`Scanner' eyes Y2K bugs in e-mail attachments

McNamara, Paul
May 1999
Network World;05/31/99, Vol. 16 Issue 22, p37
Trade Publication
Features Y2K Scanner, a plug-in server module from Centennial that works with Trend Micro's InterScan VirusWall to discover year 2000 (Y2K) flaws in files created by spreadsheets. Detection of Y2K problems inside electronic-mail attachments before attachments enter or leave corporate networks; Use of Centennial 2000 Pro Enterprise edition to fix defects.


Related Articles

  • Should You Upgrade? Goldsborough, Reid // Consumers' Research Magazine;Sep99, Vol. 82 Issue 9, p32 

    Talks about upgrading computers for Year 2000 date conversion problem. Pitfalls on upgrading; Arguments against computer hardware components; Most persuasive reason for not upgrading hardware peacemeal.

  • What to Do when the chips fall. Fickes, Michael // Waste Age;Aug99, Vol. 30 Issue 8, p80 

    Lists the things that must be accomplished in order to cushion one's company from the year 2000 (Y2K) date conversion problems. Need to fix a company's own hardware and software; Need to prepare for the probability that not everyone will fix their hardware and software; Domino effect of the Y2K...

  • Products readied to tackle year-2000 issue. Weil, Nancy // InfoWorld;01/12/98, Vol. 20 Issue 2, p19 

    Describes the products launched by Computer Associates, Digital Semiconductor and CyberGuard to tackle the year-2000 computer conversion issue. CA-Fix/2000 software offered on a metered pricing scale, based on the number of lines of code a company needs to change; Plug-in clock/CMOS RAM chip...

  • Y2K target keeps moving. Fontana, John // Network World;10/18/99, Vol. 16 Issue 42, p1 

    Reports on findings that a number of software and hardware products once evaluated as Year 2000 date conversion (Y2K) compliant are showing vulnerabilities to the Y2K problem. Repeat remediation work being done on work previously considered complete by information technology executives;...

  • Server operating systems need tender Y2K care. Burns, Christine // Network World;04/12/99, Vol. 16 Issue 15, p14 

    Part II. Focuses on the Year 2000 problem in the server hardware. Server operating system software's replication of the incorrect date across the network; Y2K-compliant software.

  • Vendors changing their Y2K minds. Mcnamara, Paul // Network World;03/22/99, Vol. 16 Issue 12, p37 

    Reports the data compiled by Infoliant which monitors year 2000 (Y2K) date conversion compliance information for computer network applications and computer hardware products. Percentage of changes in Y2K compliance status for applications and products; Categories in Y2K compliance status.

  • Y2K Information Coordination Center Forming.  // American Gas;Sep99, Vol. 81 Issue 8, p8 

    Reports on the formation of the President's Council Year 2000 Information Coordination Center in the United States which will cover the events when the world's computers switch over to a new century. Functions of ICC; Initial concept within the natural gas and oil industries; Readiness date for...

  • Director's duties and liabilities for year 2000... Fallon, Geoffrey D. // NACD Directorship;Apr97, Vol. 23 Issue 4, p6 

    Reports that the potentially huge and costly impact of the year 2000 problem (Y2K) may have on computer systems. The estimated costs to fix the Y2K problem; Director's responsibilities in connection with corporate information system; The Y2K risk to directors; Limiting director liability for...

  • Still Asleep at the Wheel? Reeder, Franklin S. // Government Executive;Jul99, Vol. 31 Issue 7, p104 

    Discusses how the year 2000 computer problem (Y2K) showed the significance of giving attention to information technology management. Contingency planning for Y2K; Why inattention to computer security borders on management malpractice; How to determine the vulnerability of computer systems.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics