Computers in Libraries

Monthly magazine provides library information technology news and practical application.

Articles from Vol. 23, No. 5, May

A Different Spin on Security
There are a lot of scary things to worry about when it comes to security. Threats from malicious hackers are all around. Some break in to steal information and others do it as acts of vandalism. Few are the "idealized" hackers who do it just to prove...
A Different Spin on Security. (Techman's Techpage)
There are a lot of scary things to worry about when it comes to security. Threats from malicious hackers are all around. Some break in to steal information and others do it as acts of vandalism. Few are the "idealized" hackers who do it just to prove...
ALA Membership Committee. (People & Places)
ALA has announced that Michael A. Golrick, Michael Gorman, and James R. Rettig have been elected to its executive board. Golrick is the city librarian at the Bridgeport (Conn.) Public Library. He was chair of both the ALA Membership Committee and...
An Easy Way to Perform Critical Updates
Tired of installing patches all day long? These medical library folks found a way to have their 160 PCs updated automatically.Do you spend too much time keeping Windows Critical Updates current? We've found a way to automate this task for a large number...
An Easy Way to Perform Critical Updates: Tired of Installing Patches All Day Long? These Medical Library Folks Found a Way to Have Their 160 PCs Updated Automatically
Do you spend too much time keeping Windows Critical Updates current? We've found a way to automate this task for a large number of computers with minimal effort. The William E. Laupus Health Sciences Library is directly connected to the second floor...
A Quick Guide to Basic Network Security Terms
From our combined experience in maintaining Web servers, we know that not a day goes by without attacks from intruders from around the world. We have learned a lot about locking out the bad guys, and the core concepts are encapsulated in this handy...
CIL Magazine Brought to Life at Annual CIL Conference in D.C
As the editor of Computers in Libraries magazine, I love being part of the annual Computers in Libraries conference because I think of it as a sort of "CIL Live" event. Rather than just reading people's e-mails and articles, I get to meet them for real...
CIL Magazine Brought to Life at Annual CIL Conference in D.C. (Newsline Reports)
As the editor of Computers in Libraries magazine, I love being part of the annual Computers in Libraries conference because I think of it as a sort of "CIL Live" event. Rather than just reading people's e-mails and articles, I get to meet them for...
Defending Your ILS against Security Threats
I've said it many times, in workshops, to co-workers, in some of the presentations I've given at conferences on security: "It's a very dangerous world," and it's getting more dangerous all the time. As shown in other features and columns in this issue...
Defending Your ILS against Security Threats. (the Systems Librarian)
I've said it many times, in workshops, to co-workers, in some of the presentations I've given at conferences on security: "It's a very dangerous world," and it's getting more dangerous all the time. As shown in other features and columns in this issue...
How Much Security Does Your Library Need?
Just like eating well, exercising, and getting health, following a few often protects your more effectively than trying to prevent every conceivable threat with overjealous security measures. How much should you worry about security? The answer...
Managing a 'Forest' of Servers and Documents
The University of California-Berkeley provides a good case study for thinking about... well, a whole lot of things, but certainly it's on the front lines of the crisis in computer security. Berkeley is a frequent target of hackers, and they have a lot...
Managing a 'Forest' of Servers and Documents. (Building Digital Libraries)
The University of California--Berkeley provides a good case study for thinking about ... well, a whole lot of things, but certainly it's on the front lines of the crisis in computer security. Berkeley is a frequent target of hackers, and they have...
O'Reilly Offers New Titles for Linux Users
Learning Red Hat Linux, 3rd edition (ISBN: 0-596-00469-9, $39.95), by Bill McCarty, provides a comprehensive entry to the world of Linux with new users in mind.Learning Red Hat Linux guides readers through the process of installing and running Red Hat...
O'Reilly Offers New Titles for Linux Users. (New Books)
Learning Red Hat Linux, 3rd edition (ISBN: 0-596-00469-9, $39.95), by Bill McCarty, provides a comprehensive entry to the world of Linux with new users in mind. Learning Red Hat Linux guides readers through the process of installing and running...
Password Security Is a Must for Any Organization
Network administrators should demand that all users log in with strong, secure passwords, and end users should play an active role in the security of data stored on their networks. Here's why:In today's network environment it is not unusual for organizations...
Password Security Is a Must for Any Organization. (Commentary)
Network administrators should demand that all users log in with strong, secure passwords, and end users should play an active role in the security of data stored on their networks. Here's why: In today's network environment it is not unusual for...
Security Blanket
Many of us remember having a security blanket when we were little. It may not have even been a blanket per se; it might have been a certain toy or object that made us feel safe. As we grew older, "security" came to mean different things, which inevitably...
Security Blanket. (Editor's Notes)
Many of us remember having a security blanket when we were little. It may not have even been a blanket per se; it might have been a certain toy or object that made us feel safe. As we grew older, "security" came to mean different things, which inevitably...
Security in the Library-Technology Brings a New Twist to an Old Problem
Security concerns may seem like a recent phenomenon brought on by new technology, as we worry about protecting our computer networks from malicious hackers and viruses, but we librarians have always been concerned about protecting our collections-and...
Security in the Library-Technology Brings a New Twist to an Old Problem. (Online Treasures)
Security concerns may seem like a recent phenomenon brought on by new technology, as we worry about protecting our computer networks from malicious hackers and viruses, but we librarians have always been concerned about protecting our collections--and...
Uncovering the Spy Network
Is Spyware Watching Your Library Computer?Spyware is considered by some people to be their worst nightmare. It is a new strain of software and hardware that has some good applications but a high potential for misuse. It is so devious that it could be...
Uncovering the 'Spy' Network: Is Spyware Watching Your Library Computers?
Thieves could be grabbing your passwords patron information and any other data stored on or keyed into your computers and most likely, you wouldn't even be aware it was happening. Spare is considered by some people to be their worst night mare....
Wilson Uses SFX Technology in WilsonLink, Expands Its Art & Social Sciences Databases
H.W. Wilson has announced WilsonLink, a component of the new WilsonWeb service that uses SFX technology. WilsonLink provides extensive linking features with other online database vendors.Powered by Ex Libris' SFX technology, WilsonLink allows researchers...
Wilson Uses SFX Technology in Wilsonlink, Expands Its Art & Social Sciences Databases. (Linking Initiatives)
H.W. Wilson has announced WilsonLink, a component of the new WilsonWeb service that uses SFX technology. WilsonLink provides extensive linking features with other online database vendors. Powered by Ex Libris' SFX technology, WilsonLink allows researchers...
You Are under Attack 24 Hours a Day, 7 Days a Week
Security is one of my favorite subjects to harp on. I hope that my baring our vulnerabilities and experiences in the past has lent some urgency to your dealing with these issues. It makes me look kind of stupid, but hey! If that saves you, then it's...
You Are under Attack 24 Hours a Day, 7 Days a Week. (the View from the Top Left Corner)
Security is one of my favorite subjects to harp on. I hope that my baring our vulnerabilities and experiences in the past has lent some urgency to your dealing with these issues. It makes me look kind of stupid, but hey! If that saves you, then it's...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.