Sunday, July 24, 2005

Use Gmail as a Storage Device

GMail Drive is a Shell Namespace Extension that creates a virtual filesystem around your Google GMail account, allowing you to use GMail as a storage medium.

GMail Drive creates a virtual filesystem on top of your Google GMail account and enables you to save and retrieve files stored on your GMail account directly from inside Windows Explorer. GMail Drive literally adds a new drive to your computer under the My Computer folder, where you can create new folders, copy and drag'n'drop files to.

Ever since Google started to offer users a GMail e-mail account, which includes storage space of a 1000 megabytes, you have had plenty of storage space but not a lot to fill it up with. With GMail Drive you can easily copy files to your GMail account and retrieve them again. When you create a new file using GMail Drive, it generates an e-mail and posts it to your account. The e-mail appears in your normal Inbox folder, and the file is attached as an e-mail attachment. GMail Drive periodically checks your mail account (using the GMail search function) to see if new files have arrived and to rebuild the directory structures. But basically GMail Drive acts as any other hard-drive installed on your computer. You can copy files to and from the GMail Drive folder simply by using drag'n'drop like you're used to with the normal Explorer folders.

www.viksoe.dk/code/gmail.htm

Wednesday, July 20, 2005

10 STEPS TO FASTER SQL SERVER BACKUPS

These days, a 100 GB database is considered the norm, and manydatabases are beginning to surpass the terabyte range. ContributorGreg Robidoux looks at 10 ways to achieve faster SQL Server backups.

http://searchsqlserver.techtarget.com/tip/1,289483,sid87_gci1108661,00.html?track=NL-464&ad=522786USCA

CONFIGURE GROUP POLICY TO PREVENT ATTACKS

This list of critical Group Policy settings will help you lock downWindows against security threats, whether you want to thwartautomated password cracking attacks, enable audit logging or simplyforce attackers to jump through more hoops.Click here for the tip:

http://searchwindowssecurity.techtarget.com/tip/1,289483,sid45_gci1108549,00.html?track=NL-122&ad=523005USCA

Read about 10 attacks you can easily avoid with Group Policy

http://searchwindowssecurity.techtarget.com/tip/1,289483,sid45_gci1087876,00.html?track=NL-122&ad=523005USCA

Get a list of common audit log settings

http://searchwindowssecurity.techtarget.com/tip/1,289483,sid45_gci1033853,00.html?track=NL-122&ad=523005USCA

IFX FORUM EXPECTED TO UNVEIL WEB SERVICES WORK

At its quarterly meeting next week, the financial services standardsgroup is poised to deliver four Web services reference implementations.

http://searchwebservices.techtarget.com/originalContent/0,289142,sid26_gci1108743,00.html?track=NL-110&ad=518331

IBM GETS READY TO PULL THE PLUG ON OS/2

Touted at one time as "better Windows than Windows," IBM'slong-in-the-tooth desktop operating system is about to reach the endof the line.Click here for the article:

http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci1108087,00.html?track=NL-118&ad=523013

FREEWARE TOOL LOGS FILE SYSTEM EVENTS

Ever wish Windows could "watch" a given file and "act" if it'smodified? Now it can with FileNotify.

http://searchwinsystems.techtarget.com/tip/0,289483,sid68_gci1107660,00.html?track=NL-120&ad=523152

EASY WEB SERVICES WITH SQL SERVER 2005 HTTP ENDPOINTS

By leveragingHTTP endpoints and SOAP in SQL Server 2005, developers can bypass IIS and use SQL Serverdirectly to expose Web services and simplify their applications.

http://nl.internet.com/ct.html?rtr=on&s=1,1rf7,1,3v0p,5l2y,es0i,hcik

BUILD RICH WEB APPLICATIONS WITH OPENLASZLO

OpenLaszlo, an open sourceframework for creating dynamic and highly interactive Web applications, makes your (andend users') life easier by using the ubiquitous Flash runtime on the client side. Findout how to get started building RIAs with OpenLaszlo.

