Date: | Mon, 8 Apr 2002 00:54:33 -0700 (PDT) |
| From: | "TechRepublic NetNote" <Online#3.10712.2d-g8soODjo-P3V.1@newsletter.online.com>
| |
Subject: | [TechRepublic] Will transparency can the chaos? |
TechRepublic
http://www.techrepublic.com
Presents your
TECHREPUBLIC NETNOTE E-NEWSLETTER for April 8, 2002
<---------------Advertisement--------------->
LIMITED-TIME FREE ACCESS FOR IT PROFESSIONALS
Go to TechProGuild today for special, limited-time FREE access to
proven IT solutions. TechProGuild's online IT support community
provides access to proven IT solutions - field-tested by IT pros -
and offers amazing IT resources: over 250 full-text IT books, exclusive
downloads, in-depth articles on network and system administration, PC
troubleshooting, networking and Cisco infrastructure information,
help desk and support, and more! Discover why the best and brightest
IT pros turn to TechProGuild!
http://clickthru.online.com/Click?q=42-rFYcIPK5JAYxQN1pI3rY_iEzddRR
<------------------------------------------->
WILL TRANSPARENCY CAN THE CHAOS?
THE IT MANAGER'S DILEMMA: TRANSPARENCY VS. CHAOS
Transparency is the latest management buzzword. Although exercising
complete openness with your team seems like the right thing to do, Bob
Artner
explains why that strategy may not always be the best plan.
http://clickthru.online.com/Click?q=58-mr3xIdJms_FxtMOY8KEqtGX6M9RR
TURNING OFF THE INTERNET TAP
Security concerns are forcing many CIOs to restrict in-house Internet
access and devise new e-mail strategies. Tim Landgrave predicts that
enterprises will trade today's Internet for a homegrown Net based on
specific
Web services.
http://clickthru.online.com/Click?q=6d-e8LlIDEJJCv92pO7pc-qJHyVP9RR
SET UP A STRONG LINUX FIREWALL WITH IPTABLES
One of the most popular uses of Linux is for building a firewall. While
Linux firewalls are definitely a DIY kit rather than a prepackaged
solution, they're reliable and cost-effective. See how to set one up
with the
robust iptables program.
http://clickthru.online.com/Click?q=82-P0BYQXK3G6snEU96OJxgjtXzB9RR
NEED AN ANSWER TO YOUR TECHNICAL QUESTIONS?
Check out our Technical Q&A section, where you can ask other
TechRepublic members for advice and tips. Join our community of IT pros
in a free
marketplace of questions and answers about technical, strategic, and
career
development issues.
http://clickthru.online.com/Click?q=97-dlhYQ1M3ZiT7Ksa3y0kCq2ya0sRR
----------------------------------------
BACK BY POPULAR DEMAND
AVOID SENDING DELETED TEXT ALONG WITH YOUR DOCS
Many timesaving features create potential security risks, as is the
case
with Word's Allow Fast Saves option. This setting could be revealing
text you'd rather keep private.
http://clickthru.online.com/Click?q=ac-RbItQ0Uzo8sVZMsdPfqz0JSDkdRR
FIVE WAYS TO SECURE YOUR ORGANIZATION'S INFORMATION SYSTEMS
Securing your network requires help and support from the top of your
organization to the bottom. These TechRepublic resources can help with
everything from writing a security policy to giving net admins the
tools they
need to respond to virus attacks.
http://clickthru.online.com/Click?q=c1-PIFjQpWYB4cATTqw6Ou7OmiUHdRR
----------------------------------------
THIS WEEK'S FEATURED DOWNLOAD
IP ADDRESSING WORKBOOK
If you're ready to organize your network's IP addressing scheme, this
Microsoft Excel workbook can be a valuable companion. It provides a
group
of worksheets for documenting client systems, servers and DMZ systems,
and
Internet hosts.
http://clickthru.online.com/Click?q=d6-yw3KQMP0W6my4NcngI4JwVL4V9RR
Did you know that TechRepublic has more than 400 free downloads in our
Downloads Center? Look for ready-to-use IT forms and templates,
checklists, tools, and white papers.
http://clickthru.online.com/Click?q=eb-HlLoQkD_zhDw_lcdm6VJbZNn99RR
------------------------------------------
TODAY AT TECHREPUBLIC
TAKE A LOOK AT THE LATEST INTEGRATED PDA/CELL PHONE DEVICES
The next generation of handheld devices integrates the functionality of
pagers, cell phones, and PDAs. They can reduce the number of devices
you
need to support and provide your users with fewer devices to carry.
Read
on to find out more.
http://clickthru.online.com/Click?q=01-9oQDI2jmOqhAjlfvhrVZGexBYdRR
DOES YOUR SECURITY PLAN NEGLECT SOCIAL ENGINEERING THREATS?
You've implemented a firewall and locked down your systems, but are
your
employees ready to handle an impersonator trying to manipulate
information out of them over the phone? See how social engineering
threatens IT
and how to protect against it.
http://clickthru.online.com/Click?q=16-T_rjI4c_yIrV6_LDYl4eaHDhqRRR
PERSISTENCE IS OFTEN NEEDED WHEN COLLECTING METRICS
You and your team may think you did a great job on your last project,
but it's sometimes difficult to get a feel for how the clients view
your
latest work. Company culture may be contributing to your frustration.
http://clickthru.online.com/Click?q=2b-2FwYINzVpGYOISzwIkwmBWdXQRRR
----------------------------------------
STAY INFORMED WITH IT NEWS DIGEST
Don't have time to surf the Web looking for all the latest news? Let us
do it for you. We'll send you the top industry headlines each day.
Click
the link to automatically subscribe to the IT News Digest TechMail!
http://clickthru.online.com/Click?q=40-6PL4IdnNk7LWm0leyXaonxqWJ9RR
------------------------------------------
This e-newsletter may contain links to sites on the Internet that are
owned and operated by third parties. CNET Networks, Inc. is not
responsible
for the content of any such third-party site.
Questions or comments:
http://www.techrepublic.com/contact_faqs/techmails.jhtml
Visit TechRepublic
http://www.techrepublic.com/
Copyright 2002 CNET Networks, Inc. All rights reserved. TechRepublic is
a registered trademark of CNET Networks, Inc. TechRepublic Logo is a
trademark of CNET Networks, Inc.