Error 404--Not Found

Error 404--Not Found

From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:

10.4.5 404 Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent.

If the server does not wish to make this information available to the client, the status code 403 (Forbidden) can be used instead. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address.



Search and DocFinder
 
Search help/advanced search

 


News NetFlash: Daily News Internat'l News This Week in NW The Edge Net.Worker Features Research Buyer's Guides Reviews Technology Primers Vendor Profiles Forums Columnists Knowledgebase Help Desk Dr. Intranet Gearhead Careers Free Newsletters Subscription Center Seminars/Events Reprints/Links White Papers Partner with Us Site Map Contact Us Awards Corporate info Home
Error 404--Not Found

Error 404--Not Found

From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:

10.4.5 404 Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent.

If the server does not wish to make this information available to the client, the status code 403 (Forbidden) can be used instead. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address.







Webcasts
  

Security Showdown

ComNet 2001 audio coverage

Listen to the RealAudio broadcast

It's a jungle out there - and maybe inside your company as well. With denial of service attacks, Web site vandalism, identity theft, loss of customer information, theft of credit card numbers and a whole raft of other threats to your network and your corporate data, finding the right security technologies and partners is critical to your survival today. In this unique debate format, you'll hear the leading security companies as answer questions from panelists, each other and the audience - without the aid of Powerpoint presentations and scripted answers. In this no-holds-barred debate, you'll see which company has the best strategy and products.

Moderator:
  • John Gallant, editorial director of Network World

Participants:
  • Greg Smith, director of product marketing at Check Point Software Technologies, Inc.
    Greg is responsible for the management of product and technical marketing programs for Check Point's industry-leading FireWall-1 enterprise security solution. Prior to joining Check Point, Smith was a senior product marketing engineer for Advanced Micro Devices, where he was responsible for product management and marketing for AMD's Ethernet and Fast Ethernet networking product lines.
  • Marvin Dickerson, director of product management at PGP Security
    PGP Security is a business unit of Network Associates. Marvin is responsible for the positioning, promotion, pricing and direction or the company's firewall, virtual private network and intrusion detection products. Dickerson began his career at PGP Security with the acquisition of Trusted Information Systems in 1998, where he worked in product management.
  • Simon Perry, vice president of Security Solutions at Computer Associates International Inc.
    Simon is responsible for overseeing CA's security initiatives, with a special focus on CA's eTrust, a comprehensive security suite with solutions that include risk assessment, attack detection and loss prevention. With more than 15 years in the software industry, Perry is a recognized authority on corporate and personal electronic asset protection. He consults with CIOs and CEOs on how security is used as a business enabler and has addressed the FBI on Internet and commercial security.
  • Dr. Bob Blakley, chief scientist, security for Tivoli Systems
    Dr. Blakley was chief scientist for DASCOM, Inc. at the time of its acquisition by IBM and integration into Tivoli. Before joining DASCOM, Dr. Blakley was lead security architect for IBM where he was employed for nine years. During that time he was responsible for security architecture and design for OS/2, the IBM OS/2 LAN server, IBM's OS/2 and AIX DCE offerings, the LAN distance remote LAN access product, and IBM's ORB technologies, including Distributed SOM and Component Broker.
  • Robert Clyde, vice president and chief technologist for the Enterprise Solutions Division at Symantec
    Robert is a true trailblazer in the information security industry. From as early as high school, Clyde wrote -- and later patented -- the first computer surveillance program. While attending Brigham Young University, Clyde invented the first commercially available intrusion detection system. This highly innovative security program later evolved into AXENT's award-winning Intruder Alert(tm), which protects organizations against the latest hack attacks. Symantec recently acquired AXENT.

Expert Panel:
  • Kevin Tolly, president and CEO, The Tolly Group
    Kevin Tolly is president and chief executive officer of The Tolly Group/Tolly Research. The Tolly Group is the internationally recognized consulting and custom-testing organization he founded over a decade ago. His latest vision has been to extend traditional IT consulting services into new realms with the establishment of Tolly Research, a testing-based research service that publishes hands-on data reports about key emerging technologies in enterprise networks.
  • Robert Aanerud, trusted security advisor, Guardent Inc.
    Mr. Aanerud is universally respected and renowned in the information security industry for his expertise in identifying and managing the organizational and technological implications of implementing new security architectures, policies, procedures, and solutions across multinational organizations. In his new role with Guardent, he will work alongside Guardent Chief Awareness Officer, Thornton May, to help Global 1000 top executives understand and proactively address the most critical issues related to information security and privacy.

Listen to the RealAudio broadcast


Free RealPlayer

Send this article to a colleague

Recipient's name:

Recipient's e-mail:
Your name:

Your e-mail:
Comments:

Feedback

Tell us your thoughts on this article or the issues raised in it. We'll cc: the author and editors on all comments.

Comments:

Name:
E-mail address:

Can we post your comments in an online forum on the topic?
Yes No

What did you think of this article?
Very useful Somewhat useful Not at all useful

Would you want to see:
More articles on this topic
Fewer articles on this topic

Thank you! When you click Submit, you'll be taken back to this article.

More ComNet broadcasts

Latest ComNet 2001 news:



Responsible for insuring the safety of your network?

NWFusion offers two FREE security e-mail newsletters to help you keep your enterprise network secure.

Click here to sign-up.

Advertisement:


Editorial Partners program
Three free and easy ways to bring Network World's in-depth editorial content to your own Web site.
Learn more