Quantcast
23
Posts
2
Comments

About Jackie Rosenberger

Jackie Rosenberger is an editor with iEntry, Inc.
A Unique Approach to Web Traffic Analysis

Understanding Web traffic can be maddening. It’s easy to find out, in general, how many visitors your site’s had, which pages visitors accessed, and even where most of the site traffic came from with just about any logging software.

Shaddow Domain Peer Review Results

Thanks to everyone who participated in the first NetDummy peer review of the site Shaddow Domain. We here at NetDummy realize that this site was a bit, well, over the top. Two of you even complained about our selection. So allow me to explain.

Outside In – Site Design from the Customer’s Perspective

How do you create a site that works? You can read a stack of books on HTML and still get it all wrong – this happens time and again.

What Makes Email Professional?

I asked DevWebPro readers what they expected from professional email, and the responses poured in. Find out what people who are receiving your email expect to see. Read on for views on HTML mail, Outlook, a few criticisms of DevWebPro, plus grammar gripes and misspelling misery.

Internet Storm Watchers

Most of us are content with the protection a firewall affords us, and don’t bother to analyze the data the programs collect. Which ports are being probed? How often? Is the same source IP repeated with alarming frequency? We rarely check. The information locked away in those unexamined log files could potentially prevent script kiddie rampages, stop the spread of malware, and even help track and prevent hacker break-ins. And yet those files go largely unanalyzed, especially by home users. The firewall does its job, and we’re satisfied.

Google’s AdWords Guidelines In Action

When you choose your ad text for Google, use a hefty dose of caution. As Thai Winds learned, it’s tough to bend Google’s ad rules, even if you’re right.

When Thai Winds decided to use Google’s AdWords program, they wrote their ad in the way that made the most sense from the perspective of their business. They didn’t anticipate what happened next, however – their ad was disapproved, all of their ads with Google were deleted because of the phrases they chose.

Publishing eBooks on a Shoestring Budget

I recently received an email from a hockey coach with a Web site. He was searching for a way to create an ebook to sell on his site. But since he just wanted to create just one ebook, he didn’t want to spend hundreds of dollars on a program to do the job. His question – is it possible to create ebooks for free?

Free Scripts Galore!

If you’re looking for a quick and easy way to spice up your Web site, look no further than DevScripts. Over 1,000 scripts are available through DevScripts – ASP, ColdFusion, JavaScript, Perl, and more. The site has just recently launched, so expect many more new scripts in the future.

Your Turn — Linux Questions Answered

A short time ago I wrote an article discussing resources for Red Hat 8.0. Widely touted as a more “user-friendly” version of Linux, I gave it a whirl and intended to share my views with you. Instead, I will respond to some of the many, many questions readers sent in. Thank you all for your feedback! You’ve raised some very good issues.

LInux Steps Up To The Desktop

If you’re like me, you’ve considered eliminating Windows from your computer at some point. The upgrade scheme is confusing, and there’s an endless stream of hacks, viruses, worms, and exploits that target Windows computers exclusively.

Linux, by comparison, appears to be more stable. It seems to require less maintenance, and there aren’t any legal strings attached to it. It does, however, have a “geeks only” reputation that scares away many novices early on. Recently, Red Hat, a Linux software company, has made an effort to change that techs-only image.

Windows: How to Protect a Hacker’s Favorite Target

Hacking incidents are on the rise – August 2002 was the most active month for hacking since the dawn of the Internet. The target? Primarily Windows systems. Formerly Linux systems were the hacker’s target of choice, but now they’re breaking their way in to the Windows OS.

One reason for the switch is that cracking a Linux server is a point of pride; Linux admins are typically security-conscious and pose a challenge to the intellectual hacker. With such ego-inflating attacks on the decline and criminal attacks on the rise however, Windows systems are more popular targets because they’re easier to break into. Microsoft releases warnings about security holes constantly, with patches following quickly. But how quickly are these patches located and applied? The lazy, criminal hacker hopes you’ll forget to patch and make his break in easy.

