Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
Forefront Edge Security and Access Demonstration Toolkit The Forefront edge security and access products, Internet Security and Acceleration (ISA) Server 2006 and Intelligent Application Gateway (IAG) 2007, provide enhanced network edge protection and application-centric, policy-based access to the corporate IT infrastructure across secure remote access, with branch office security, and Internet access protection. »
Tutorials: JavaOne Online Technical Sessions and Labs Advance your development skills by experiencing hundreds of expert-led, in-depth technical sessions and hands-on labs. View sessions on the latest developments in evolving and existing technologies. ;
eBook: Guide to Managing an IT Staff Why is managing technical people difficult? Some would say techies are socially inept and simply can't communicate well. While that may be true in some cases, saying so doesn't help managers deal with techies any better: It just defers the problem. Download this eBook for advice on how to bridge the communications gap. Download this eBook now.
A Guide to Finding, Removing and Preventing Online Pests -- Online pests can range from the annoying to the downright dangerous. This Intranet Journal guide takes a step-by-step approach to diagnosing, removing and preventing spyware infestations.
Rugged Security: MESHnet Firewall By Lyne Bourque -
Published September 29, 2007
Two firms team for a portable, military-grade hardware firewall that will take whatever hackers -- or Mother Earth, for that matter -- can dish out. Plus, it looks the part. [more Prevention & Risk Management]
AOL Claims AIM is Safe By Sean Michael Kerner -
Published September 28, 2007
After a pair of security research groups level allegations of insecurity against AIM, AOL moves to fix its back end. [more Prevention & Risk Management]
Networking Notes: Playing the Password Game By Michael Hall -
Published September 27, 2007
Some security experts say we need to do the impossible: Create and memorize a unique password for each and every service we use. But there are options — this nifty Web site or just write them down. [more Security Best Practices]
Hackers Scoff At iPhone Warning By Larry Barrett -
Published September 27, 2007
Despite Apple's dire warning of imminent "brickdom" and worthless warranties, hackers and customers who managed to unlock their iPhones say they have the law and ingenuity on their side. [more Information Security Trends]