
NMap: A security scanner
MNap is the right tool for ensuring that only the services you want on your network are actually there, but it can also be misconstrued and misused.
You're on page 43, See the latest articles on Collaboration.
MNap is the right tool for ensuring that only the services you want on your network are actually there, but it can also be misconstrued and misused.
How do you provide help in the most efficient and cost effective way when faced with the challenge of remote users? Here's a look at some of the more common solutions and the advantages and disadvantages of both.
Which do you think is a bigger risk to company networks – spam or surfing? If you guessed the latter, the results of a recent study would say that you are correct. Check out the news story: “Surfing a bigger risk than spam to company networks.” According to the story, “Nearly 40 percent of the 200 ...
I have been on vacation this week and found myself waxing philosophic about how computing has evolved in our organizations over the years and where computing is headed over the next five to ten years. I cant remember exactly when he said it, but John Gages statement, The Network IS the Computer, becomes more and ...
Organizations face a host of security concerns driven by the power of technology and the vulnerabilities inherent in its use. IT pros have to be vigilant about all these issues, from system penetration threats to hardware portability to employee turnover.
You provide Internet access to employees to hopefully allow them to be more productive. This article shows why it's important to have an internet usage policy on hand so users know what they can and cannot do on the Internet.
Can you imagine a world where kids stay out all night playing video games at Internet cafes? Believe it or not, that’s already happening in China. Read this news story: “China opens halfway house for Net addicts.” According to the article, “Computer and online gaming has exploded in China in recent years, with an estimated 14 ...
You provide Internet access to employees to hopefully allow them to be more productive. This article shows why it's important to have an internet usage policy on hand so users know what they can and cannot do on the Internet.
Have you attended a Web conference lately? Have you hosted a Web conference? If you have, you know that attending and hosting one are two different things entirely. Ever purchase a new technology and then immediately get asked why you havent rolled it out? A colleague and I have had some fun lately dealing with ...
Like it or not, advertising is part of the Internet food chain and a huge source of revenue for Internet companies. But many conflicts between Internet advertising and Internet security already exist, and scams, malware, and click fraud continue to erode users' trust. When it comes to Internet advertising and Internet security, Jonathan Yarden thinks something's gotta give. Get his take on the future of this relationship in this edition of Internet Security Focus.
This document explains how to use a Windows SharePoint Services Document Workspace for document collaboration.
SquishQL is the simplest query language you can use for accessing RDF data. Using several code examples, this document shows you how SquishQL works.
This document explains how SPARQL might be used for querying information in a Web 2.0 environment and how the SPARQL Protocol works for remote queries.
Google has fired off a warning shot following reforms in communications legislation passed by the US Senate. The legislation has stirred quite a commotion across the internet as it poses many threats to the current model of the Internet. There is concern that telecommunications companies will use the legislation to try to muscle in on ...
I feel as though we are standing on the edge of a very dangerous precipice...