http://nl.internet.com/ct.html?rtr=on&s=1,1rf7,1,i9ei,8yek,es0i,hcik

AJAX: A FRESH LOOK AT WEB DEVELOPMENT

AJAX enables a dynamic, asynchronous Web experience without the need for page refreshes.Find out how this combination of technologies that you already know and love can reinventyour Web development.

http://nl.internet.com/ct.html?rtr=on&s=1,1rf7,1,6zm2,8he2,es0i,hcik

Listing Your TCP Connections

Do you ever worry that someone or something has external access to your system, or wish that you could see all current connections? While its not the most elegant way of doing so, the netstat command can certainly work for you. To use it, simply go to
Start -> Run and type in cmd (or if you use Windows 95/98, type in ?command?). When the command prompt opens, type in netstat -a. This lists all of your active connections for all protocols. If you wish to view only open TCP connections, type in netstat -p tcp. When the connections are displayed, from the left to the right is the Protocol, your address and port, the foreign address and port (or who you are connected to), and the connection state. When investigating for the existence of worms, Trojan horses, and spyware, netstat can prove to be a very useful tool!

INSURANCE IS LEADING SERVICE-ORIENTED ARCHITECTURE DEVELOPMENTS

The European insurance industry has been singled out as a forerunner in the adoption of service-oriented architecture (SOA). SOA is a modular approach to building the IT infrastructure. A new report from Datamonitor, "Distribution dynamics in European insurance," makes the claim that the insurance industry is an SOA pioneer. Read about the insurance industry business model and why it favors SOA development in IT.

http://techrepublic.com.com/5100-10878_11-5795262.html?tag=nl.e069

TRIM TIME IN OUTLOOK WITH 80 SHORTCUTS

80+ KEYBOARD SHORTCUTS TO MOVE FASTER IN MICROSOFT OUTLOOK This handy, three-page table lists more than 80 keyboard shortcuts and their corresponding functions for Microsoft Outlook. Download and print this time-saving document and post it near your keyboard for at-a-glance help when you need to quickly send messages, schedule meetings, organize your calendar, manage your contacts, and more.

http://ct.techrepublic.com.com/clicks?c=302875-993479&brand=techrepublic&ds=5&fs=0

OPEN SOURCE TOOL DOES MORE THAN WIPE DISK CLEAN

If you want to erase a hard drive, DBAN fits the bill. The freewaredoesn't require a host OS or special drivers, but it does let youconfigure the number of wipe passes.

http://searchwinsystems.techtarget.com/tip/0,289483,sid68_gci1107769,00.html?track=NL-120&ad=523159

VOIP ON A BIKE

A bicycle-powered, Linux-based VoIP system: not your usual high-techarchitecture. But what if you were one of the more than 1 billion peopleliving without electricity? No power, no phone.

http://newsletter.infoworld.com/t?ctl=E44DF4:351E2F9

Wednesday, July 13, 2005

Occasional XSLT for Experienced Software Developers

Although using XSLT to process XML is increasingly common, most developers still use it only occasionally—and often treat it as just another procedural language. But that's not the best way to use XSLT. Learn how to simplify and improve your XSLT processing using event-driven and declarative techniques.

url-> http://www.devx.com/xml/Article/28610/1954?pf=true

Monday, July 11, 2005

Windows Key Shortcuts

Here are some uses of the Windows key present on many modern keyboards:

Windows Logo -Display or hide the Start menu
Windows Logo+BREAK - Display the System Properties dialog box
Windows Logo+D - Display the desktop
Windows Logo+M - Minimize all of the windows
Windows Logo+SHIFT+M - Restore the minimized windows
Windows Logo+E - Open My Computer
Windows Logo+F - Search for a file or a folder
CTRL+Windows Logo+F - Search for computers
Windows Logo+F1 - Display Windows Help
Windows Logo+ L -Lock the keyboard
Windows Logo+R - Open the Run dialog box
Windows Logo+U - Open Utility Manager

