• Hiring is still a very long processs

    Posted January 8, 2001 - 2:12 pm

    The behavioral interview is becoming a key part of the hiring process for many companies, as they realize that the best way to hold on to staffers later is to have hired compatible workers in the first place
  • Denial-of-service victims share lessons learned

    Posted January 8, 2001 - 11:20 am

    SAN FRANCISCO -- When online news service ZDNet was hit with a ferocious denial-of-service attack in February, its server was overwhelmed with 50% to 100% more data traffic than its peak load, rendering three-quarters of the site inaccessible for almost three hours. Site managers discovered there was little they could do to halt the first of two attacks that consumed all their available bandwidth.

  • How to draw up an RFP for your e-business

    Posted January 8, 2001 - 10:24 am

    The explosion of the new e-conomy has irrevocably altered the best practices for all businesses, from global Fortune 50 companies to shoestring startups.
  • Taking Control of the Application, Part 2

    Posted January 8, 2001 - 1:00 am

    * Ken continues exlaining CEdit's features COMMUNITY DISCUSSIONS * Webcast: Broadband Wireless...Get in the Ring

  • The best-kept security secrets

    Posted January 5, 2001 - 3:06 pm

    Each year, your risk for a hack attack grows. In 1999, 9,859 security incidents were reported to Carnegie Mellon University's CERT Coordination Center, a premier computer emergency response team. By June 2000, the number had already reached 8,836. Better awareness accounts for some of the increase, but not all: People submitted information on 417 software vulnerabilities to CERT in 1999. By mid-year 2000, that number had already reached 442.
  • How to spend a dollar on security

    Posted January 5, 2001 - 8:57 am

    In order to help companies determine the best use of their resources, Patrick McBride, executive vice president of METASeS, shows how to carve up a single dollar in a first-year security budget.
  • Newsgroups

    Posted January 5, 2001 - 1:00 am

    * An introduction to newsgroups and netiquette COMMUNITY DISCUSSIONS * Does KDE help pave the road from Windows to Linux?

    SERVICES * IT Job Spot: Exclusive opportunities with hot companies
  • A guide to original SYN

    Posted January 4, 2001 - 2:42 pm

    To understand how ports work and the ways they behave, we need to understand how TCP/IP functions.
  • Storms in the network backbone

    Posted January 4, 2001 - 12:54 pm

    Storms are bad. They cause havoc, disrupt people's lives and damage property. Network storms, although rarely life threatening can be equally disruptive.
  • How to stamp out RTF viruses, fix TweakUI, and more

    Posted January 4, 2001 - 10:40 am

    If you thought RTF files were benign from a virus-carrying point of view, you might want to think again. DOC files can be disguised as RTF files, and hacked RTF files can crash an e-mail reader without your even opening at attachment.
  • Regular Expressions Tutorial, Part 4: More Quantifiers

    Posted January 4, 2001 - 1:00 am

    * The last of the single-character quantifier and the bounded quantifier COMMUNITY DISCUSSION * RFP Exchange: Need help with your next e-business project, NOW?

  • Windows users reveal latest tricks

    Posted January 3, 2001 - 4:29 pm

    THIS WEEK MY READERS have once again sent in several excellent tips to make Microsoft Windows easier to use -- or to make it usable at all for some of their programs.
  • IP version 6: the next generation of the Internet

    Posted January 3, 2001 - 4:10 pm

    Lori: I need to start off this week's column by congratulating my partner on his promotion. Kevin is now acting director of the InfoWorld Test Center. Way to go, Kevin!
  • Finding the time bombs

    Posted January 3, 2001 - 2:54 pm

    Sizing up another company's IT early in a merger or acquisition can be difficult, but there are ways to quickly find the strengths and weaknesses.
  • H-1B visa program

    Posted January 3, 2001 - 2:14 pm

    How it can help you recruit long-term workers.
  • An office with a door

    Posted January 2, 2001 - 7:14 pm

    You're working from home today but can't get anything done. Your best friend calls wanting to catch a movie, your spouse needs a hand with the housework, and the kids keep barging in demanding you play catch.
  • Protecting intranet info

    Posted January 2, 2001 - 4:51 pm

    We have a Windows NT 4.0 Web server running Microsoft's Internet Information Server (IIS). Incoming traffic is routed through a separate proxy server running MS Proxy 2.0 to the Web server. We'd like to make certain information on the Web server is accessible only to our employees (on an intranet), but we don't know how to set it up.
  • Change management: Is it the right remedy?

    Posted January 2, 2001 - 4:44 pm

    ONE OF THE MAIN reasons e-business is so painful is that it involves major organizational change, and change hurts. Clearly, some companies "do" change better than others, and this agility gives them a significant advantage over their competitors.
  • Installing DSL

    Posted January 2, 2001 - 4:14 pm

    I've got a question regarding the best way to install DSL on an existing Windows NT/98 network. The past few times I installed DSL on a network, the ISP provided an IP address for each PC. The new DSL company (Verizon) has given us only one IP address for the DSL modem. We will be using a router attached to the DSL modem. I would like to continue using the existing IP addresses on the 15 PCs. Can we set up the router to use one of our existing IP addresses under the same subnet mask? I don't think that I want to switch the network to NETBIOS and have the router assign IP addresses for the DSL. What is the best way to go?
  • Deconstruction is key to e-business

    Posted January 2, 2001 - 12:29 pm

    Electronic business should be a catalyst for change. In fact, transforming the essence of a company and resetting its agenda is a necessary outcome of e-business. You can begin by evaluating what the company does and what value it provides. Don't be afraid to deconstruct the company to develop this vision of what it is at its core.
  • Getting the inside track for a new domain name

    Posted January 2, 2001 - 10:54 am

    THERE'S GREAT DEMAND for new Web addresses these days, whatever kind of business you may be in. For example, converting a Windows NT domain to Windows 2000's new Active Directory structure almost requires a working Internet address system for network naming purposes.
  • Keeping Constant

    Posted January 2, 2001 - 1:00 am

    * Using mathematical constants and functions COMMUNITY DISCUSSIONS * Webcast: 10 Million reads per second -- 1 Million writes per second

  • Taking Control of the Application

    Posted January 1, 2001 - 1:00 am

    * An introduction to CEdit, the text edit control COMMUNITY DISCUSSIONS * Webcast: 10 Million reads per second -- 1 Million writes per second

  • HMVC: The layered pattern for developing strong client tiers, Part 4 This hierarchical model eases the development of a Java-ba

    Posted January 1, 2001 - 1:00 am

    What about in an EJB container?

    RESOURCES * IT Job Spot: Exclusive opportunities with hot companies
  • After the SYN flood

    Posted December 28, 2000 - 5:19 pm

    This is the nature of your classic SYN flood attack, a technique favored by discerning hackers over the past few years. It is considered to be a denial-of-service attack and can effectively block even a large pipe to the Internet, not by exhausting the pipe's capacity but by exhausting the resources of the machines using the pipe.
Join us:






Ask a Question