Similar Articles |
|
Linux Journal August 2000 Michael A. Schwarz |
Take Command klogd: The Kernel Logging Daemon |
JavaWorld April 2001 Nate Sammons |
Robust event logging with Syslog Because event logging is often an afterthought, Java developers often ignore this task while programming. However, logging allows developers to instrument their code so the operations staff can deal with any problems that arise... |
Linux Journal October 1, 2002 Mick Bauer |
Paranoid Penguin: Stealthful Sniffing, Intrusion Detection and Logging Attackers can't rewrite your log files if they can't connect to the log server. Learn the ways of stealth. |
JavaWorld November 2000 Ceki Gulcu |
Log4j delivers control over logging Log4j, an open source project, allows Java developers to control which log statements are output with arbitrary granularity. It's fully configurable at runtime by using external configuration files. Best of all, log4j has a gentle learning curve. Beware: judging from user feedback, it is also quite addictive. Project founder Ceki Gulcu describes the log4j API, its unique features, and its design rationale. |
JavaWorld September 2001 Sunil Kumar & Nitin Nanda |
Log it or lose it How to enable a Java application to log messages to the NT Event Log... |
Linux Journal April 2000 Gaelyne R. Gasson |
Web Analysis Using Analog Every web site needs a way to get accurate statistics--here's a freely available program to give you that information. |
RootPrompt.org May 17, 2000 Lance Spitzner |
Watching Your Logs How to automate the filtering of your logs, freeing up your time while alerting you with the information you need. |
Search Engine Watch October 5, 2010 Gary-Adam Shannon |
Twitter Exploit Warning: How Anyone Can Easily Snatch Your Direct Messages It's quite easy to use the Twitter API to access your personal information and obtain all the dirty little secrets hidden inside your Twitter inbox. |
InternetNews August 31, 2010 |
Google Adds Auto-Filtering Feature to Gmail Google's new Priority Inbox looks to simplify our lives by using technology to predict what messages are most important to us and make them readily available. |
Macworld October 2000 Tom Negrino |
Corral Your E-mail Use Outlook Express 5 to Control the E-mail Stampede |
PC World October 2005 Andrew Brandt |
Phishing Anxiety May Make You Miss Messages Swarms of bogus electronic missives deter people from accepting legitimate e-mail. |
PC World May 2006 Scott Dunn |
Spot PC Trouble Early With Windows' Event Viewer Make sense of Windows' logs... View past chkdsk results... Get more event information for free... |
PC Magazine January 18, 2006 Neil J. Rubenking |
Who Has a Virus? If your e-mail account has received numerous "mail rejected" notifications for messages that you never sent, this generally doesn't indicate that you've got a virus. However, there's no way to block the flood of rejection messages. |
PC Magazine April 4, 2006 Neil J. Rubenking |
Safe Eyes 2006 Safe Eyes 2006 monitors and controls what your kids do online, alerting you to violations via e-mail, text, or phone. |
Investment Advisor August 2006 Claudio Pannunzio |
Four Rules to Drive Home Your Message What distinguishes highly successful financial advisors from less successful ones, regardless of their skills and industry knowledge? The answer is their ability to communicate the true value of their service offerings to their key constituencies. |
PC Magazine June 1, 2008 Neil Randall |
Deal with the Outlook E-Mail Deluge in 4 Steps Make Outlook sort your e-mail for you by mastering rules to file, save, and delete messages automatically. |
Linux Journal March 2, 2002 Ralph Krause |
Linux Internals: a Book Review Errors and uneven content prevent this book from achieving its goals and helping its audience... |
PC Magazine June 2, 2004 |
Creo Six Degrees 2.0 If it's as important to you to find the context of messages as it is to find the messages themselves, or if you need some hints to locate what you're looking for, Six Degrees is a good choice. |
InternetNews June 21, 2006 Sean Michael Kerner |
The Linux 2.6 Kernel: Cracking the Code A special report on the Linux kernel 2.6.17 summarizes the activity, its origins and where its going, in order to help readers gain a deeper understanding of the kernel, as well as Linux. |
PC World July 2004 Andrew Brandt |
Privacy Watch: Why Your Friends Believe You're Selling Viagra Spammers who forge your address on their junk messages can clog your inbox and harm your reputation. |
CIO October 15, 2001 Lauren Gibbons Paul |
How to Tame the E-Mail Beast E-mail management is principally a people issue, not a technical one. Read tips from CIOs on how to get the message out to your employees... |
PC Magazine February 17, 2004 Cade Metz |
Can E-Mail Survive? It faces increasing threats from spam, viruses and outdated protocols. Here's what you need to survive. |
PC Magazine March 2, 2005 Neil J. Rubenking |
Deleting Too Many Messages Gags Outlook Outlook can't bulk-delete more than 4,000 messages at a time from an Exchange-based account. But there is a workaround. |