Sunday, August 28, 2005

Word of the Day: captive portal

WhatIs.com: Word of the Day
August 29, 2005
___________________________________

ISSUE SPONSORED BY: iLumin

......................................................................
IN THIS ISSUE

-- Word of the Day: captive portal
-- Today's Tech News
-- Brain Food
-- Additions and Updates

::::::::::::::::::::::::::::: SPONSOR :::::::::::::::::::::::::::::::

iLumin

Lesson 1 Technicalities of E-mail Archiving
E-mail archiving is now more than just about the ability to store and
retrieve old e-mail messages. Companies must now meet new, tougher
federal and security regulations enforced by savvy auditors who know
what to look for and expect pertinent messages to be retrieved in
days, hours or even minutes. This webcast examines the latest
features e-mail archiving products offer and which ones give
companies an edge in keeping their organizations legit.
Click Here:
http://ad.doubleclick.net/adi/swht/em;pos=2;emc=47;gci=526288;sz=1x1;ptile=2;ord=556520150?tt=1

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

TODAY'S WORD: captive portal

A is a Web page that the user of a public-access network is obliged
to view and interact with before access is granted. Captive portals
are typically used by business centers, airports, hotel lobbies,
coffee shops, and other venues that offer free Wi-Fi hot spots for
Internet users.

When a potential user first logs on to a network with a captive
portal, a Web page is encountered that requires certain actions
before Internet access is granted. A simple captive portal forces the
user to at least look at (if not read) an acceptable use policy (AUP)
page, and then click on a button indicating agreement to the terms of
the policy. Presumably, this can help absolve the provider from
liability in the event the user commits criminal or other destructive
activity while logged on. In some captive portals, advertisements for
the provider's sponsors are displayed, and the user must click
through them or close the windows in which they appear before
accessing the Internet. Some captive portals require the entry of a
pre-assigned user ID and password before accessing the Internet. Such
authentication may discourage the use of wireless hot spots as sites
for carrying on criminal activities. Most servers with captive
portals include anti-virus and firewall programs to help protect
users' computers from the Internet and from each other.

Even when a simple captive portal is used in a free public-access
network, certain people may repeatedly connect, using the network on
an almost continuous basis to download music, videos, or other large
files. This activity, called bandwidth hogging, can be minimized by
additional programming in the captive portal. Such programming can
control the speed at which large files are downloaded, limit the size
(in kilobytes or megabytes) of files that can be downloaded, restrict
the number of downloads that can occur in a single session, or block
connection to Web sites commonly used for downloading large files.
This is called bandwidth throttling or traffic shaping.

SEE OUR COMPLETE DEFINITION, WITH HYPERLINKS:
http://searchmobilecomputing.techtarget.com/sDefinition/0,290660,sid40_gci1117395,00.html?track=NL-34&ad=526288

RELATED CONTENT:

PatronSoft offers a Windows-based captive portal program called
FirstSpot.
http://www.patronsoft.com/firstspot/

WifiDog is a captive portal solution for Linux-based networks.
http://www.wifidog.org/tiki-index.php?page=Wifidog

Tom's Networking describes how to create a captive portal.
http://www.tomsnetworking.com/Sections-article92-page1.php

TODAY'S TECH NEWS
......................................................................

ANTIVIRUS CAN INTRODUCE DANGEROUS NETWORK SECURITY HOLES INTO ANY OS
| SearchSecurity.com
AV software is one of the most basic security steps available. It's
also yet another gateway for security breaches.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1118312,00.html?track=NL-34&ad=526288

COMMENTARY: SAP'S MIGRATION DILEMMA | SearchSAP.com
As SAP moves forward with aggressive plans to upgrade its customers,
and move them to NetWeaver and mySAP Business Suite, the decision to
move -- albeit a hard one --may be simple compared to the challenge
of making sure the migration works well.
http://searchsap.techtarget.com/originalContent/0,289142,sid21_gci1117927,00.html?track=NL-34&ad=526288

CARBON NANOTUBE TECHNOLOGY, CLOSER THAN YOU THINK |
SearchDataCenter.com
Carbon nanotubes, seamless cylinders of carbon thousands of times
thinner than a human hair, could be used to cram transistors onto
chips. But in the shorter term they might keep your servers cool.
http://searchdatacenter.techtarget.com/originalContent/0,289142,sid80_gci1119403,00.html?track=NL-34&ad=526288

MORE TECH NEWS
Catch up on all the latest IT news!
http://searchtechtarget.techtarget.com/gateway/news?track=NL-34&ad=526288


BRAIN FOOD
......................................................................

SECRET WORD OF THE DAY
This "tasty" term is information that a Web site puts on your hard
disk so that it can remember something about you at a later time.
Hint: Some like to dunk it in milk. What is it?

Answer
http://Searchenterpriselinux.techtarget.com/sDefinition/0,,sid39_gci211838,00.html?track=NL-34&ad=526288&offer=dq

TODAY'S TRIVIA QUESTION
On the Web, nagware is programming that presents the user with:
a. pop-up windows or alerts
b. an e-mail virus
c. the blue screen of death

Answer
http://Searchenterpriselinux.techtarget.com/sDefinition/0,,sid39_gci860960,00.html?track=NL-34&ad=526288&offer=dq

IT ALPHABET SOUP
BGP is a protocol for exchanging routing information between gateway
hosts in a network of autonomous systems. What does BGP stand for?
a. Border Gateway Protocol
b. Basic Gateway Procedures
c. Broader Gateway PCs

Answer
http://Searchenterpriselinux.techtarget.com/sDefinition/0,,sid44_gci213813,00.html?track=NL-34&ad=526288&offer=dq

LEARNING CENTER: DON'T LET LAPTOPS INFECT YOUR NETWORK |
SearchWindowsSecurity.com
Personal firewalls help secure those laptops most likely to roam from
your corporate network and return bearing malware gifts. The Windows
XP SP2 firewall might not be enough to handle the security threat,
according to site expert Kevin Beaver and other Windows
professionals.
http://searchwindowssecurity.techtarget.com/tip/1,289483,sid45_gci1118952,00.html?track=NL-34&ad=526288

ADDITIONS AND UPDATES
......................................................................

clean room
http://whatis.techtarget.com/definition/0,289893,sid9_gci1117411,00.html?track=NL-34&ad=526288

Quagga
http://searchenterpriselinux.techtarget.com/sDefinition/0,290660,sid39_gci1117556,00.html?track=NL-34&ad=526288

ICE (In Case of Emergency)
http://whatis.techtarget.com/definition/0,289893,sid9_gci1118419,00.html?track=NL-34&ad=526288

insider threat
http://searchsecurity.techtarget.com/sDefinition/0,290660,sid14_gci1117699,00.html?track=NL-34&ad=526288

Nagios
http://searchenterpriselinux.techtarget.com/sDefinition/0,290660,sid39_gci1117704,00.html?track=NL-34&ad=526288

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CONTACT US:

Sales
For sales inquiries, please contact us at:
mailto:bmcgovern@techtarget.com

Editorial
For feedback about any of our articles or to send us your article
ideas, please contact us at:
mailto:lthing@techtarget.com

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

ABOUT THIS E-NEWSLETTER

This e-newsletter is published by WhatIs.com, a targeted Web
site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2005 TechTarget. All rights reserved.

_____________________________________________________________________

To unsubscribe from "Word of the Day":

Go to unsubscribe: http://WhatIs.com/u?em=pet.computter%40gmail.com&uid=3058509&cid=526288&track=NL-34

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
WhatIs
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494