Transient workers and guests come and go, and can change machines in unwanted ways. There are several ways of dealing with this, as you will learn within...
Articles by Jim Freund
One exploit that several creators of viruses and other forms of malevolent code try is to make an e-mail attachment appear to be something other than what it is. Defend against this by making sure all files are shown with their complete filenames. Here's how...
Yarner, the latest viral threat to span the ether, is rated by some as a low threat, and others as truly serious. In any case, it pays to be vigilant. In this article, we tell you what the dangers are, what to look for, and how to manually eradicate the virus.
Given the information that there have been security vulnerabilities in SNMP has gone out to miscreants as well as the rest of the world, it is paramount that network managers secure their borders as soon as possible. Learn what steps you should take in this article.
A buffer-overflow vulnerability has been determined to exist within Win2K's Telnet service, and Interix 2.2's Telnet daemon. In this article, find out whether your network is at risk, and where to get the patches.
Anti-virus programs largely protect you from viruses, but what about other forms of malicious code? This software package works to analyze and disinfect your network to assure that you're free from already active Trojans, backdoors, and hacker tools.
The pathping command is a relatively obscure, yet simple and powerful tool for tracing network problems; one-upping its antecedants ping and tracert. Learn how to use it within this article.
It's MyParty -- the first pervasive virus written in the new year to make the rounds. While the trigger date has passed, the Trojan/worm can still cause quite a hangover if you're not prepared. We tell you what to look for, what the symptoms are, what the payload will do, and how to remove the malicious program from your system.
The premise behind Novell's NetDevice NAS is that with one CD, you can take pretty much any computer already existing on your network and turn it into a dedicated Network Attached Storage (NAS) device in 20 minutes. Using NetWare, Novell Directory Services, and Web browser management, Novell has provided a solution for creating what was sold as a hardware appliance with no need for expertise. Learn more in this review...
Another New Year's, another virus. (For that matter, another week, another virus.) In the past reports of a Happy New Year virus have turned out to be hoaxes. Not this time, however. A new worm most commonly called Reeezak is trying to foul up your security resolutions, and it comes in several forms. Read about how to identify the malicious program, what it does, and how to eradicate it manually here.
Once again, two virus-related e-mails are making the rounds. The good news is that neither one is particularly harmful. The bad news is that each may well slip through virus protection schemes that haven't been recently updated. Read about the new virus Gokar, and the re-emergence of the SULFNBK.EXE hoax here.
The simple concept of sharing keyboards, monitors, and mice with multiple CPUs has evolved into the smart way to control server farms. One vendor stays ahead of the group with new products and concepts...
There's yet another mass-mailer on the loose called Updater -- It seems as if we need to cover the Virus of the Day. This latest malicious offering uses Visual Basic to worm its way into your network. Read on to learn about Updater's aliases, appearance, payload, and how to remove it.
The latest viral threat can use ICQ and mIRC to propagate itself, and can delete some security software from your systems. Read on to learn all of Goner's methods of attack, its payload, and how to remove it if you've been infected.
BadTrans is back with a bit more vengeance -- but still controllable if you know how to take care of it. Read on to learn about how to identify this virus, its behavior, effects, and how to eradicate it manually, if needs be.
In this hands-on review of the newly-released Diskeeper 7, learn how to optimize both disks and your time. System administrators will appreciate the new deployment and scheduling features offered for all versions of Windows, up through and including XP.
In the past, distributed Denial of Service (DoS) attacks were generally targeted at specific servers or firewalls on a network. But a disturbing trend shows automated intruders compromising routers and router protocols, thereby endangering not only Web sites and enterprises, but the Internet at large. We explain how and why this occurs, and what you can do to avoid becoming a victim or an unwilling perpetrator.
It is likely that over the next few months the great debate on electronic (and probably other forms of) privacy is going to heat up. The war we face may be just as much about electronic information (particularly economic) as anything else. In many cases, it is the networkers who will be given the task of monitoring e-mail and other data. Here's why you need to avoid being put into that position.
Whenever a virus of some form or other strikes, there are media stories about enterprises being knocked offline by the virus, and how many millions of dollars it costs. More often than not, this means that the network manager or IT Department simply isn't doing their job right.
The latest bit of malicious code is particularly insidious due to its blended approach of using three different delivery methods to propagate itself. We have the lowdown on what Nimda does, how it works, how to eradicate the worm, and what you can do to assure you won't be compromised by it.
Given the fact that the recent terrorist attacks have had their greatest impact upon businesses, particularly financial companies, it is apparent that network managers and IT departments are being put to the test this week, and will continue to do so in the coming months. Businesses that do not have a continuity plan in place will find themselves hard put to recover from a disaster of this magnitude. We cover the impact that the attack on the World Trade Center has had to data centers, and what precautions you need to take for your business.
2001, anticipated as a year of technological prosperity, has instead hit our industry hard, and continues to devastate. Companies are continuing to close or consolidate, and more tech workers find themselves out on the street. As we enter the fourth quarter, our Managing Editor offers some rules for networkers to follow which might help turn things around.
Too many TLAs in your day-to-day talk? Not sure whther the ASP being referred to is an Active Server Page, Application Service Provider, or perhaps a member of the Association of Shareware Professionals? Check out Babel.
Traditionally, Unix-based systems use POP servers for retrieving email, but in today's environment, where users log in from multiple location using varied clients, this can prove problematic. One solution is to use IMAP instead. After going through the tutorials on setting up your own server in previous weeks, this time we summarize some of the commercial and other out-of-the-box solutions.