Saturday, July 19, 2003

The Bouncer -- Prevent other sites from linking to a page on your site.
If you have a page on your site (such as a music archive) that you don't want other sites to directly link to, but you want them to link to your main page, The Bouncer will make sure that no longer happens. It will redirect any user that isn't coming from your site, to the URL of your choice.
http://www.smarterscripts.com/bouncer/

Friday, July 18, 2003

Program focuses on security response
The Computer Emergency Response Team (CERT) Coordination Center, a security-incident clearinghouse, introduced on Monday a program to certify information technology professionals in incident handling and response.

The certification program will train participants in how to react to security incidents and network intrusions. Those people who take five courses, including an elective, and pass a test administered by the Software Engineering Institute will be granted a Certified Computer Security Incident Handler Certification (CCSIHC). The Software Engineering Institute is part of Carnegie Mellon University and manages the CERT Coordination Center.

http://zdnet.com.com/2100-1105_2-1025613.html
Microsoft bolsters Web services security
Microsoft released on Tuesday a toolkit designed to help software programmers tighten security in Web services applications.
The toolkit, called Web Services Enhancements (WSE) version 2, will let companies use the latest security capabilities from Microsoft and other software giants like IBM and Sun Microsystems. The software makers are bolstering security in an effort to drive adoption of Web services software.

Web services are a set of programming conventions and XML-based standards for building applications that can share information easily. Businesses are currently using Web services as a way to transport data between disparate systems. But tighter security for data transmitted via the Internet and private networks remains a barrier to wide-scale usage, according to analysts and customers.

WSE version 2 is designed to simplify the process of securing communications between parties and of ensuring the identity of people in a business transaction, according to Microsoft executives. The toolkit implements a number of security-related specifications that were co-authored by Microsoft, including WS-Policy, WS-SecurityPolicy, WS-Trust, WS-SecureConversation and WS-Addressing.

These published specifications, which are not yet widely adopted industry standards, are designed to work with Web Services Security, another Microsoft-backed security specification now being standardized at OASIS, the Organization for the Advancement of Structured Information Standards.

WSE version 2 is available from Microsoft's developer Web site. http://msdn.microsoft.com

http://zdnet.com.com/2100-1105_2-1025441.html

Thursday, July 17, 2003

HTML Utopia: Chapter 5: Building the Skeleton
Most books on CSS begin by teaching you how to deal with the bits and pieces of a Web page: fonts, colors, lists, and the like. Then, they move on to explaining the broader issues associated with CSS Positioning (CSS-P), which affect the layout of pages rather than the appearance of individual elements.

This chapter focuses specifically on creating the basic structural layout of a Web page or site using CSS. In it, I’ll discuss multi-column layouts—both in general and very specifically—as they relate to the Footbag Freaks site. I’ll teach you about boxes, borders, and the famous Box Model of CSS design. I’ll delve into the intricacies of creating and using two- and three-column page layouts, and into the mysteries of floating objects. I’ll guide you through the process of creating dummy layouts for the pages you’ll encounter in the Footbag Freaks project, and in other projects you may create.


http://www.webreference.com/programming/css_utopia/chap5/
Converting Java to C#
The Java Language Conversion Assistant (JLCA) is a tool that provides the ability to convert Java code and library calls to Microsoft Visual C# .NET. Built based on the ArtinSoft migration technology, this second version adds a number of additional features to its abilities. This includes the ability to convert code from both the client and the server. Developers will be able to convert Web as well as Windows®-based applications. Java Server Pages and Java servlets can also be converted to ASP.NET.

The JCLA integrates with Visual Studio .NET. Because the conversion process is fully contained, once you have run the process, you are ready to start using Visual C# with your application.

Version 2 provides a number of new features over the previous version. This includes the ability to convert Java Server Pages (JSP), Windows Foundation Classes (WFC), and Abstract Windowing Toolkit (AWT) applications. There is also additional support for applet projects, which can now be converted to Window user controls that can be hosted in a browser. There is additional support for some of the Java APIs. For example, the 1.2 Collections API will now convert to the .NET collection classes. Finally, the new version of the JLCA will support reading and writing Unicode and localized applications.

To support the release of JLCA 2.0, Microsoft has also published a JSP to ASP.NET Migration Guide, which provides a comprehensive set of resources to aid in a migration to ASP.NET. More information can be found at http://msdn.microsoft.com/asp.net/using/migrating/jspmig/default.aspx. For more information on the JLCA 2.0 and for information on downloading it, you can go to http://msdn.microsoft.com/vstudio/downloads/tools/jlca/.


http://www.developer.com/java/other/article.php/2235411

Wednesday, July 16, 2003

Wi-Fi pushes beyond the laptop
Manufacturers are adding Wi-Fi wireless connections to media adapters that let home electronics equipment play music or show photos stored on personal computers.

http://zdnet.com.com/2100-1103_2-1025407.html
When to use different Active Directory Models
Windows 2000 makes it possible to configure the enterprise in a great number of ways. Since no two enterprises are identical, successful deployment is based on an understanding of how to employ Active Directory's flexibility, scalability and granularity. This article explores the relative advances of different domain models, the use of organizational units and basic site considerations.

http://www.windowsadvantage.com/trenches/03-13-00_admodels.asp

Tuesday, July 15, 2003

Monday, July 14, 2003

Want some free antivirus software? Click here
HERE'S THE DEAL: The folks at Panda Software have long offered their antivirus and firewall software to IT professionals for free, in the hopes that someday those pros will buy the enterprise versions for their companies or at least become familiar with the Panda brand.

Last Thursday, the Panda people told me they'd extend that same offer to AnchorDesk readers. I wanted to pass that along to you as soon as I could, to give you the chance to get the software before Panda comes to its senses and rescinds the offer.

Getting the software will require a little, um, creativity on your part. But before I get to the how, let me explain the why.…

If you would like to download a free, fully functional copy of the software, which automatically updates itself daily, start by going here. http://www.w2knews.com/panda/download.cfm?ref=inn3107 There, you'll find a form that asks you to "prove" you're an IT professional.

If you aren't an IT pro and feel queasy about pretending that you are, please note that many of us have been doing this for years, faking qualification cards to get free magazine subscriptions. Also, you'll be spoofing with the permission of Panda's marketing department: The Panda execs I met with said they are perfectly OK with AnchorDesk readers spoofing their form to get the software.

I recommend unchecking the "Subscribe to W2KNews" link at the bottom. You can't uncheck a box that says Panda will be sending you promotional materials. You can, however, enter a bogus e-mail address, like reader@coursey.com if you like.


http://www.zdnet.com/anchordesk/stories/story/0,10738,2914249,00.html