Title: SearchDomino.com
Published by SearchDomino.com 
searchDominoThis Week
July 06, 2004 >> Receive this e-mail as text  >> About this e-mail 
 In this Issue

>> From the editor:
  • Spam and security advice
  • >> Featured Topic:
  • Readers' choice: Your favorite ND Web sites
  • >> Expert Technical Advice:
  • Featured Expert: Barbara Bowen, Notes/Domino Certification

  • Chapter Downloads:
    >>Chapter 2: Decompiling classes
    >>Chapter 5: Would the real sender please stand up?
  • Tips of the Week:

  • >>Top 10 J2EE (more or less) best practices
    >>Building Domino portlets for WebSphere
    >>Print all attachments using shellExecute in Windows
    >> Site Highlights:
  • Fax & Notes webcast
  • Conference updates
  • Spam white paper

  •  From the Editor:

    by Christine Polewarczyk, Site Editor

    Last week, we premiered our chapter download feature. This week: a new monthly Spam and Security Tip.

    This e-newsletter will provide information on preventing and managing that ever-annoying phenomenon that we call spam, and offer hands-on advice on securing your servers, managing user passwords and IDs, implementing policies, and so forth. Essentially, it will explain how to handle spam and secure your infrastructure from internal and external security threats.

    Even though Domino is a lot more secure than Windows (ain't that an understatement!), there are still security issues related to your systems, as the recent report on Domino's cross-site scripting vulnerability attests. And, as we all know, employees are ultimately a greater security risk than any unknown hackers, Trojans or viruses.

    As for spam, no one escapes its wrath! Mwuahahahahaaaa! But maybe we can help you put a leash on it.

    The first issue of our Spam and Security Tip will be delivered in just a couple of weeks. If you are interested in subscribing to this soon-to-come monthly newsletter, you can use our one-click signup. All you have to do is click on this link, input your e-mail address and hit Enter. Simple as that.

    If you have any feedback on what you'd like to see discussed in this new monthly newsletter, please do not hesitate to send me your ideas.

    Have a great week, everyone!

    ~Christine


     Featured Topic:

    Readers' choice: Your favorite ND Web sites
    by Christine Polewarczyk, Editor

    Some of you thought we had left out some key sites in our recent 'Top 10 sites for Notes/Domino professionals' Featured Topic. So here's round two: 10 more sites you consider must-haves.

    Read more about this topic

     Expert Technical Advice:

    Featured Expert Barbara Bowen
    Category: Domino and Notes Certification

    Dear Barbara:
    I've been working both in development and administration of R5 for four years. I want to become a CLP but I'm not sure if I should go for R5 or ND6. My concern is that R5 would be irrelevant soon. Your thoughts?
    Click here to read Barbara's expert response or ask a question of your own.


    Chapter Downloads
    >> Chapter 2: Decompiling classes
    In this chapter from the book Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, you'll learn how to determine when to decompile, what the best decompilers are, how to decompile a class, what makes decompiling possible, and what potential problems you may run into with decompiled code. Don't forget to take the quick quiz at the end of the chapter to test your reading comprehension!

    >> Chapter 5: Would the real sender please stand up?
    This chapter from the book Canning Spam: You've Got Mail (That You Don't Want), by Jeremy Poteet, describes some simple techniques attackers use to impersonate users or mask their identities, and how you can detect these spoofs. In addition, you'll learn about some of the problems that can crop up when you use certain common techniques to combat e-mail impersonation. For some people, the cure can be worse than the disease. So this chapter covers ways you can deal with this problem in a fashion appropriate for your company's e-mail usage patterns.

    Tip of the Week:
    Top 10 J2EE (more or less) best practices
    Much has been written in recent years about J2EE best practices, including books and articles offering insight into how J2EE apps should be written. To provide some guidance, we've compiled a list of what we believe are the most important of these. Check them out.

    Building Domino portlets for WebSphere
    One way to integrate Domino applications into a WebSphere environment is to create Domino portlets to run in WebSphere Portal. To make it easier, IBM and its partners have created a plethora of pre-built portlets and tools to help Domino developers build portlets that meet their exact needs -- without having to write lots of code.

    Print all attachments using shellExecute in Windows
    This script prints all attachments on a Notes doc's Body field. You do not need to know the attachment names ahead of time, or the app that needs to be invoked to print them.

    >> Check out all our tips

     Site Highlights

    Fax & Notes webcast
    View this featured webcast and learn how you can get rid of your fax machines, and improve both productivity and document security, by integrating fax with IBM Lotus Notes.
    Watch and listen to this webcast.

    Conference updates
    Sign up for Updates on TechTarget Conferences and receive advance notice of upcoming events.
    Sign up now.
    Spam white paper
    Read this white paper now.
    Spammers probe e-mail systems in an attempt to identify and "harvest" legitimate e-mail addresses. This process is called the "silent killer" or "directory harvest attack," and it's a threat that's on the rise. In fact, you may already have fallen victim. Read about ways to prevent future attacks.


    This monthly tip will teach you how to manage spam and keep your systems secure.
    Enter your e-mail and start receiving Spam and Security Tip.
    E-mail
      
    Not a member? We'll activate your membership with your subscription.


    Best Web Links
    Parlez-vous Domino? You can be forgiven for not remembering a foreign language you once learned, but to be a competitor today you'd better be au courant with Java, _javascript_, C and C++. Make it easy on yourself and browse through our listings.
    View the links.


    Tip contest
    We're offering a kickin' new prize -- and a place in the Hall of Fame -- in return for your best tip, trick, timesaver or code. This iRiver Flash MP3 player, complete with FM tuner and voice recorder, can be yours -- but only if you enter the contest. So, let us hear from you today.
    Submit a tip.

    Products & vendors
    Find the ideal antivirus solution in the SearchDomino.com Product & Vendor Guide. Compare products and prices, all in one place.
    Go there now.

      A B O U T   T H I S   N E W S L E T T E R
    TechTarget
    Contact us:
    SearchDomino
    MemberServices
    117 Kendrick Street, Suite 800
    Needham, MA 02494

    This e-newsletter is published by SearchDomino.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
    TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals.
    Copyright 2004 TechTarget. All rights reserved.

    To unsubscribe from "Updates on new site content":

    Go to unsubscribe: http://searchDomino.techtarget.com/unsubscribe?track=NL-200&ad=486198

    Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

    Reply via email to