SPONSORED BY: SearchWin2000.com Career Center
![]()
Looking for a new job? Visit the SearchWin2000.com Career Center powered by Dice and find over 37,000 tech positions to choose from. And get the career resources you need to set yourself apart from other job seekers. Find training and certification resources, get help with your resume and more. Visit today!
![]()
Click here to visit the Career Center today!
|
|
On hiring a virus writer
By Ira Winkler, Contributor
![]()
I have to admit that I'm happy that a previously unknown firewall company hired the author of the Sasser and Netsky worms. While many people are outraged, as they should be, there are a few things that have been brought to the forefront that would've otherwise been ignored.
In the first place, we now know the true colors of a firewall vendor. Personally, I had never heard of SecurePoint before this incident. Maybe it is more popular in Europe; however, I don't know of any companies that use its products.
Why would SecurePoint hire a person who intentionally caused hundreds of millions of dollars in damage? (Yes, it is intentional as the results of releasing a virus, let alone two, are well known.) Well, they have given two answers. First, SecurePoint claims that it wants to give him a second chance. When quoted in other stories, however, company officials say that he has unique knowledge.
Click here to read more about SecurePoint's hiring of the teen-age creator of the Sasser worm.
|
![]() |
|
|
Survival Tips for the Windows Manager |
|
![]()
Windows security strategy
Unless managing a few Windows boxes is your full-time job, if you want to have any hope of keeping them secure, you have to have a well-reasoned strategic approach. The most important input to this strategy is an understanding of attack vectors and how they change.
Featured Topic: Managing Active Directory -- 10 tips in 10 minutes
So, you've designed, tested and rolled out Active Directory. Now what? Here are 10 tips and expert advice to help you with AD administration and maintenance.
Chapter of the Week: 'Building your defense strategy'
The old Windows 2000 Encrypting File System (EFS) received a substantial update in Windows .NET, but there are many gotchas to be aware of. This chapter, from the book "Windows Internet Security: Protecting Your Critical Data," by Cyrus Peikari, provides a thorough walk-through on how to create an impenetrable moat around your system using the features of .NET EFS.
TRUE IT BLOOPERS
Oops! True IT Blooper #155: Someone call 911, my floppy has a virus!
![]()
Do you remember the early 1990s? It was that decade when Tonya Harding was a household name, grunge was in and floppy disks littered the area around your desk. If these blasts from the past aren't enough to make you feel old, this computer systems manager's story will, because it takes place back in the days when viruses were still fairly unheard of....
|
|
![]() |
![]() |
|
|
Vent! |
|
What do you think of Sender ID now that it's been rejected by the open source community and the IETF disbanded its related working group?
Take our latest poll and sound off. |
![]() |
![]() |
|
Member Surveys
|
![]() |
| Enter your e-mail and start receiving Member Surveys. |
![]() |
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
![]()
SENIOR NEWS EDITOR
John Hogan
[EMAIL PROTECTED]
Send me your news, press releases and product announcements.
![]()
SENIOR SITE EDITOR
Marilyn Cohodas
[EMAIL PROTECTED]
Send me your original articles and best practices.
![]()
SITE SALES MANAGER
Mike Kelly
[EMAIL PROTECTED]
Contact me to sponsor this or any other TechTarget newsletter.
|
|
|