MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Linux Journal
August 2000
Michael A. Schwarz
Take Command klogd: The Kernel Logging Daemon mark for My Articles similar articles
JavaWorld
April 2001
Nate Sammons
Robust event logging with Syslog Because event logging is often an afterthought, Java developers often ignore this task while programming. However, logging allows developers to instrument their code so the operations staff can deal with any problems that arise... mark for My Articles similar articles
Linux Journal
October 1, 2002
Mick Bauer
Paranoid Penguin: Stealthful Sniffing, Intrusion Detection and Logging Attackers can't rewrite your log files if they can't connect to the log server. Learn the ways of stealth. mark for My Articles similar articles
JavaWorld
November 2000
Ceki Gulcu
Log4j delivers control over logging Log4j, an open source project, allows Java developers to control which log statements are output with arbitrary granularity. It's fully configurable at runtime by using external configuration files. Best of all, log4j has a gentle learning curve. Beware: judging from user feedback, it is also quite addictive. Project founder Ceki Gulcu describes the log4j API, its unique features, and its design rationale. mark for My Articles similar articles
JavaWorld
September 2001
Sunil Kumar & Nitin Nanda
Log it or lose it How to enable a Java application to log messages to the NT Event Log... mark for My Articles similar articles
Linux Journal
April 2000
Gaelyne R. Gasson
Web Analysis Using Analog Every web site needs a way to get accurate statistics--here's a freely available program to give you that information. mark for My Articles similar articles
RootPrompt.org
May 17, 2000
Lance Spitzner
Watching Your Logs How to automate the filtering of your logs, freeing up your time while alerting you with the information you need. mark for My Articles similar articles
Search Engine Watch
October 5, 2010
Gary-Adam Shannon
Twitter Exploit Warning: How Anyone Can Easily Snatch Your Direct Messages It's quite easy to use the Twitter API to access your personal information and obtain all the dirty little secrets hidden inside your Twitter inbox. mark for My Articles similar articles
InternetNews
August 31, 2010
Google Adds Auto-Filtering Feature to Gmail Google's new Priority Inbox looks to simplify our lives by using technology to predict what messages are most important to us and make them readily available. mark for My Articles similar articles
Macworld
October 2000
Tom Negrino
Corral Your E-mail Use Outlook Express 5 to Control the E-mail Stampede mark for My Articles similar articles
PC World
October 2005
Andrew Brandt
Phishing Anxiety May Make You Miss Messages Swarms of bogus electronic missives deter people from accepting legitimate e-mail. mark for My Articles similar articles
PC World
May 2006
Scott Dunn
Spot PC Trouble Early With Windows' Event Viewer Make sense of Windows' logs... View past chkdsk results... Get more event information for free... mark for My Articles similar articles
PC Magazine
January 18, 2006
Neil J. Rubenking
Who Has a Virus? If your e-mail account has received numerous "mail rejected" notifications for messages that you never sent, this generally doesn't indicate that you've got a virus. However, there's no way to block the flood of rejection messages. mark for My Articles similar articles
PC Magazine
April 4, 2006
Neil J. Rubenking
Safe Eyes 2006 Safe Eyes 2006 monitors and controls what your kids do online, alerting you to violations via e-mail, text, or phone. mark for My Articles similar articles
Investment Advisor
August 2006
Claudio Pannunzio
Four Rules to Drive Home Your Message What distinguishes highly successful financial advisors from less successful ones, regardless of their skills and industry knowledge? The answer is their ability to communicate the true value of their service offerings to their key constituencies. mark for My Articles similar articles
PC Magazine
June 1, 2008
Neil Randall
Deal with the Outlook E-Mail Deluge in 4 Steps Make Outlook sort your e-mail for you by mastering rules to file, save, and delete messages automatically. mark for My Articles similar articles
Linux Journal
March 2, 2002
Ralph Krause
Linux Internals: a Book Review Errors and uneven content prevent this book from achieving its goals and helping its audience... mark for My Articles similar articles
PC Magazine
June 2, 2004
Creo Six Degrees 2.0 If it's as important to you to find the context of messages as it is to find the messages themselves, or if you need some hints to locate what you're looking for, Six Degrees is a good choice. mark for My Articles similar articles
InternetNews
June 21, 2006
Sean Michael Kerner
The Linux 2.6 Kernel: Cracking the Code A special report on the Linux kernel 2.6.17 summarizes the activity, its origins and where its going, in order to help readers gain a deeper understanding of the kernel, as well as Linux. mark for My Articles similar articles
PC World
July 2004
Andrew Brandt
Privacy Watch: Why Your Friends Believe You're Selling Viagra Spammers who forge your address on their junk messages can clog your inbox and harm your reputation. mark for My Articles similar articles
CIO
October 15, 2001
Lauren Gibbons Paul
How to Tame the E-Mail Beast E-mail management is principally a people issue, not a technical one. Read tips from CIOs on how to get the message out to your employees... mark for My Articles similar articles
PC Magazine
February 17, 2004
Cade Metz
Can E-Mail Survive? It faces increasing threats from spam, viruses and outdated protocols. Here's what you need to survive. mark for My Articles similar articles
PC Magazine
March 2, 2005
Neil J. Rubenking
Deleting Too Many Messages Gags Outlook Outlook can't bulk-delete more than 4,000 messages at a time from an Exchange-based account. But there is a workaround. mark for My Articles similar articles