to let the auction site offer portions of its software to developers as .Net-based Web services.
  • The balanced e-scorecard

    Posted March 13, 2001 - 10:38 am

    At Raytheon, metrics are reported up the line regularly to Director of Global E-Business Eric Singleton, who reports monthly to the chairman on the state of every e-business. He learned the metrics mantra while steeped in the metrics-centric Six Sigma quality program at AlliedSignal and now uses a balanced scorecard approach to manage the performance of all the company's e-businesses.
  • The Big Frame-Up

    Posted March 13, 2001 - 1:00 am

    * Webcast: Can Voice-over-IP Live Up to the Hype?

  • Toeing the Line

    Posted March 13, 2001 - 1:00 am

    * A line isn't just a line when you specify caps and joins. COMMUNITY DISCUSSIONS * RFP Exchange: Find IT Vendors Fast, Easy and FREE!

  • The paradox of Windows APIs

    Posted March 12, 2001 - 8:55 pm

    Though a versatile means of defining a protocol, the C-based Windows Application Programming Interface (API) often conflicts with object modeling and programming ideals. Use the following tips to restore some sanity to programming in C++ under Windows' C-based APIs.
  • Consortium releases new business process language

    Posted March 12, 2001 - 5:01 pm

    The language uses the tagging schema of XML and is designed to merge processes that run across multiple applications, corporate departments and business partners.
  • Guardent said to expose new TCP flaw

    Posted March 12, 2001 - 4:40 pm

    Monday.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question