=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management Dec. 24, 2003 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IN THIS ISSUE | Table of Contents
1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Today's Featured Tip: Bayesian filters - Working with log files - Terminating a system administrator 2. ESSENTIAL LINKS - Featured Topic: The hottest topics of 2003 - Column: IT departments deal with telecommuting in style - Poll: What perk do you wish you had at your company? - Chapter of the Week: Managing Cisco Network Security ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP BAYESIAN FILTERS by Barrie Sosinsky Spam is a problem that isn't going to go away anytime soon. Even if governments legislate against it, spammers' ability to adapt makes it difficult to prevent unwanted messages completely. Over the past year companies have begun to introduce anti-spam products based on Bayesian filters. A Bayesian filter evaluates the content of a message and gives it a score that determines whether it makes it to your inbox or not. Learn more about Bayesian filters and where to find them: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci942374,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= WORKING WITH LOG FILES | Barrie Sosinsky System logging is a very important management function. The information in log files provides statistics for checking security and network access, insight into system performance and failures, and a measure of your system's behavior and baseline. All Unix implementations provide logging functions, and some logs need to be explicitly turned on to work. As a general rule you should enable detailed logging and if possible use a central loghost. That is, while still running local logs it is important to have all messages mirrored to a central location. You should keep not only system logs, but if you are running important network applications, logs for those applications as well. Read the entire tip here: http://www.searchNetworking.com/tip/1,289483,sid7_gci918712,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TERMINATING A SYSTEM ADMINISTRATOR | Mike Chapple Terminating an employee is one of management's unpleasant tasks. It can also be a minefield from an IT perspective. You're probably familiar with your organization's procedures for handling the termination, resignation or reassignment of a non-technical employee. You may even have a checklist in place for when a member of the IT team leaves the organization. But do you have a policy for how to handle the sudden termination of a key system administrator? Let's take a look at a few steps you can follow to ease the process: http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci939145,00.html?track=NL-314 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= THE HOTTEST TOPICS OF 2003 | SearchNetworking.com What was hot in 2003? We compiled our readers' favorite news, tips, featured topics and expert Q&As to find out. http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci941651,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NETWORKING COLUMN BY CARRIE HIGBIE | SearchNetworking.com IT DEPARTMENTS DEAL WITH TELECOMMUTING IN STYLE While telecommuting is increasing for many reasons, there is no doubt that it can provide challenges for your IT staff. This column provides a look behind the latest trends in telecommuting and offers some solid suggestions for working through the demands on your IT team. http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci942410,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NEW QUICK POLL | SearchNetworking.com Reader Survey In the spirit of the holidays, which perk do you wish you had (or had more of) at your company? Vote here: http://searchnetworking.techtarget.com/news?track=NL-314 PREVIOUS POLL RESULTS: Los Angeles County recently asked technology vendors to eliminate the terms "master" and "slave" from equipment where one device or procedure controls another, because they may be considered offensive. Do you think the terms are offensive? 6%: Yes 93%: No 1%: I'm not sure Read the latest from your peers on this topic in our sound off discussions: http://discussions.techtarget.com/webx?230@@.1dcfeec1!action=postNew&setContentUrl=1 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= CHAPTER OF THE WEEK | SearchNetworking.com MANAGING CISCO NETWORK SECURITY Chapter one - Evaluating network security threats Network security is critical to your company. If you're using Cisco security products in your network, then Managing Cisco Network Security by Mike Wenstrom is a great place to start. This chapter will help the reader learn to identify the need for network security, identify some of the causes of network security problems, identify some characteristics and motivating factors of network intruders, identify the most significant network security threats, and choose countermeasures to thwart network security attacks. Download the chapter: http://searchnetworking.techtarget.com/content/0,290959,sid7_gci913144,00.html?track=NL-314 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314 To sponsor this or any other TechTarget newsletter e-mail Gabrielle DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED] ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This newsletter is published by TechTarget, the most targeted IT media. http://www.techtarget.com?track=NL-314 Copyright 2003 TechTarget. All rights reserved. ____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Reply to this e-mail with REMOVE in the Subject line - OR - Go to unsubscribe: http://SearchTechTarget.com/u?cid=474244&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.