___________________________________________________________ Computerworld Web Site Management April 05, 2007 ___________________________________________________________
***************SPONSOR************************************** Survey Says: Small Organizations thinking Big about Disaster and Data Companies of 10 employees or 10,000 employees face the same challenge day in and day out: Protect business-critical data. But with smaller companies, allocating resources to this chore can be taxing. Tune into this on demand webcast, Survey Says: Small Organizations Thinking Big about Disaster and Data, to see what some 250 of your small-business peers are doing to ensure business as usual. http://cwflyris.computerworld.com/t/1421252/1378785/47577/0/ ************************************************************ ___________________________________________________________ In this issue: * Hackers now offer subscription services, support for their malware * Don't Believe the Hype: The 21 Biggest Technology Flops * Mozilla eyes hardening Firefox against ANI exploits * Google to build $600M data center in S.C. * Domain name application gives phishers a new foe * Google agrees to update New Orleans imagery in Maps and Earth * How Webkinz is getting children hooked on the Web * Reznor adopts unusual Web campaign for new album * Google sssearch turns up wayward snake * Web 2.0 can be hijacked, claims Fortify Computerworld Blogs: * EMI and Jobs blow away DRM (and historic Beatles) * Round 6: H-1B Battle - American engineering's "April Fools" * Shark Tank: Test session, redefined * The more things change ... ___________________________________________________________ OTHER RESOURCES _______________ How confident are you in your HA/DR plan? View this webcast now. http://cwflyris.computerworld.com/t/1421252/1378785/55208/0/ Careful What You Search For...Join Computerworld and Oracle on April 25th, 2007 for this live webcast as they review the latest low-cost, easy-to-deploy search solutions. http://cwflyris.computerworld.com/t/1421252/1378785/55978/0/ Read this Executive Snapshot, to learn about the capabilities of different types of firewall, IDS, and IPS tools, and best practices for deploying them. http://cwflyris.computerworld.com/t/1421252/1378785/56409/0/ _________________________________________________________ Hackers now offer subscription services, support for their malware Malware makers and cybercriminals are now turning the distribution of Trojan horses, spyware and data theft software into an online business, offering their products to buying customers and paying for results. http://cwflyris.computerworld.com/t/1421252/1378785/58048/2/ _________________________________________________________ Don't Believe the Hype: The 21 Biggest Technology Flops We fondly recall 21 overpromoted products and technologies that utterly failed to live up to their hype -- and ask you to choose the biggest flop of them all. http://cwflyris.computerworld.com/t/1421252/1378785/58049/2/ _________________________________________________________ Mozilla eyes hardening Firefox against ANI exploits Mozilla Corp. is looking at ways it could toughen the Firefox browser against the Windows animated cursor (ANI) file bug, according to the company's lead developer. http://cwflyris.computerworld.com/t/1421252/1378785/58050/2/ _________________________________________________________ Google to build $600M data center in S.C. Google plans to invest $600 million in a new data center in South Carolina, the state government said on Wednesday. http://cwflyris.computerworld.com/t/1421252/1378785/58051/2/ _________________________________________________________ Domain name application gives phishers a new foe A 26-year-old programmer has created an application to track newly registered domain names closely to see if they turn into live phishing sites. http://cwflyris.computerworld.com/t/1421252/1378785/58052/2/ _________________________________________________________ ***************SPONSOR************************************** Learn from Success: Integrating Legacy with SOA for Faster Business Processes $6 million...$30 million...$500,000...These are the real savings companies are reporting by transforming their powerful, secure Legacy systems into flexible SOA applications that meet the changing needs of their business. Before going down the road of "ripping and replacing" your valuable Legacy systems, join us and hear from the experts on how you can have the best of both worlds by integrating your Legacy with your SOA...and save your company millions at the same time. It's not as hard as you think. http://cwflyris.computerworld.com/t/1421252/1378785/43339/0/ ************************************************************ _________________________________________________________ Google agrees to update New Orleans imagery in Maps and Earth A congressional subcommittee wanted