X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 hackers sites


CyberPeepers from Korean Sites Peek at U.S. Networks
Numerous United States Internet sites are being bombarded by cyberpeepers from Korea. Whether or not these network scans constitute an attack depends upon whom

hackers sites  more likely it is hackers from other parts of the world coming in through Korea due to the easy ability to compromise systems on .kr networks. Some network administrators are retaliating by scanning back the IP addresses where these probes are coming from. One administrator found TCP/IP port 2222 open which dropped them into what is known as a rootshell. A rootshell is a computer account with special privileges that empower the user to completely take over and own the system. On January 8th, a hacker

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Web Content Management (WCM)

Web content management (WCM) systems manage content creation, review, and approval processes for web site content. This may include public Web sites (Internet) or private web sites (intranet or extranet). Use a WCM solution to organize and manage documents; provide content version control, collaboration utilities, and user- or document-level security. 

Evaluate Now

Documents related to » hackers sites

Is Your Financial Transaction Secure?


The FDIC imposes IT integrity ratings on financial institutions. These ratings are known as URSIT ratings and are not disclosed to the public. There is no easy discernable way to know how safe your on-line transactions are.

hackers sites  of UDP ports that hackers can take advantage of that were not taken into consideration. In general, the depth of the security audit will vary by consulting firms. Every company defines their own audit procedure, if they have any. It is not uncommon for companies to create procedures in the midst of a business opportunity. While, the FDIC acknowledges the seriousness of the situation, it admits that it is currently too bogged down with Y2K concerns to take any action on system and network security. The Read More

Top 10 Excuses For Not Securing Your Website or Network


With so many sites lacking security, we have put together a list of the leading reasons why businesses and organizations are unable to secure their network. Don't let your IT department fall victim to unprecedented security breaches. Accept no excuses.

hackers sites  were sold to some hackers. It's not part of our IT agenda. We wanted a baseline so we look good next time. Don't let your organization fall victim to silly excuses. Hold someone accountable for managing and implementing security and take no prisoners. Read More

Secure in a Foundry


Foundry Networks™, Inc. announced that they would be incorporating Secure Shell (SSH) Technology for free in all of its high-performance switching devices. That’s right! Foundry Networks has just made every Network Manager’s dream come true.

hackers sites  layer of protection against hackers. This by no means indicates that your edge devices will never be hacked, but now there is an additional layer of security that was not present before. User Recommendations Can Network Managers say telecommuting!! That's right! Foundry Networks has just made every Network Manager's dream come true. TEC is glad to see that Foundry Networks is incorporating a very important feature into its networking devices by adding Secure Shell Technology into the Fabric of these Read More

Analysis of Virgin Net's Hacker Scare


The Company only operates in England and claims the break-in attempts were only to specific and contained areas.

hackers sites  an appealing target for hackers, who prefer to think of themselves as 'crackers'. When using a free Internet based e-mail service, refrain from using the service for financial and/or professional services, if you feel uncomfortable with the content of your email, don't send it. Read More

The Cobalt Group Drives a New Web Deal


The Cobalt Group and National Automobile Dealers Association form a partnership to help dealers build online capabilities and expand consumer choice.

hackers sites  Cobalt Group Drives a New Web Deal Event Summary On Monday, January 10th, the National Automobile Dealers Association (NADA) and The Cobalt Group, Inc. (Nasdaq:CBLT), announced plans for the development of an automotive portal and packages to help automobile dealers create websites. Cobalt, a provider of Internet solutions for the automotive industry will offer NADA dealers two different NADA-endorsed web packages for use in building their own web sites. The NADA Web Essential Package provides Read More

Rational Emphasizes Web Site Development Content Management


Web sites are very public, putting the brand and image of a company out there on the site for all to see. Companies need to be sure they have a firm grip on what website visitors see. Rational Software and Vignette Corp. have teamed up to provide a product to do just that.

hackers sites  Emphasizes Web Site Development Content Management Rational Emphasizes Web Site Development Content Management C. Lisle - December 12, 2000 Event Summary Rational Software (NASDAQ: RATL) announced Rational Suite ContentStudio to address the needs of e-businesses challenged with managing content and code. ContentStudio includes content management technology from Vignette Corp . (NASDAQ: VIGN). ContentStudio is designed for e-business development teams that include content contributors who write, Read More

SaaSy Discussions (Part I)


Much has been said and written lately, on TEC's web site as well as on many other peer sites, about the on-demand deployment model, especially about multi-tenant software as a service (SaaS). The opinions there have ranged from an absolute infatuation with the "technology of the 22nd century" or so (thereby rendering the traditional on-premise model completely passe) to much more reserved and

hackers sites   Read More

ERP Multisite Costing Challenge and Solution


Significant management issues posed by multisite manufacturing environments include optimizing resource use at each site and delivering the lowest possible cost for each stage in the product manufacturing cycle. To facilitate meaningful results in achieving these requirements, enterprise resource planning (ERP) software must thus provide the right tools for ensuring that multisite processes come up to “best-in-class” standards.

