Search This Blog

Wednesday, August 31, 2005

Re: rules for FTP access

Manuel Mely wrote:
>>my problem is that I am not able to enable ftp connections ...
>
>
> All you have to do is to permit ftp connections in your firewall ;)
>
> iptables -A INPUT -i ??? -s ??? -p tcp --dport 20:21 -j ACCEPT

but, once I have loaded contrack ftp modules and I want to permit ftp
client connections from my private subnet, which is behind eth1, to
Internet through eth0, I should do:

iptables -A FORWARD -i eth1 -o eth0 -p tcp --dport 20:21 -j ACCEPT

is it right?

I am sorry but it is not long time that I'm playing with iptables and
firewalls...:-)

thanks, fabrizio.

>
> Also, enable ip_nat_ftp module and ip_conntrack_ftp!
>
> Salu2
> Mely
>
>
> On Wed, 2005-08-31 at 15:07 +0200, Fabrizio Sannicolo' wrote:
>
>>dear Sir/Madam,
>>
>>I have a linux box (sarge) as router/firewall in my organization. At the
>>moment that Linux box has 3 ethernet cards as follows:
>>
>>eth0 with public IP
>>eth1 private subnet
>>eth2 DMZ and WiFi
>>
>>I use iptables to forward traffic from Intranet to Internet and
>>viceversa using a rule such as
>>
>>iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to-source $SERV_EXT
>>
>>I also enable specific services with rules such as
>>
>> -m state
>>--state NEW -j ACCEPT
>>
>>or
>>
>>iptables -A FORWARD -i eth1 -o eth0 -p tcp --dport 80 -m state --state
>>NEW -j ACCEPT
>>
>>for any chain I let ESTABLISHED and RELATED connection...
>>
>>iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
>>
>>
>>and, at the end of each chain (INPUT, OUTPUT and FORWARD), I put
>>
>>iptables -A INPUT -j DROP
>>
>>my problem is that I am not able to enable ftp connections ...
>>
>>Could you help me, please?
>>
>>thanks, fabrizio.
>>
>>

--
To UNSUBSCRIBE, email to debian-firewall-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

eSecurity News Summer 2005: Proven Security Made Better

((((((((((((((((((( McAfee eSecurity News ))))))))))))))))))

[ This message is brought to you as a subscriber to the
McAfee Dispatch. If you wish to no longer wish to receive
email from McAfee, please unsubscribe at the bottom of this
message. ]

============================================================
eSecurity News * Summer 2005 * McAfee(r), Inc.
............................................................
Proven Security
McAfee Protects over 100 million computers worldwide
============================================================

In this issue:

Virus Watch | Firewall Forum | Anti-Spyware Alley
Anti-Spam Central

Special Offer:
$49.99 for new McAfee Home Wireless Network Security

============================================================
Virus Watch
------------------------------------------------------------
Viruses Still Cost: Virus attacks (ahead of hackers, spyware
and other threats) were again the source of the greatest
financial losses, accounting for 32% of the overall losses
reported.*
============================================================

Are you being protected by our improved anti-virus engine?
To help detect, quarantine and block evolving threats,
McAfee VirusScan(r) now features:

o New! Spyware blocking on access -- helps stop
potentially unwanted programs (PUPs) like key-loggers
and Web dialers -- which can rob personally identifiable
information or redirect your surfing -- before they try
to install or launch on your system.

o New! Daily virus definition updates (DATs) -- they
download faster, smaller and timelier anti-virus
protection, critical during virus outbreaks.

o New! Inline file cleaning -- speeds virus disinfection
of compromised programs with less interruption to your
work.

