Google Minis a mighty search tool

I tested the latest version of the Mini (the first one was introduced in January 2005), a thin, server-size search appliance, ...

I tested the latest version of the Mini (the first one was introduced in
January 2005), a thin, server-size search appliance, on our network here at the
company, and found its indexing speedy and its searches nearly instantaneous.
Its relevance was just what I would expect from a Google search tool spot-on in
most cases.
Google recommends that you seek help from your IS department when installing
the Mini; I needed that, plus help from Google itself, to get the Mini to index
both our Web site and an internal file server. Google employs an unusual format
for referring to network servers that had even our IS experts scratching their
heads. Eventually I had to call Googles tech support.
Once youve installed the Mini on your network, you access it through a series
of administrative pages using your Web browser. You tell it what parts of your
network or Web site you want it to crawl, and you can specify what paths you
dont want it to follow. The $1995 version of the Mini will index 50,000 files;
A $2995 version will index 100,000 files. You can also include a search box on
your Web site for visitors to use when searching your site.
The default layout of the search page looks exactly like a Google search page,
but you can customize its appearance as much as you like. You can narrow your
search to a certain kind of file (the Mini will index 220 different file types,
but it doesnt tackle even common e-mail formats).
The Google Mini can be a hassle to set up, but if you know a bit about
networking, it will let you do much more sophisticated searching.
Conclusion: Google Mini is a powerful search appliance has some setup hassles,
but delivers fast, relevant results. It can be obtained on web adress
Lost in space on planet malware
By Sandra Rossi, Computerworld Australia
This week my life has been a bit like an episode of Lost in Space. Im sitting
through yet another IT security media event and all I can hear is the robot:
"Danger Will Robinson, Danger." This is what has become of yours truly after
years of covering the security beat. Warnings about the next emerging threat,
followed by more warnings. Beware we are all under assault from Planet Malware!
Were all familiar with the statistics, 72 percent of organizations are
infected with spyware (and they dont know it), 40 percent with Trojans (and
they dont know it). Or is it 72 percent spam and 40 percent spyware? Who
konws? It begins to sound all too repetitive, from one new malicious attack to
the next.
But put aside the numbers and the robot has a point, the threat landscape on
the Internet has fundamentally changed.
Widespread worm infections and hacker threats are so yesterday. Forget Code Red
and Sasser, attacks are far more targeted and specific. Today its about money,
not egos. Organized crime has discovered the world of e-business and the
goldmine for the crimes is the hoard of identities.
And more importantly, they are winning through stealth. As Auscert general
manager Graham Ingram explains, criminals are not in the business of
advertising their business, which is why they are increasingly using rootkits.
This is about undetected, malicious software targeting the application layer,
not servers. By putting rootkits into kernel mode it cannot be removed.
Well, it can be if you want to reload the operating system from scratch.
Ingram says the quality of malicious code has improved considerably and 60
percent of this malware is not detected by antivirus products. In fact, the two
most popular AV products have an 80 percent miss rate for this type of threat.
And the biggest targets? Those holding ID data, most notably financial services
firms and government.
It doesnt actually fly do you see?
By Sharky, Computerworld (US online)
Flash back to 1995, when this IT pilot fish works at an investment company and
the coolest thing in laptops is the IBM ThinkPad 701. Its nicknamed the
"butterfly," because when opened its keyboard expands into a full-size
keyboard, even though the laptop itself is smaller than that. "We routinely
tried to get new laptops to the people who actually used them," says fish. "But
once in a while, one of the investment officers who had a huge ego couldnt
stand it that a peon had a cooler PC than he did, and he insisted that he get
one of the new ones." That happens late one Friday afternoon. Fish gets word
that he needs to prep a butterfly laptop immediately for an investment officer.
And it needs to be ready before fish leaves, because the investment guy will be
traveling over the weekend. Fish stays several hours past quitting time to make
sure its set up and delivered to the user. Then he heads home for the weekend.
Monday morning theres a voice mail waiting for fish: Theres a problem with
the butterfly. Ill be right there, fish tells investment guy. No, its better
that I bring it over, investment guy tells him. "A few minutes later, he
approaches my desk, holding a shoebox," fish says. "In the center of my desk,
he pours out the shoebox, and I notice parts that were once an IBM 701. The
unit is two days old and totally demolished. "It turns out that instead of
traveling, he just wanted to read his e-mail on his third-floor balcony during
his morning coffee, using a really cool laptop. He confided that he got up for
another cup of coffee and snagged the power cord of the butterfly and it
dropped three stories to the ground. "The user was shocked to learn that IBMs
warranty wouldnt cover a three-story fall, and that his business unit would be
paying for the butterfly. "He never requested another laptop."
Google Minis a mighty search tool search engine vyhledávací engine
tempting lákavý
hassles těžkosti, potíže
file server souborový server
crawl lézt
layout vzhled, struktura
narrow zúžit Lost in space on planet malware
under assault pod palbou familiar důvěrně známý, obeznámený fundamentally
so yesterday hudba minulosti
targeted cílený
hoard of identities hromada identit application layer aplikační vrstva It
doesnt actually fly do you see?
flash back návrat
peon sluha, pěšák
quitting time konec pracovní doby
confide svěřit se
power cord napájecí kabel
Zveřejněné zprávy v původním znění prošly redakční úpravou a byly vybrány z
celosvětových informačních zdrojů vydavatelství IDG. Texty jsou určeny všem
zájemcům o zdokonalování se v odborné angličtině. Sestavil: pat(pat) 6 1123

K tomuto článku není připojena žádná diskuze, nebo byla zakázána.