Datamation Logo
Home
Authors
Posts by Jacqueline Emigh
Jacqueline Emigh

Jacqueline Emigh

A Push For New Security Benchmarks

Security
April 15, 2002

A large consortium of users, vendors, and insurers known as the Center for Internet Security (CIS) this week will hold a meeting to promote standard security settings for Microsoft’s Windows 2000. Meanwhile, the group is testing products from Symantec, BindView, NetIQ, and other companies for use with its own emerging set of template-based benchmarks, meant […]

Novell’s Sketchy Survival Strategy

ERP
March 27, 2002

To fend off growing competition from Microsoft’s Windows 2000, Linux, and other network operating environments, Novell has begun to articulate a new product roadmap and “solutions” strategy. Under its emerging “solutions” approach, Novell hopes to shore up its market position by selling products and services that work with each other to solve “business problems.” says […]

LSB — Can It Help Network Managers Cope With Linux?

Networks
February 19, 2002

An emerging standard called Linux Standard Base (LSB) is getting lots of play lately as a boon to software developers. If all goes as planned, though, network managers could start benefiting, too, possibly as early as the end of this year. Linux continues to draw criticism for its interoperability, scalability, and usability issues. Nonetheless, growing […]

Surfing For Security Policies

Security
January 26, 2002

In the aftermath of September 11, organizations everywhere are shoring up their security defenses. If you’re a network manager, chances are good that you’ll be called upon to either set up security policies or to update existing policies. Luckily, there are some free resources available on the Web to help you out. This month, the […]

Driveby Hacking on the Go, Part 2

Security
January 7, 2002

Previous article: Driveby Hacking on the Go, Part 1 Right now, a lot of war driving is apparently still being done just for fun. Driveby hackers catch a bit of free Internet access, or eavesdrop on e-mail. However, if left wide open, the security holes in wireless networks carry the potential for much more serious […]

Driveby Hacking on the Go

Security
January 4, 2002

How did Frank Keeney, a California-based security consultant and war driving convert, spend his recent vacation? With his wife and kids along for the ride, Keeney used a laptop, rigged up in the back of his SUV, to map access points to home and corporate wireless LANs all the way from Pasadena to San Francisco. […]

Page 6 of 6
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.