*Source: Tenth Annual Computer Crime and Security Survey,
Computer Security Institute (CSI), July 2005

--> Get New McAfee VirusScan

o New Users
http://us.mcafee.com/root/package.asp?pkgid=100

o Upgrade Center
http://us.mcafee.com/root/upgradecenter.asp

o Current Subscribers
http://us.mcafee.com/root/myAccount.asp

--> Top Viruses Tracked by AVERT
http://us.mcafee.com/virusInfo/default.asp

============================================================
Firewall Forum
------------------------------------------------------------
ID Theft Non-Stop: Nearly 1 million users have suffered from
identity theft fraud, costing banks and card issuers $1.2
billion in direct losses in the past year.*
============================================================

Providing greater control over your anti-hacking security,
McAfee Personal Firewall Plus now features:

o New! Granular access control -- grants immediate,
current-session-only Internet access to specific
programs (e.g., music or Flash-based applications),
rather than riskier "always allow" or "never allow"
permissions.

o New! Silent, "load-and-go" installation -- gets upgraded
firewall protection up and running fast without slowing
your work.

o New! Smart full screen mode -- auto detects and
temporarily suspends pop-up messages and alerts for
uninterrupted online entertainment and gaming sessions.

*Source: Phishing Victims Likely Will Suffer Identity Theft
Fraud, A. Litan, Gartner, May 2005

--> Get New McAfee Personal Firewall Plus

o New Users
http://us.mcafee.com/root/package.asp?pkgid=103

o Upgrade Center
http://us.mcafee.com/root/upgradecenter.asp

o Current Subscribers
http://us.mcafee.com/root/myAccount.asp

>>>>>>>>>>>>>>>>>>> MCAFEE STORE SPECIAL <<<<<<<<<<<<<<<<<<<

60%* of home wireless networks are unsafe
from Wi-Fi(r) hijackers!

Stay safe with new McAfee Wireless Home Network Security.

-Protects your wireless network and data, safeguards
transactions sent over Wi-Fi
-Encrypts personal information, rotating your security
key every 3 hours
-Blocks hackers from hijacking or "freeloading" on
your connection
-Allows trusted friends and family to easily connect to
your network
-Protects up to 5 PCs
-Easy to install

Buy it now for only $49.99 thru Sept. 16, 2005 here:
http://us.mcafee.com/root/campaign.asp?cid=16350

Learn more here:
http://us.mcafee.com/root/package.asp?pkgid=250

*Source: www.worldwidewardrive.org

Mobile Pipeline (August 2005): "...impressive product
provides strong security, ease of use, and compatibility
across several major brands of routers... along with a
feature, automatic key rotation, that typically is found
on higher-end WLAN security products."

============================================================
Anti-Spyware Alley
------------------------------------------------------------
PUPs Getting Worse: 12% increase in the number of new
potentially unwanted programs (like spyware and adware)
created in Q2 2005 vs. Q1 2005.*
============================================================

For your protection against this increasing tide of
privacy and PC performance threats, we've upgraded
McAfee AntiSpyware with:

o New! Cookie tracking -- allows you to detect and remove
monitoring cookies, which can report your surfing habits
and additional personal information for online advertisers
and other third parties.

o New! System monitors -- pro-actively alert you if
malicious programs attack start-up programs, browser
settings, registry settings or your host file, helping
root out potentially unwanted programs (PUPs) before they
compromise your privacy.

o New! Anti-browser hijack prevention -- lets you restore
browser settings, home pages, ActiveX settings, security
settings, toolbars and trusted sites with a single click.

*Source: Top Threats for Q2 2005, McAfee AVERT, July 2005

--> Get New McAfee AntiSpyware

o New Users
http://us.mcafee.com/root/package.asp?pkgid=206

o Upgrade Center
http://us.mcafee.com/root/upgradecenter.asp

============================================================
Anti-Spam Central
------------------------------------------------------------
Phishing Exploding: One leading anti-Phishing consortium
estimates that 75 million to 150 million Phishing e-mails
are sent every day on the Internet.*
============================================================

Make sure your anti-spam protection can keep up with this
growing identity theft tactic. For your security, we've
given McAfee SpamKiller(r):

o New! Anti-Phishing Internet Explorer plug-in -- helps
prevent identity theft by alerting you if you are being
directed to a known or potentially fraudulent website
where online thieves hope to trick you into divulging
confidential information like passwords and credit card
numbers.

o New! Improved anti-spam engine -- uses advanced
meta-character filtering and "junk text" identification
to block more incoming spam, like text disguised with
wildcard characters (e.g., Viag*ra).

o New! Streamlined set-up and configuration -- automatically
detects, installs and merges new protection for all email
accounts guarded by SpamKiller, saving time and guesswork.

