VNUNet: Linux users warned of new Trojan danger

VNUNet: Linux users warned of new Trojan danger
Also includes links to various other related Linux worm articles
[Linux Today]

A directory of vision statements for Seybold

A directory of vision statements for Seybold. Thanks to everyone for participating. We’re getting ready to mail to all the registered attendees. The room holds 2500 people. I want to fill it with minds on Sept 26. We’re serious about building flow for these ideas. [Scripting News]

Exploiting and Protecting 802.11b Wireless Networks

ExtremeTech – Exploiting and Protecting 802.11b Wireless Networks.

How many network administrators do you think would allow a complete stranger to walk into their wiring closet and plug in their notebook to their company’s network? Not too many, I suspect. But that’s what’s happening to companies coast-to-coast. Well, not exactly. Strangers aren’t plugging into networks, but they are attaching to networks using 802.11b wireless network cards, and that’s essentially the same thing.

[Privacy Digest]

IN-2001-10: “Code Red” Worm Crashes IIS 4.0 Servers with URL Redirection Enabled

IN-2001-11: Cache Corruption on Microsoft DNS Servers

Is StarOffice ready to take on MS Office?

CNET: Is StarOffice ready to take on MS Office?
Perhaps the most significant opportunity for StarOffice is the recent increase in Office licensing costs. Our analysis shows that IT organizations are facing an increase of between 22 percent and 40 percent at the highest discount level.


Bottom line for IT organizations: There are going to be a lot of changes in the productivity market. Find out now what your users actually use–and then plan accordingly.

Lampson: Computer Security in the Real World

Butler Lampson:
Computer Security in the Real World (paper) (slides)
Presented at the Annual Computer Security Applications Conference, 2000.

Robot Unveiled for Brain Operations

Book Review: Web ReDesign: Workflow that Works

Book Review: Web ReDesign: Workflow that Works. Primarily aimed at project managers, this book is designed to streamline the redesign process for everyone involved. The authors’ “Core Process” methodology helps avoid unsightly scope creep to keep your projects on time and on budget. By Andy King. 0905 [WebReference News]

From Hot Concept to Hot Site in Eight Days

From Hot Concept to Hot Site in Eight Days
By James Hong

AmIHotOrNot.com evolved from an idea into one of the biggest sites on the Web in less than two months. Such rapid growth meant the site had to scale quickly, especially in the first eight days.