Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
Navigating Your IT Career A career in information technology usually has its share of ups and downs. Download this Internet.com eBook to learn where the jobs are in IT, how to negotiate a salary, and helpful advice on job security and how to deal with a layoff. »
Inside Spyware: A Guide to Finding, Removing, and Preventing Online Pests
Your organization's computers are possibly being used to send spam, harvest e-mail addresses, make purchases on stolen credit cards or take part in denial of service attacks. Learn how to indentify, avoid, and remove malware from computers and keep your network and machines safe. »
Tips for Selecting Software Vendors IT managers need a proven, steadfast process for sifting through the hundreds of choices available for each enterprise software market segment. There are a series of steps for ensuring a result that will survive the intense, long-term scrutiny this level of investment will certainly attract. »
Storage Basics: A Guide to the World of Storage Technology Regardless of industry, size, or age, businesses are awash in more data than ever before. Federal regulations require that data be stored, protected, and retrievable for a certain amount of time. Storage is also a growing area in IT, which means employment opportunities exist now, and should exist for some time.
»
Building Your Own IP PBX
If you're already into having control of your computing infrastructure, taking charge of your telephone network is a natural progression. Asterisk is an open source PBX that runs on Linux. It can free your organization from expensive commercial PBXs, and gives you complete control over your telephone services »
Newest Security Articles Implementing a Custom ConnectionString Installer for Setup By Paul Kimmel - Published 10/10/2007 See how a setup project with a custom action lets the user define the connection string using the Data Links dialog and encrypt that connection string using RSA encryption.
The Basics of Manipulating File Access Control Lists with C# By Jani Järvinen - Published 09/26/2007 Learn about file access control lists and how to use C# to read and modify them to improve the security of your applications and your IT infrastructure.
Object Integrity & Security: Error & Exceptions By Matt Weisfeld - Published 09/06/2007 One of the advantages of using object-oriented languages is that much of the error/exception handling is built directly into the language itself. Thus, many of these issues can be handled during the design of the application—and not when the application crashes in the hands of a user.
Windows Cryptography API: Next Generation (CNG) By Nick Wienholt - Published 06/05/2007 For long-term Visual C++ developers, the CryptoAPI will be a familiar part of your programming toolkit. If you're developing Windows Vista applications, though, you should be applying the new Windows Cryptography API: Next Generation.
Java Language Integrity & Security: Fine Tuning Bytecodes By Matt Weisfeld - Published 04/04/2007 Explore how you can process the bytecodes produced by the compiler to help you improve performance, security, intellectual property protection, and readability issues.