'Did you hear...'

Live from Baghdad. Keep up with the latest official news in Iraq via an English-language version of uruklink.net, the state-run Internet service. Besides postings about Saddam Hussein, Uruklink reports sorties by U.S. and British aircraft, headlined as 'Evil Ravens.' Oddly, it also links to WhiteHouse.gov through www.iraqtv.ws, and the accompanying translations include anti-Saddam propaganda.

Human genome party. Sounds risqu', but the Northern Virginia Technology Council is sponsoring the party, with liquid refreshments, at the Reagan Building in Washington April 9. 8Booleans. Did you ever wonder how to type a search engine query that retrieves the desired result with no junk hits? Visit searchengineshowdown.com for the lowdown on defaults, metasearches and proximity. Compiled by Greg R. Notess, the site also carries news about the fast-consolidating search engine market.

WWWeirdness. Incidentally, there's even a paranormal search engine, at Paraseek.com. What do you call a broker of Web real estate? A surrealtor.

Snort. After last month's brouhaha over a security flaw in Sendmail e-mail transfer freeware, vendors of commercial and open-source security software rushed forward with Band-Aids. Lurhq Corp. of Chicago released a free detector patch for the Snort open-source network intrusion sniffer. To our amazement, we detected a few sites poking fun at Snort. Visit www.counterhack.net/unusual_devices_running_snort.html for handy uses of Snort with TV remote controls and robotic pets, and read the cautionary tale of Spider-Hack, an infosecurity superhero. Be a hero, write a tale for [email protected].


  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/Shutterstock.com)

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.