*Source: McAfee Virtual Criminology Report, July 2005

--> Get New McAfee SpamKiller

o New Users
http://us.mcafee.com/root/package.asp?pkgid=156

o Upgrade Center
http://us.mcafee.com/root/upgradecenter.asp

o Current Subscribers
http://us.mcafee.com/root/myAccount.asp

------------------------------------------------------------
QuickLinks

o Bundle Center
http://us.mcafee.com/root/bundles.asp?cid=9909

o Free Services
http://us.mcafee.com/root/catalog.asp?catid=free

o McAfee Upgrade Center
http://us.mcafee.com/root/upgradecenter.asp

o PC Performance
http://us.mcafee.com/root/catalog.asp?catid=pc

------------------------------------------------------------

[ You are currently subscribed as: security.world@gmail.com ]

Subscribe: If you received this message from a friend and
would like to subscribe to eSecurity News, virus alerts
and special offers, visit:
http://us.mcafee.com/root/campaign.asp?cid=9843

Unsubscribe: http://dispatch.mcafee.com/us/unsub.asp

McAfee Support: Got a product question? Visit:
http://us.mcafee.com/root/campaign.asp?cid=9842

Legal Note: This software does not guarantee protection
against all possible threats. Offers subject to change
without notice. Offers may vary on http://www.mcafee.com

View our privacy policy:
http://us.mcafee.com/root/campaign.asp?cid=8207

Technical Note: SpamKiller supports MSN/Hotmail, POP3 and
MAPI email accounts, but currently does not filter AOL,
Yahoo! or other Web-based email. Most Internet email
systems use POP3 accounts. By directly supporting multiple
client-based email applications (Outlook Express, Eudora,
Netscape etc.) and Web-based email clients (MSN/Hotmail),
SpamKiller enables you to benefit from its advanced
filtering without forcing you to change how you access
and read your email.

McAfee, SpamKiller and VirusScan are registered trademarks
or trademarks of McAfee, Inc. and/or its affiliates in the
US and/or other countries. All other registered and
unregistered trademarks herein are the sole property of
their respective owners.

3965 Freedom Circle, Santa Clara, CA 95054 (408) 992-8599
(c) 2005, McAfee, Inc. All Rights Reserved.

New Release! Download Cloudscape Version 10.1

_______________________________________________________________________

This mail is never sent unsolicited. This is a JupiterWeb mailing.
You elected to receive this third party message at a JupiterWeb site. (Go to
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,ioaa,6tcd,co7e,jjlo
for a complete listing). ClickZ, DevX, EarthWeb, Graphics.com and internet.com are
JupiterWeb networks.
_______________________________________________________________________

Get Free Developer Whitepapers and Tools!

** New Release: Download Cloudscape Version 10.1!
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,5fnj,mk,co7e,jjlo

** Whitepaper: The 20 Commandments of Software Packaging
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,8bst,3qgd,co7e,jjlo

** MSDN Webcast: Microsoft Studio Tools for Office--Open Forum
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,99b1,awn3,co7e,jjlo

** Whitepaper: Strategies for Architecting High Performance J2EE Applications
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,jyjf,4fli,co7e,jjlo

** Whitepaper: Why Move from Windows NT to SUSE LINUX?
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,jnu3,52cz,co7e,jjlo

** On-Demand Webcast: Introduction to UML2
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,c687,1irk,co7e,jjlo

** Download: Write 10,000 Lines of Code in 10 Minutes with Iron Speed Designer
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,9h8q,gdsh,co7e,jjlo