Rediscover Internet Explorer 6.0

Just about everybody with a Windows computer has some version of Internet Explorer (IE) installed on their system. It’s the most popular browser on the Web today, with the latest release at version 6.0.

Weaving the Wireless Web

The wireless Internet is taking off. New ISPs as well as existing ISPs are scrambling to provide service to this growing new market. Yet in this service boom, many of these companies are testing the wireless waters for the first time. These pioneers are discovering that the trail to wireless Web success is rocky and fraught with peril. Web designers are finding themselves caught in the middle, trying to serve a vast new market of devices.

Hom RF a Better Wireless Solution?

Wireless networks are growing at an exponential rate. It’s no wonder they’re so popular – there are no wires to trip over, there’s no need to drill holes in walls, and the hardware is cheap enough for home users to afford easily.

Cracking The Cellular Code

While the clarity on your cell phone may be increasing, the overall picture of wireless technology is becoming progressively murkier. New terms and services seem to spin off of the presses every day, and it’s hard to separate what you need to know from what you don’t.

What do all those acronyms mean? Most are specific ways of transmitting what amounts to the same kind of signals. Different phones depend on different technologies, and many of these are manufacturer-dependent.

IM For Business

Instant messaging is no longer solely the realm of teenagers and lonely insomniacs. While you might not want to plunk down MSN Messenger on your employees’ desktops, instant messaging has a lot to offer business.

New Bill Champions Online Privacy

You’re reading your email when you happen across a message from a sender you don’t recognize. The message not only addresses you by your full name but also contains details about you that you don’t recall giving out. Or, you’re browsing the Web and happen across a site that you’ve never visited before but which nonetheless addresses you by your full name and seems to know a thing or two about your buying habits.

Content Alchemy: Converting Free Site Visitors Into Paying Customers

The Internet has traditionally been the home of the free. Everyone who uses the Web seems to expect to get everything downloadable for free. If you’re offering content for free, then you’re potentially losing money every time someone views your site. It’s tough to run a business for free, and this is the reason that many Web businesses are moving to pay models. Let’s take a look at what some companies are doing to make the most of their free content.

Friendlier Flash: Creating a Flash Preloader

With the release of a new version of Flash, Flash movies on Web sites are more popular than ever. While such movies succeed in adding interactivity, animation, and information to a site, some Flash movies can become prohibitively large. After all, not everyone on the Internet has DSL or cable access. Keep in mind that many of your site visitors are still plodding along with dialup access. Although Flash does a respectable job of cutting down the size of movies for Web sites, they can still be quite large. This is bad news for your site visitors viewing your site through the aforementioned slow connections.

Wireless Insecurities

Wireless networks are catching on at an alarming rate. While they solve many problems that can’t be solved with traditional wired LAN (local area network) technology, at the same time wireless LANs (WLANs) raise many troubling security issues.

What Do Computers Think About You?

Do you read all of your e-mail? Chances are good that you don’t, since most people receive an overwhelming amount of e-mail each day. Reading e-mail has developed into dreaded time-consuming drudgery, a symptom of our data-driven society. Wouldn’t it be great if your computer could read all of it for you, save all the important stuff, and delete everything that doesn’t interest you?

Brave New 3D Worlds

This week developers released the first working draft of X3D (Extensible 3D) at the Web3D 2002 Symposium. Although virtual reality on the Web has been virtually extinct for nearly seven years, developers think it’s time to try again.

Switching from MS Office to Star Office – Should You?
· 2

It’s no wonder that interest is increasing in alternatives to Microsoft.

Many of Microsoft’s loyal customers are scratching their heads over the new licensing plan that requires an annual fee from product users. In return for additional fees, customers have the opportunity to purchase support agreements at reduced rates. Not only are “purchasers” suddenly transformed into “subscribers,” but they must also commit to purchasing upgrades far in advance.

Does that seem fair? Quite a few Microsoft customers don’t think so. And it’s pretty clear why they don’t – not only do they need to purchase software, but now they have to pay to use it every year, and as a reward they get a discount on a service they more than likely don’t use anyway.