to know why Google replaced post-Katrina satellite imagery of New Orleans with pre-Katrina images. http://cwflyris.computerworld.com/t/1421252/1378785/58053/2/ _________________________________________________________ How Webkinz is getting children hooked on the Web Plush toys are sold with a secret code that children can use to enter online games and activities. http://cwflyris.computerworld.com/t/1421252/1378785/58054/2/ _________________________________________________________ Reznor adopts unusual Web campaign for new album Campaign features everything from cryptic phrases on T-shirts to Orwellian Web sites to MP3s found on USB drives in bathrooms at concerts. http://cwflyris.computerworld.com/t/1421252/1378785/58055/2/ _________________________________________________________ Google sssearch turns up wayward snake Employees at Google's New York offices can rest easier now that Kaiser, a 3-foot-long ball python, has been captured after disappearing from his tank over the weekend. http://cwflyris.computerworld.com/t/1421252/1378785/58056/2/ _________________________________________________________ Web 2.0 can be hijacked, claims Fortify Security vendor Fortify Software says a flaw in AJAX frameworks can enable an attacker to pose as the application's user and intercept data sent via JavaScript commands. http://cwflyris.computerworld.com/t/1421252/1378785/58057/2/ _________________________________________________________ ***************SPONSOR************************************** How Organizations Are Managing Their Online Channel In November 2006, Computerworld invited IT respondents to participate in a survey on the management of their organizations online channels. The goal of the survey was to better understand the involvement of the technology and business teams in management of and responsibility for the online channel. The following report represents top-line results of the survey conducted among 230 IT respondents. http://cwflyris.computerworld.com/t/1421252/1378785/58058/0/ ************************************************************ ___________________________________________________________ COMPUTERWORLD BLOGS ___________________ EMI and Jobs blow away DRM (and historic Beatles) Monday's IT Blogwatch comes to you from from sunny London: in which EMI and Steve Jobs are expected to remove DRM from their music. Not to mention The Beatles on Doctor Who in 1965... http://cwflyris.computerworld.com/t/1421252/1378785/58059/2/ ___________________________________________________________ Round 6: H-1B Battle - American engineering's "April Fools" Good morning, you're fired and getting replaced by a software engineer from India with an H-1B visa ... APRIL FOOLS! This is a bad joke to play on an engineer these days, because it is just too close to actually being true. http://cwflyris.computerworld.com/t/1421252/1378785/57418/2/ ___________________________________________________________ Shark Tank: Test session, redefined Software developer pilot fish knows this user is an expert at testing applications -- after all, he's told her so. He boasts about the time he spent working as a software tester in an IT shop, fish says. http://cwflyris.computerworld.com/t/1421252/1378785/57176/2/ ___________________________________________________________ The more things change ... When I was in grad school, I tried to explain to a really nice man that some of his colleagues were great and some were slime. All of them were my faculty members. We had a chat about complimenting a woman on her attire. Seems straight forward: http://cwflyris.computerworld.com/t/1421252/1378785/57177/2/ ___________________________________________________________ ___________CONTACTS/SUBSCRIPTIONS___________________________ FEEDBACK -------- To submit feedback about Computerworld's e-mails, contact our online customer service group at [EMAIL PROTECTED] Please include your subscriber e-mail address in all correspondence: archive@mail-archive.com ADVERTISING ----------- For information on advertising, contact [EMAIL PROTECTED] PRIVACY POLICY -------------- Computerworld's online privacy policy is at: http://www.computerworld.com/action/pages.do?command=viewPage&pagePath=/about_policies SUBSCRIPTION SERVICES --------------------- You are currently subscribed to computerworld_web_site_management as: [EMAIL PROTECTED] To unsubscribe, change your preferences, or change your e-mail address, go to the following URL: http://www.computerworld.com/action/member.do?command=newsletterLogin If the above URL is not enabled as a link, please copy it in to your browser window to access our Subscription Page. Did you know Computerworld has 46 other e-mail newsletters that may be of use to you? go to the following URL to find out more... http://www.computerworld.com/action/member.do?command=registerNewsletters Copyright 2007 Computerworld Inc. 1 Speen Street Framingham MA 01701