=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TechTarget | Network and Systems Management
Dec. 24, 2003
___________________________________________________________________
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
IN THIS ISSUE | Table of Contents

1. NETWORK AND SYSTEMS MANAGEMENT TIPS
   - Today's Featured Tip: Bayesian filters
   - Working with log files
   - Terminating a system administrator

2. ESSENTIAL LINKS
   - Featured Topic: The hottest topics of 2003
   - Column: IT departments deal with telecommuting in style
   - Poll: What perk do you wish you had at your company?
   - Chapter of the Week: Managing Cisco Network Security
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP

BAYESIAN FILTERS
by Barrie Sosinsky

Spam is a problem that isn't going to go away anytime soon. Even if
governments legislate against it, spammers' ability to adapt makes it
difficult to prevent unwanted messages completely. Over the past year
companies have begun to introduce anti-spam products based on
Bayesian filters. A Bayesian filter evaluates the content of a
message and gives it a score that determines whether it makes it to
your inbox or not.

Learn more about Bayesian filters and where to find them:
http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci942374,00.html?track=NL-314
  

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
WORKING WITH LOG FILES | Barrie Sosinsky
 
System logging is a very important management function. The
information in log files provides statistics for checking security
and network access, insight into system performance and failures, and
a measure of your system's behavior and baseline. All Unix
implementations provide logging functions, and some logs need to be
explicitly turned on to work. As a general rule you should enable
detailed logging and if possible use a central loghost. That is,
while still running local logs it is important to have all messages
mirrored to a central location. You should keep not only system logs,
but if you are running important network applications, logs for those
applications as well.
 
Read the entire tip here:
http://www.searchNetworking.com/tip/1,289483,sid7_gci918712,00.html?track=NL-314

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TERMINATING A SYSTEM ADMINISTRATOR | Mike Chapple

Terminating an employee is one of management's unpleasant tasks. It
can also be a minefield from an IT perspective. You're probably
familiar with your organization's procedures for handling the
termination, resignation or reassignment of a non-technical employee.
You may even have a checklist in place for when a member of the IT
team leaves the organization. But do you have a policy for how to
handle the sudden termination of a key system administrator?

Let's take a look at a few steps you can follow to ease the process:
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci939145,00.html?track=NL-314
 

___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
:::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: 
___________________________________________________________________ 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
THE HOTTEST TOPICS OF 2003 | SearchNetworking.com

What was hot in 2003? We compiled our readers' favorite news, tips,
featured topics and expert Q&As to find out.
http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci941651,00.html?track=NL-314

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NETWORKING COLUMN BY CARRIE HIGBIE | SearchNetworking.com

IT DEPARTMENTS DEAL WITH TELECOMMUTING IN STYLE

While telecommuting is increasing for many reasons, there is no doubt
that it can provide challenges for your IT staff. This column
provides a look behind the latest trends in telecommuting and offers
some solid suggestions for working through the demands on your IT
team.
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci942410,00.html?track=NL-314
 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NEW QUICK POLL | SearchNetworking.com Reader Survey

In the spirit of the holidays, which perk do you wish you had (or had
more of) at your company? Vote here:
http://searchnetworking.techtarget.com/news?track=NL-314  

PREVIOUS POLL RESULTS:
Los Angeles County recently asked technology vendors to eliminate the
terms "master" and "slave" from equipment where one device or
procedure controls another, because they may be considered offensive.
Do you think the terms are offensive?

6%: Yes
93%: No
1%: I'm not sure

Read the latest from your peers on this topic in our sound off
discussions:
http://discussions.techtarget.com/webx?230@@.1dcfeec1!action=postNew&setContentUrl=1   


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 
CHAPTER OF THE WEEK | SearchNetworking.com

MANAGING CISCO NETWORK SECURITY
Chapter one - Evaluating network security threats

Network security is critical to your company. If you're using Cisco
security products in your network, then Managing Cisco Network
Security by Mike Wenstrom is a great place to start. This chapter
will help the reader learn to identify the need for network security,
identify some of the causes of network security problems, identify
some characteristics and motivating factors of network intruders,
identify the most significant network security threats, and choose
countermeasures to thwart network security attacks. 

Download the chapter:
http://searchnetworking.techtarget.com/content/0,290959,sid7_gci913144,00.html?track=NL-314



___________________________________________________________________
****************  CONTACT SEARCHNETWORKING.COM   *****************

E-mail us at mailto:[EMAIL PROTECTED]

Click here for specific contact information and to meet our editorial
team:
http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314

To sponsor this or any other TechTarget newsletter e-mail Gabrielle
DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED]

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media.  http://www.techtarget.com?track=NL-314

Copyright 2003 TechTarget. All rights reserved.
____________________________________________________________________

To unsubscribe from "Network and Systems Management Tip":

Reply to this e-mail with REMOVE in the Subject line
 - OR -
Go to unsubscribe:
http://SearchTechTarget.com/u?cid=474244&track=NL-314
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.


Reply via email to