Thursday, July 07, 2005

FEND OFF THE NEXT SQL INJECTION ATTACK WITH A PROPERLY SECURED DATABASE

As long as Web applications provide access to data, SQL Injection will continue to be a threat. However, you can greatly reduce this threat by scrubbing the input, limiting the use of dynamic SQL, and properly configuring permissions on database servers. Using the WebGoat security tutorial application, this download shows you how to test your systems for SQL Injection vulnerabilities and prevent exploitation by malicious attackers.

http://ct.techrepublic.com.com/clicks?c=274564-993479&brand=techrepublic&ds=5

DETERMINE WHEN TO USE STORED PROCEDURES VS. SQL IN THE CODE

Tony Patton discusses the merits of stored procedures versus placing SQL directly in the code. Find out which one is best for your particular.

http://ct.builder.com.com/clicks?c=274823-993479&brand=builder&ds=5

UTILIZING THE DEBUGGER IN QUERY ANALYZER

DEBUGGING STORED PROCEDURES IN SQL SERVER'S QUERY ANALYZER When Arthur Fuller learned that one of his colleagues was unaware that there was a debugger built into SQL Server's Query Analyzer, he figured that other developers may be in the dark about this great feature. Find out how to get the most benefit out of the debugger.

http://ct.builder.com.com/clicks?c=274822-993479&brand=builder&ds=5

Rootkit Scanner

Rootkits are a special kind of software tool used to hide trojans, viruses and other malware from your anti-virus scanner and other security products. Unfortunately there are extremely effective which means that some of you reading this will be infected even though you believe your PC to be totally clean. Thankfully there is a new class of security product now available called rootkit detectors that use specialized techniques to detect these dangerous intruders. Most of these detectors require quite a bit of technical skill to interpret the results but one of the simplest to use and most effective is also free. It's called BlackLight and is currently available as a free beta from F-Secure until the 1st of October 2005. I suggest everyone download this product and scan their PC. The chances of you being infected are small but for five minutes work it's not worth taking the risk.

www.f-secure.com/blacklight/cure.shtml

Wednesday, July 06, 2005

US aims Star Trek ray guns at nuclear sites

US scientists have unveiled details of a project that aims to develop Star Trek-style ray guns that could keep "security adversaries" out of Department of Energy (DoE) nuclear sites.

http://www.vnunet.com/vnunet/news/2139292/aims-star-trek-ray-guns-nuclear

WINDOWS SERVER 2003 SERVICES THAT CAN BE DISABLED

One of the most effective ways to secure Windows Server 2003 is to turn off unnecessary services. This detailed Excel spreadsheet lists 102 Windows Server 2003 services, describes each service's function, specifies whether you can safely disable the service, and outlines the ramifications of doing so. The spreadsheet also lists each service's default configuration for specific server roles--domain controller, DHCP server, File server, mail server, and so forth.

http://ct.techrepublic.com.com/clicks?c=270524-993479&brand=techrepublic&ds=5

Adding Table of Contents in Word 2003

First, create a backup copy of your document ("Save As..." then reload the original document).
If you have not already written your Microsoft Word 2003 document in outline mode, then you need to signify what text should be mentioned in the table of contents. Highlight the document text that you want to show up as table of contents major sections. Then, hold down CONTROL, ALT, and the 1 key. This will change that text's style to what is called Heading 1. This text stands out from the rest of the text and is good for signifying major sections of the document.
Depending on your document, you may have sub-headers and sub-sub-headers. Highlight text and press CONTROL-ALT-2 to make it a sub-header, and highlight text and press CONTROL-ALT-3 for Microsoft Word 2003 to make it a sub-sub-header.

Once you have your document headers ready (or if you wrote your document in outline mode), it's time to add a table of contents. Scroll to the top of your document and select "Insert", "Reference", "Indexes and Tables".

When the "Indexes and Tables" multi-tabbed dialog box appears, select the "Table of Contents" tab. Press "OK", and your table of contents is ready!

When you change your Microsoft Word 2003 document, you need to update your table of contents to reflect new headings and/or page numbers. Just right-click on it and choose "Update Fields". An "Update Table of Contents" dialog box may appear. If it does, select "Update entire table" and press "OK".

This page is powered by Blogger. Isn't yours?