 |
May 3, 2004 |
 |
|
 |
You are receiving this because you are an Experts-Exchange.com member who has opted-in to receive newsletters. |
 |
|
 |
 |
 |
Meeting of the Mods: Call it a SLO news week. The Director of Community Support, the two Site Administrators, the Cleanup Admin, several of the Moderators, and a couple of the Page Editors will be visiting Experts Exchange's offices in San Luis Obispo, CA, to meet with the owners and staff May 6-9. We promise a full report -- okay, maybe not a full report -- in a couple of weeks.
Just when you thought it was safe: A ZDNet article published April 30 reveals yet another threat to computers running Microsoft software: bots that carry viruses. Read the entire article here.
New Genius: AzraSound has reached Genius status in the Visual Basic topic area. A member of Experts Exchange since March 2000, he is also the co-author of VB.NET - A Developer's Guide. Congratulations, AzraSound!
|
 |
 |
 |
 |
 |
 |
Our questions, articles and featured experts were provided by Page Editor ahoffmann. A member since June 1997, ahoffmann has Certificates in five topics and knows both Unix and Linux from just about every angle. He says he also knows how to use Ctrl-Alt-Del -- whatever THAT means. |
 |
 |
Still open: IPSec between two solaris 8 systems We want all tcp traffic to run encrypted through the IPSec tunnel. Both systems are solaris 8. Points: 500 03/17/2004 03:20PM PDT Can you help?
Still open: Unix networking/ gateway issue ahoffmann: We've all been there: two days ago, we couldn't spell "administrator" and now we are one. This member came to the right place to find out how to configure a Unix server. Points: 250 04/12/2004 12:52PM PDT Can you help?
Return to Sender We've all been inundated with spam, but now it's gotten worse. If you're the webmaster for a domain, you've gotten the emails that say "so and so doesn't exist, so we're returning your email" -- when you didn't send the email to begin with. Now it poses a security problem as well. Read the entire article, or click here if you'd rather read it in German.
|
|
Tintin
ahoffmann on Tintin: "The Unix TAs are rarely used, so the experts are always the same. I also can't point out one which is not a Cleanup Volunteer or has not already been mentioned. But Tintin stands out -- he always has concise and useful suggestions."
Login Name: Tintin Registration Date: November 13, 2002 Expert Points: 308877 Certificates: Master, Unix Programming, Perl, CGI Programming
modulo
modulo is not exactly a spring chicken at EE, having joined in February 2000. In addition to being one of EE's best experts, he also exemplifies how EE works -- he has always been the patient teacher none of us ever really had.
He joined the Moderator team in October 2002, is one of the hardest-working members we've ever had, and still manages to stay at the top of his favorite TA. He's also quite a photographer, with a fondness for buildings and landscapes.
|
|
 |
 |
 |
PE Tip: In the upper left corner, you'll see a little box that tells you how many open questions you have ("My Open Questions"). Click on it, and you'll see all of the questions you've asked, with the open ones at the top. |
 |
 |
 |
One of the least-known new features at Experts Exchange is our new Link Exchange. Our Link Exchange program is beneficial to both sites in a couple ways:
1. The number of resources available to users on both sites will increase
2. Site relevance is increased within all major search engines when a site provides links to and from quality resources
If you would like to swap links with EE, just fill out the form at the Link Exchange page. |
 |
 |
 |
 |
Hold onto your seats: The ZDNet article mentioned above says that we're in for a whole new round of virus attacks, so we thought it a good idea to give you a little refresher in terms you'll be hearing a lot in the next few weeks. This list isn't complete, but it's a good start.
- Attack
- An attempt by an unauthorized individual or program to gain control over aspects of your PC.
- Backdoor
- Code inserted into a program by the original programmer in order to fix bugs or make other changes that need to be made. If the wrong person finds it, it can be used to attack your computer.
- Hijacking
- An attack whereby an active session is intercepted and used by someone else.
- Key
- A key is a Windows registry components that tells Windows what program to run when an icon is clicked, or what kind of printer you have. Every time a program gets added to or uninstalled from a PC the registry gets changed. Viruses usually add keys to your registry, making your computer do things it shouldn't do.
- @mm
- If you see this at the end of a virus, it means the virus is a mass mailer. A mass mailer is the term for a virus that upon infection can mail itself out to email addresses that it harvests from various areas of your hard drive -- especially your address book.
- Macro virus
- Code written to take advantage of 'Hotkey" programming in email clients to deliver its payload or replicate. Macros are key combinations that can be recorded and linked to a single keystroke -- so when you open the email and unknowingly hit the hotkey, your computer gets infected.
- Replication
- After a virus successfully infects a PC it usually wants to copy itself -- to replicate itself. It tries to infect either different parts of your system, or other systems, usually through address books or shared network files.
|
|
 |
 |
 |
ameba has spent a lot of time at Experts Exchange, and during his tenure has come up with all kinds of interesting and useful ways of looking at the site. His latest project is a list of all of the Certified Experts, which he updates daily at his site. We'll be publishing the list of new certificates awarded every issue; what follows is those earned from April 17 through May 1. Thanks for your great work, ameba!
742 experts have 1051 certifications: Genius:8 Sage:38 Wizard:77 Guru:180 Master:748
|
 |
 |
 |
The Grade you give when accepting an answer has three impacts. If you offer 150 points and grade an A, 600 points are added to the Expert's total. A B makes it 450, and a C 300, but it doesn't cost you any more -- just the 150. The second is that the Grade shows up in the Expert's grading profile, and a lot of Experts would rather not get the points and not have what they consider to be a "bad" grade. The third is that the grade shows up on your grading profile as well. If Experts see a lot of C and B grades, they tend to become less likely to want to help you -- because the grade is the only visible sign of the accuracy of their answers. |
 |
 |
 |
To unsubscribe please
follow this link. Please note, you must be logged in to be able to unsubscribe. If you've forgotten your password or login name please
follow this link
|
|
|