Did The Wall Street Journal sabotage your IT department?
Your IT department may be at risk, thanks to a recent article in The Wall Street Journal. TechRepublic's Jason Hiner characterizes The Wall Street Journal's tips for circumventing IT as dangerous and irresponsible and says that many of them could have very negative consequences for businesses, IT departments, and users. Here's how these "tips" could jeopardize your IT systems.
Subscribe to TechRepublic's Blogs RSS Feed
New at TechRepublic
My favorite tool to improve productivity
John McKee: "In most cases, 'global, one-size-fits-all' productivity solutions sound seductively easy to employ but then won't help. Success in an organization has as much to do with the interpersonal dynamics and leadership as it does with processes and procedures. Maybe more. Here's how to plan your work and work your plan."
Apple's new slogan, "The Hip Factor"
Steven Warren: "In the corporate world, I need a Windows machine. I enjoy my Windows machine. I love the Apple hardware, and I love Windows Vista on this hardware, and now I have the best of both worlds. Windows Vista on some sweet hardware and Tiger OS X as well."
Can your wireless network be sidejacked?
Security experts Robert Graham and David Maynor, in a paper presented at the Black Hat 2007 security conference, claim that many Web applications may be vulnerable after the initial logon takes place. The vulnerability involved the infamous cookie, session ID, and the information they provide.
Explore the Nslookup.exe tool in Windows 2000 Server
The primary troubleshooting tool for DNS included with Windows 2000 Server and other DNS implementations is Nslookup.exe. This tool can be used to perform DNS queries, obtain detailed information from the command prompt, and debug DNS problems.
Check out Today in Blogs on TechRepublic.
Community Crossfire
10 tech skills you should develop over the next five years
Dr_Zinj: "Spot on with unified communications and increased hybridizing networks. Although I wouldn't have even listed VoIP separately, as I think it rolls into the unified communications prediction. I'd also roll the mobile user support into the wireless category; they kind of go hand in hand."
Microsoft tests free Works software with embedded advertising
Lea Rush: "Will you recommend [this software] to users who come to you, wanting to add suite functionality to their home machines, in lieu of Open Office or free online software services?"
I am "smolten" with Linux!
linuxchic: "You could always add your machines at The Linux Counter: http://counter.li.org/. You can do it manually or with scripts. I have been counting my machines for years."
Editor's picks
Determining total cost of ownership for data center and network room infrastructure
This white paper from APC describes an improved method for measuring TCO of data center and network room physical infrastructure and relating these costs to the overall IT infrastructure.
Integrated disaster recovery for transactional applications and data
This NEC white paper describes the technology behind NEC ExpressCluster WAN, an integrated disaster recovery solution that's specially designed to protect critical transactional applications and data in the event of a hardware, software, or site failure.
Cognos Go! Mobile provides BI on the move
Check out this on-demand Webcast to learn about Cognos Go! Mobile, a solution that helps companies become more agile and competitive by giving users anywhere, anytime access to business intelligence (BI). (Sponsored by Cognos)
TechRepublic's VoIP
This newsletter features tutorials, product and software reviews, and tips and tricks to help you plan or optimize your VoIP deployment. We'll cover the big players such as Nortel, Avaya, and Cisco, along with VoIP services to consider for telecommuters, mobile workers, and sales agents. Click the "Sign Me Up" button to automatically subscribe.
White Papers from our partners