hackers sites  Multisite Costing Challenge and Solution ERP Multi-site Costing Challenge and Solution If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. VISIBILITY.net is a fully integrated enterprise resource planning (ERP) solution for complex product manufacturers. Through a suite of business applications, VISIBILITY.net enables organizations to significantly optimize business effectiveness and performance. Designed to support operational Read More

A Kinder Unisys Makes Web Users Burn


Unisys has modified its policy on garnering license fees from the use of the .GIF image format.

hackers sites  Kinder Unisys Makes Web Users Burn Event Summary Unisys Corp holds the patent for a data compression algorithm known as LZW. Many years ago CompuServe used LZW as the basis of its GIF image format. In 1995 it obtained a license fee arrangement from CompuServe. It has also obtained licensing arrangements with most major commercial vendors of graphics programs. Unisys is now asking Web developers to determine whether the software they are using is properly licensed; if not, Unisys is requesting a $5,000 Read More

Case Study: Smeal Fire Apparatus Manufacturer Increases Revenues with ERP


Nebraska, US-based Smeal grew to over 315 employees at two sites manufacturing 15 kinds of pumps, 12 types of aerial ladders, and four kinds of aerial platforms—all with over 4,400 custom options each. To increase efficiency and improve inventory tracking, the company installed an enterprise resource planning (ERP) solution that integrated its old manual paper-based systems. Learn more about how the company benefited.

hackers sites  Study: Smeal Fire Apparatus Manufacturer Increases Revenues with ERP Nebraska, US-based Smeal grew to over 315 employees at two sites manufacturing 15 kinds of pumps, 12 types of aerial ladders, and four kinds of aerial platforms—all with over 4,400 custom options each. To increase efficiency and improve inventory tracking, the company installed an enterprise resource planning (ERP) solution that integrated its old manual paper-based systems. Learn more about how the company benefited. Read More

The Evolution of Remote Office Backup: From Tapes and Agents to Tapeless and Agentless


Any geographically distributed business with three or more remote sites has likely dealt with tape-based backup systems. If this sounds like your business, then you certainly understand the complexities involved with managing growing data—not to mention the risks. The good new is that an agentless, multisite backup and recovery software solution is available that can offer a high-speed alternative to tape-based systems.

hackers sites  Evolution of Remote Office Backup: From Tapes and Agents to Tapeless and Agentless Any geographically distributed business with three or more remote sites has likely dealt with tape-based backup systems. If this sounds like your business, then you certainly understand the complexities involved with managing growing data—not to mention the risks. The good new is that an agentless, multisite backup and recovery software solution is available that can offer a high-speed alternative to tape-based Read More

Lean Manufacturing: Part 1


With all the discussion, books, Web sites, and other materials on the topic of lean manufacturing, it's hard to know which resources are credible—much less understand the mounds of information. The first part of this series breaks down the definition of lean manufacturing into easy-to-digest concepts and shares the real-life example of a supplier of remanufactured solvents that is working toward the goal of lean. Get tips on how to determine what you need in your production operation and why.

hackers sites  lean manufacturing, lean principles, lean practices, inventory control, lean process ERP Read More

InsideOut Firewall Reporter Unravels the Mysteries of Your Firewall Logs


The most important piece of hardware that protects your network from intruders, hackers, and outside traffic is your firewall. Firewalls process an enormous amount of data, that when converted to useful information, can tell you many things about the packets traveling in and out of your network.

hackers sites  and stories of how hackers have infiltrated or brought down a network. As a result, network security is one of the fastest growing sectors of the Information Technology market. As a network administrator, it is important to have at your disposal, tools to help you proactively manage your network. Information about network problems can come from many sources. Operating systems, such as Windows NT/2000, have some built-in tools that can provide you with helpful information. There are third party add-ons as Read More

Case Study: JD Williams


As one of the fastest-growing home shopping retailers in the UK, JD Williams sells products through its 45 Web sites and more than 700 annual catalogs. To better face the challenges of its Internet sales—and to take advantage of opportunities—JD Williams began an end-to-end supply chain initiative, with a merchandise life cycle management solution suite. Learn how it helped the company increase sales in key departments.

hackers sites  Study: JD Williams As one of the fastest-growing home shopping retailers in the UK, JD Williams sells products through its 45 Web sites and more than 700 annual catalogs. To better face the challenges of its Internet sales—and to take advantage of opportunities—JD Williams began an end-to-end supply chain initiative, with a merchandise life cycle management solution suite. Learn how it helped the company increase sales in key departments. Read More