=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management Jan. 14, 2004 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IN THIS ISSUE | Table of Contents
1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Today's Featured Tip: Snapfiles - Manage your authorizations - Who's watching the watchers? 2. ESSENTIAL LINKS - Article: Expert sheds light on Wi-Fi liability issues - Networking Column: The not-so subtle art of contract negotiation - Chapter of the Week: Open source network administration - Featured Topic: New year, new job? ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP SNAPFILES by Barrie Sosinsky One very nice repository for freeware and shareware Web utilities is the Web site now called Snapfiles.com, found at: http://www.snapfiles.com (recently known as WebAttack.com). This Web site is a repository for a variety of what they term "Internet Tools" including pop-up blockers, spyware catchers, and the like; but it is also useful to network system managers because it offers you some of the better shareware tools for network diagnostics and management. Check out a sampling of some of these tools here: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci944302,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= MANAGE YOUR AUTHORIZATIONS | Barrie Sosinsky All network managers want to delegate as much of their network management functions as possible safely. It isn't only an issue of spreading out the workload (although that's important). Delegation allows people closer to the work in hand to make the necessary customizations and tweaks to make any project run better. Whenever you can enable your knowledge workers with tools, you have a happier and more productive staff. Read the entire tip here: http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci935157,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= WHO'S WATCHING THE WATCHERS? | Mike Chapple Many organizations depend upon content filtering and usage monitoring packages to enforce their acceptable use policies. These packages play two important roles: They deter unacceptable activity by providing users with the knowledge that their activity is being monitored, and they detect unacceptable activity when it does occur. Take a moment to reflect upon the systems that you have in place in your current environment, and then ask yourself - who analyzes the results using what criteria? If you don't have appropriate controls in place, you have a clear vulnerability that is ripe for exploitation. This tip provides you with a few simple steps that you can take to minimize the impact of this vulnerability on your organization: http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci941353,00.html?track=NL-314 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= EXPERT SHEDS LIGHT ON WI-FI LIABILITY ISSUES | SearchNetworking.com If hackers use your Wi-Fi network to download child porn, are you responsible? A tech law expert says it's a complicated issue, but offers advice to keep your enterprise legally protected. Click here for the full story: http://searchnetworking.techtarget.com/qna/0,289202,sid7_gci944124,00.html?track=NL-314 MORE INFORMATION ON THIS TOPIC: Learn how recent Wi-Fi arrests highlight security dangers... http://searchnetworking.techtarget.com/newsItem/0,289139,sid7_gci939175,00.html?track=NL-314 Browse our Topics on security policy and strategy... http://searchnetworking.techtarget.com/bestWebLinks/0,289521,sid7_tax286415,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NETWORKING COLUMN | Carrie Higbie THE NOT-SO SUBTLE ART OF CONTRACT NEGOTIATION Many organizations are outsourcing some or all of their IT department's duties, and as a result contracts are becoming more creative and more complex. Many new terms have come into the picture like value engineering, cost-equivalency value add, and expenditure savings percentage allotments. It takes more then the Webster's dictionary to figure out the new concepts and real benefits. This column gets right down to business by explaining the concepts behind these contract terms: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci944231,00.html?track=NL-314&offer=j.13 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= OPEN SOURCE NETWORK ADMINISTRATION | Chapter of the Week This featured chapter describes MRTG graph bandwidth and other router and network statistics. MRTG produces Web pages that display graphs of bandwidth use on network links on daily, weekly, monthly, and yearly scales. This can be an invaluable tool for diagnosing network problems because it not only indicates the current status of the network but also lets you visually compare this with the history of network utilization. Chapter 3 describes MRTG in detail, with easy instructions for retrieval, installation, configuration, and real-world usage. (This book excerpt is from Chapter 3 of Open Source Network Administration by James M. Kretchmar, ISBN 0-13-046210-1, copyright 2004. All rights reserved. This chapter, titled "MRTG" is posted with permission from Prentice Hall PTR.) http://searchnetworking.techtarget.com/content/0,290959,sid7_gci913144,00.html?track=NL-314 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NEW YEAR, NEW JOB? | Featured Topic Your performance evaluation came and went, and you still didn't get a raise, despite the rebounding economy. Maybe it's time to take a look at the job market or update your skills. http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci943642,00.html?track=NL-314 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314 To sponsor this or any other TechTarget newsletter e-mail Gabrielle DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED] ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This newsletter is published by TechTarget, the most targeted IT media. http://www.techtarget.com?track=NL-314 Copyright 2004 TechTarget. All rights reserved. ____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Reply to this e-mail with REMOVE in the Subject line - OR - Go to unsubscribe: http://SearchTechTarget.com/u?cid=474843&lid=522392&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.