My WebLink
|
Help
|
About
|
Sign Out
Home
2002-09-26_PWETC_AgendaPacket
Roseville
>
Commissions, Watershed District and HRA
>
Public Works Environment and Transportation Commission
>
Agendas and Packets
>
200x
>
2002
>
2002-09-26_PWETC_AgendaPacket
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/22/2010 2:55:45 PM
Creation date
6/14/2005 12:19:00 PM
Metadata
Fields
Template:
Commission/Committee
Commission/Authority Name
Public Works Commission
Commission/Committee - Document Type
Agenda/Packet
Commission/Committee - Meeting Date
9/26/2002
Commission/Committee - Meeting Type
Regular
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
38
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />1',/ <br />,,I' <br /> <br />,};,~ <br /> <br />. <br /> <br />cussion. The meetings begin with a <br />salutt, to the f].lg ;:md a roll call, lhen <br />minutes are taken by the public works <br />department secretmy. <br />The items taken up arc very much <br />like the ones thut used to come to the <br />city council. On a recent agenda, the <br />commission considered moving a stop <br />sign farther into the sight of lines of on~ <br />coming drivers; creating a four-way stop <br />011 an ;.trterial dose to a new business; <br />and sening aside a new disabled space in <br />a downtown parking lot. <br />Maybe not the stuff of dreams, but <br />these are the kinds of things that people <br />"1re about Clnd want to do right, which <br />is to say fairly and equitably. 1~1lking <br />about them seems to make everyone feel <br />like it player. Whatever the rcason, the <br />commission is a hit with the public. Peo~ <br />pie who come to its meetings always <br />comment on how interesting they art' <br />and how much they have learned. In dty <br />governmt'nt, it doesn't get any better <br />Ihan thaI! <br />eil)' staff members are happy, too, <br />They collle to the commission table with <br />a wealth of information they are happy <br />to contribute to discussions. Because <br />they have a place at the table with the <br />public and council members, stafr mel11~ <br />bel'S tell LIS they are able to see more <br />about how the political side of things <br />works, <br />Since the P&T Commission began, <br />it has not had one shaky voice or boil" <br />ing temper impeding its forward <br />progress. There is something calming <br />about the roundtable approach. per- <br />haps the eye contact it requires. Sonora <br />has found that people seem more able <br />to listen to each other and more likt.!y <br />to consider 'ideas that differ from their <br />own. Let us just emphasize that <br />Sonora's commission is for all the peo- <br />ple and not just for the squeaky wheels <br />of this world. Come to think of it, we <br />don't hear much from those folks any~ <br />marc. I wonder why. DiD <br /> <br />Liz B(ISS is the mayor of SO/10m, CalUor- <br />Ilia, and Greg Applegate is thl' city admill- <br />istmtor there. <br /> <br />22 <br /> <br />3,,(\""1; <br />. -~ <br /> <br />PM <br /> <br />Mobile Code Threats: Seven Suggestions for <br />Safeguarding Your Organization <br /> <br />If you browse the Web, will your com pUler get hit by malicious lava? If you surf <br />an unknown Web site, will an ActiveX component send your spreadsheets to <br />Bulgaria! The terms may sound unfamiliar, but the risk is real. Some of the <br />mohile code lechnologies now emerging are riddled with security holes. At any <br />time. even hostile companies or foreign nations could decide to use mobile code <br />as an offensive medium. In the future, virus experts expect that the number of <br />stationary mobile code threats can only grow. Is your local government prepared? <br />Here are seven increasingly secure (and obtrusive) security suggestions for <br />protection against malicious mobile code: <br /> <br />1. Run anti-malware software on all desktops, servers, and gateways. <br />2. Install URI.-blocking software at the gatewall or the desktop. <br />3. Only allow ActiveX from a limited set of authenlicated providers. <br />4. Configure Web browsers to reject automatically all Java applets that request' <br />additional access to the local computer, or configure the major browsers to <br />allow only properly signed Java apple" from a set of trusted partners of <br />your local government. <br />5_ Configure your desktop browser software, first, to prevent it from aUowing <br />users to add additional trusted signatures on their own and. second, to deny <br />automatically all requests by JavaScript, VBScript. etc" to access the local <br />machine resources. . <br />6. Obtain the latest patches from your Web browser and e-mail products. <br />7. Install software to filter executable files/strip macros from incoming e-mail <br />and "http" traffic. <br /> <br />Glossary of Terms <br /> <br />ActlveX: A scripting technology that allows full access to the Windows operat- <br />ing system. ActiveX enables software components to interact with one another <br />in a networked environment. For example, ActiveX technologies allow a user to <br />view Word documents within an Internet Explorer Web browser. <br /> <br />Mobile code: Scripting technologies used in Web programming language. <br />Mobile code uses legitimate technologies as pathways for introducing malicious <br />code, which may destroy programs and compromise system integrity. <br /> <br />Anti-malware: Software that works against destructive programs (malware). <br /> <br />VBScript: Visual basic scripting (VBS) is a scripting language for Web design, <br />like JavaScript. <br /> <br />Gateway: [n networking, the linking point between a private network and a <br />public network (Internet). <br /> <br />Firewall: A security tool designed to prevent unauthorized access to or from a <br />private network. fircwalls arc frequently used to prevent unauthorized Internet <br />users from accessing private networks connected to the Internet. All messages <br />entering or leaving a protected network pass through the fi~wan, which exam~ <br />ines each message and blocks those that do not meet the specified security cri- <br />teria. It is almost like an invisible barrier that protects a network or computer. <br /> <br />Executable content: A program or series of commands that is designed to <br />"run" itself (an "exe" file). <br /> <br />Heuristics: Self-learning programs that search your computer for unusual <br />processes that might be virus related. <br /> <br />-Rob Clyde, Chief Technologist <br />Symanrec Enterprise Solutions Division, Cupertino. California <br /> <br />NOVEMBER 2001 <br /> <br />. <br />
The URL can be used to link to this page
Your browser does not support the video tag.