![search400]() ![This Week]() |
![]() |
![]() |
|
|
In this Issue |
![]() |
![]()
| >> |
From the Editor:
Viruses -- Ignorance is not bliss |
| >> |
Featured Topic:
Adding Java to your skills set |
| >> |
Expert Technical Advice:
* Featured Expert: Jim Mason, Web development
* In the Forums: Copy spooled files to a database file
* Administrator Tip: Increase performance by grouping users into separate storage pools |
| >> |
Site Highlights:
* Webcast: UCCnet integration
* Webcast: Sun's Network Computing 04-Q1 Web Event
* Webcast: RPG skills for the new millennium |
![]()
|
|
From the Editor: |
![]() |
![]()
by Michelle Davidson, site editor
![]()
Viruses: Ignorance is not bliss
By now it's old hat for most of us. We've seen enough e-mail viruses and worms go around that we know when you get an e-mail with an unusual subject line you should just delete it.
We've seen e-mails claiming to be from Microsoft saying they have a security patch for us, e-mails claiming they have photos of celebrities and e-mails telling us to update our information on eBay. And all of them had attachments that could infect your computer, as well as your network of computers.
This last time around, the MyDoom virus author got a little trickier. Infected e-mails seemed to come from people you knew and with subject lines of "test", "hi", "status" or something familiar. Still, there was that evil attachment.
But it seems some people do not learn and still they open the e-mail and try to download the attachment, infecting their computer and who knows how many others. This is inexcusable. By now everyone should be aware of possible viruses and keep a look out for e-mails that look even slightly unusual. For example, an e-mail may look like it's from a co-worker, but the From line is a slightly different format or the subject line doesn't seem logical coming from that person.
Because of users' ignorance, IT shops are left scrambling to contain the infection. But still those who weren't infected feel the effects -- e-mails still flood their mailboxes but with the attachment quarantined and legitimate emails with attachments are blocked. It can take a couple weeks for things to get back to normal.
All e-mail users need to understand viruses and be aware of them. If there are users in your company who still don't get it, then it's time to educate them. It can take one ignorant user to disrupt the lives of many.
|
![]()
|
|
Featured Topic: |
![]() |
![]()
![]()
|
|
Expert Technical Advice: |
![]() |
![]()
![]()
|
This Week: In the forums
|
| >> |
Copy spooled files to a database file
"Getitright" needed a way to copy several spooled files to a database file. He wanted to set up a CL to do it, but didn't know how to proceed. A few other users had some ideas.
|
| >> |
Automate SSL setup
Is there any way to automate the SSL setup bypassing the DCM interface? Yes, says site expert Jim Mason, here's how.
|
| >> |
Tivoli on the iSeries
"Jaws" asks, "Has anyone set up Tivoli on the iSeries? We are looking into using Tivoli to back up all our LPARs, and I was wondering if this is cost-effective and what the process is to set it up." Click over if you've worked with Tivoli solutions before. |
![]()
| Tip of the Week: |
Increase performance by grouping users into separate storage pools -- Part I
by Ron Turull
In the last several installments, we've taken a look at how to monitor your system's performance and the basics behind tuning your system. Now, we will look at some specialized tuning techniques that can make the difference when trying to get your system fall within standard performance levels. |
| >> |
Read full tip |
![]()
|
|
Site Highlights |
![]() |
![]()
![]() |
Webcast: UCCnet integration
UCCnet + Integration = Maximum benefits for suppliers
Log on Wednesday, Feb. 11 at 2 p.m. EST (19:00 GMT) and learn how to make the right choice for your company's UCCnet initiative, rather than one that will haunt you for years to come.
Register now
Sponsored By: EXTOL International
![]()
Webcast: Sun's Network Computing 04-Q1 Web Event
Attend Sun's quarterly Web event on Wednesday, Feb. 11 at 3 p.m. EST (20:00 GMT) and ask Sun CSO Mark Tolliver your top network computing questions.
Register now
Sponsored By: Sun Microsystems
|
![]() |
![]() |
![]() |
Webcast Premiere
RPG skills for the new millennium
Date: Tuesday, Feb. 10, 9 a.m. (14:00 GMT)
Speaker: Paul Tuohy, CEO ComCon and author of Re-engineering RPG Legacy Applications
Join us as RPG programming expert Paul Tuohy outlines what is needed to prepare applications for the modern era. Learn what the programming requirements are as you move away from "green screen" and how RPG fits in.
Sponsored By: Advanced Systems Concepts
|
![]() |
![]()
|
![]() |
![]()
![]() |
|
Update your subscriptions
|
![]() |
| Select newsletters you would like to receive from the list below. |
![]() |
|
Daily News |
|
Administrator Tips |
|
Programmer Tips |
|
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
| WebSphere Strategies |
Measuring the performance of Web applications
by Jim Mason
When working on a project, it's important that you have the assurance that your applications will perform well in production under various load scenarios. Don't overlook the need to performance-engineer Java Web applications. |
Read full tip |
|
![]()
![]()
| Career crisis? |
| Visit Search400.com's Career Center today to see what job opportunities are available, as well as what salary you should expect. |
Go there now |
|
![]()
| IT specialists only |
| More than 2,600,000 IT specialists have used www.FreeTechMail.org to find and subscribe to Information Technology newsletters. Why? It's convenient and easy, and you'll find only the best. |
Visit today |
|
![]()
|
![]() |
![]() |
|