Choose your java wisely…Written by Shashank
Continued from page 1
Well, so this “dilemma” is real and has to be looked after (you don’t stand a chance if you don’t). Many a times in java forums, you’ll find beginners with problem of “applet not initializing” and when compiling is targeted for 1.1, it runs. Preferably, developers should have latest version (despite huge bandwidth it’s going to cost you to download it) and they should try and keep their apps designed, if possible, for lower versions for a universal application. Although, this might not necessarily be imposed for a long time, but certainly try and keep your apps designed by java 1.4 specifications for a few weeks, till most of users catch on with tiger. This should also give you sufficient time to upgrade your programming ability version also. A recent survey about java’s versions had about 260 respondents out of which about 15% didn’t know that java had versions, 8% preferred java as good old java (can’t believe it, me neither), 29% were happy, 32% wanted newer versions but wanted syntax of older versions to remain and only bugs being killed and rest were too confused to have an opinion. On this note, its now entirely up to you to decide which is your cup of java. I’ve just got a book to learn to tame tiger and I’ll be using java 1.4 till I tame 1.5 good. So, I think it’ll be around October, when I start using 1.5 hoping (with crossed fingers) that most of users by then would be roaring with it. I hope that this small article would help you make a decision about which version of java to use.

Shashank is the founder and administrator of the java apps rating site - thejavahub.com. To know more about this venture with java, please visit his site at http://www.thejavahub.com
| | Open Sesame - Password SecurityWritten by Terrence F. Doheny
Continued from page 1
The human factor or social engineering contributes to password compromises. It is estimated that employees share their password eight times a year. Passwords can also be cajoled from untrained or naïve workers. The standard rule is NEVER share a password. Remember cliché of “Six Degrees of Separation.” You cannot know who will eventually end up with your password and own it. To cope with these issues, many leading edge firms are adopting a defense in depth strategy utilizing three elements to better safeguard their information The three layers of authentication consist of: What you know... A strong password or pass phrase What you have... A Crypto-key, smart card or token Who you are... A biometric aspect such as fingerprint, hand, or retinal recognition Usage of these three defensive measures will increase dramatically in future as people seek to thwart ever increasing threats to their private and personal information. Many companies will be mandating them as a significant part of their security best- practices to safeguard an extremely valuable asset: their treasured data. Article written by: Terrence F. Doheny, President of Beyond If Solutions, LLC. www.beyondifsolutions.com terry@beyondifsolutions.com © Copyright 2004, Terrence F. Doheny, Beyond If Solutions, LLC

Terrence F. Doheny is the President of Beyond If Solutions, LLC. www.beyondifsolutions.com terry@beyondifsolutions.com © Copyright 2004, Terrence F. Doheny, Beyond If Solutions, LLC
|