Reader’s horror stories: Harking back to the days of 5.25-inch diskettes, one IT pro recalls troubleshooting a problem caused by a secretary who rendered disks unreadable by loading them up with data the old-fashioned way. Read that one, and others, right here (scroll down the page). Security: It’s an interesting question Roger Grimes poses in IIS vs. Apache: Re-examining the stats. Can IP addresses ever be used for statistical analysis of malicious Web sites? “It was with surprise then that I read another of Google’s recent studies purporting that IIS Web servers were twice as likely to contain malware as Apache Web servers,” he explains. Personal experience tells him otherwise. “Most Web sites are not maliciously modified by individual hackers. Like client-side attacks, most Web site infections are automated.” And the most popular tool for doing so infects PHP-based sites. Gripe Line: Yahoo’s greylist procedures get into a grey area — and such that one reader has taken to calling a particular division of the company Yahoo Customer Disservice. He works for a public library that offers opt-in e-mail notices for overdue books, items soon to be due back, books the library is holding for someone, and that sort of thing. After filling out the whitelist application, the library received an email with a request for more information. “This would be lovely except for the minor detail that Yahoo rejects all our mail so that I cannot send a message to a Yahoo account in order to extract all the headers,” he writes in this Gripe Line post. Yahoo’s approach, ultimately, may cause more headaches to legitimate senders than to spammers. Software Development