Preview: Monitoring Articles
Security and computer monitoring articles.
Published: Sat, 11 Sep 2004 21:29:16 -0400
Last Build Date: Sat, 11 Sep 2004 21:29:39 -0400
Mining for Gold in your Web Traffic Logs
Sat, 11 Sep 2004 21:28:11 -0400
Understanding your Web site's traffic patterns is a crucial component of your marketing mix. The information in these logs is collected as visitors find and move around your site at their own volition.
How to Analyze Web Logs
Analyzing log data can give you a good idea of where your site visitors are coming from, which pages they are visiting, how long they stay, and which browsers they are using.
Your Web Traffic Your Bottom Line
Most companies that have websites have access to traffic statistics, usually provided by their web host. Those that don't look at these files (or use a bargain basement web hosting company that doesn't provide them) don't know what they are missing- there is a wealth of information to be found, and reacting to this information can have a positive impact on a company's bottom line.
What is DNS ?
Similar to how every telephone has a unique number, every Web site, or "domain" on the Internet has a unique Internet Protocol (IP) address. IP addresses are 32 bit numbers represented by four bytes separated by dots. Each byte can represent a number from 0 to 255, therefore the highest IP address 255.255.255.255.
Putting some protection between you and the internet is probably the third most important thing that you can do (after getting virus checking software and performing regular backups).
Information Security Policy
Businesses that do not have clearly written Information Technology security policies and practices in place run the risk of being named in legal actions in the very near future
Help! There is an Intruder In My Computer
Do you have passwords, love letters, naughty pictures or sensitive business information stored on your computer's hard drive? If you have a continuous Internet connection such as cable, xDSL, ISDN or other, you should know that it's almost embarrassingly easy for a hacker to break into a networked computer.
Top Ten Rules to Trading Success
To be successful in the trading game, there are some rules to follow. By violating the rules, you will definitely on the losing side of the game.
No Load Mutual Funds Exchange Traded Funds (ETFs)?
If you are fed up with early redemption charges and ever increasing mutual fund management fees on top of bad-performing fund managers, read on. There is a quiet revolution going on in the no-load mutual fund industry and you, the individual investor, may benefit from it greatly
Road Map to a Healthy Stock Market
A series of events listed in order that they have to occur that may have to happen before the market can sustain a rally. They are trust, accountability, economy, new thinking and earnings.
HR Managers Use Computer Forensics to Investigate Employee Allegations
A prime example of this involves a case CFI has worked on with a nationwide services company. They suspected a key executive was resigning to work for a competitor and taking confidential files to assist them. Using a pretext they obtained his company laptop in advance of his departure. CFI's analysis revealed hidden email communications with his future employer and the creation of a confidential Zip archive of files.
Protect Your Computer!
Hackers, spyware and viruses all combine to make it essential that you have a firewall, a spyware detector and an anti-virus program - all up to date and operating on your system.
The Internet, Censorship and Your Kids
Most all of this controversy stems from the natural and normal parental desire to keep their kids safe from porn. This article is about porn, the internet, keeping kids safe, and the potential harmful consequences of censorship.
Parental Controls And Blocking Software Are Only As Good As Your Password
Many parents use and indeed rely on the various technological measures used by internet companies to prevent children's access to adult materials. These include parental access controls, blocking and filtering software, and activity logs. But some parents can forget that since they have to use a password in order to access, edit or set-up these features on their internet service, that password is the only thing preventing their children from getting the same access!