** Tutorial: Eclipse for Visual Studio Developers
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,g575,i0te,co7e,jjlo

** Special Offer! Free 30-Day Trial: Quickbase for Project Management
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,f4hm,f4s1,co7e,jjlo

** What's New in Visual Basic and C# for Visual Studio 2005?
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,hazs,cusx,co7e,jjlo

** Download: Toad for Oracle
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,c0bp,f0ey,co7e,jjlo

** Download: Automate Excel Reporting with SoftWidgets Spread Server.
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,acgt,8miy,co7e,jjlo

__________________________________________________________________

New Release: Download Cloudscape Version 10.1!
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,5fnj,mk,co7e,jjlo

New functionality, new support, expanded capabilities! Download Cloudscape, the
small-footprint database, based on the open-source Apache Derby, for developers building
Windows, Java and Linux applications.
__________________________________________________________________

Whitepaper: The 20 Commandments of Software Packaging
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,8bst,3qgd,co7e,jjlo

Software packaging expert Nelson Ruest has compiled "The 20 Commandments of Software
Packaging", a comprehensive list of tasks you should perform to ensure software packages
deploy successfully and function reliably.
__________________________________________________________________

MSDN Webcast: Microsoft Studio Tools for Office--Open Forum
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,99b1,awn3,co7e,jjlo

Visual Studio 2005 Tools for the Microsoft Office System adds a great new range of
capabilities, such as hosting Word and Excel as full-fledged designers within the Visual
Studio development environment, programming directly against data and view objects, and
creating a custom Document Actions Pane. Developers can utilize these new features to
build solutions that work with the current and upcoming versions of Word and Excel. Join
host Mike Hernandez and members of the Visual Studio Tools for Office team for this open
forum, and ask them the questions that have been on your mind since you started to
evaluate and test the beta.
__________________________________________________________________

Whitepaper: Strategies for Architecting High Performance J2EE Applications
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,jyjf,4fli,co7e,jjlo

The failure of an application to meet performance requirements can have a devastating
impact on your business. In this whitepaper you'll learn tactics to create and tune high
performing, scalable J2EE applications.
__________________________________________________________________

Whitepaper: Why Move from Windows NT to SUSE LINUX?
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,jnu3,52cz,co7e,jjlo

Migrate to Linux and take advantage of the reliability and security of Linux. Learn why
SUSE Linux is the optimum choice to replace Windows NT Server.
__________________________________________________________________

On-Demand Webcast: Introduction to UML2
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,c687,1irk,co7e,jjlo

The Unified Modeling Language (UML) is the standard language for visualizing, specifying,
constructing, and documenting the artifacts of a software-intensive system. In this
session learn the basic UML diagrams, and the notation changes in UML 2.0, the latest
version.
__________________________________________________________________

Download: Write 10,000 Lines of Code in 10 Minutes with Iron Speed Designer
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,9h8q,gdsh,co7e,jjlo

Iron Speed Designer is a software development tool for building database, reporting, and
forms applications for .NET without hand-coding. Quickly create visually stunning,
feature-complete Web applications with database access and security. Iron Speed Designer
accelerates development by eliminating routine infrastructure programming, giving you
ready-to-deploy n-tier Web applications in minutes. Download Evaluation.
__________________________________________________________________

Tutorial: Eclipse for Visual Studio Developers
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,g575,i0te,co7e,jjlo

Compare and contrast the two IDEs, and learn Eclipse concepts, terminology, and workflow
in the context of Visual Studio.
__________________________________________________________________

Special Offer! Free 30-Day Trial: Quickbase for Project Management
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,f4hm,f4s1,co7e,jjlo

Learn Why 32 of the Fortune 100 Use Quickbase
Web-based Quickbase from Intuit is an easy, flexible and affordable way to manage
projects with better visibility and accountability for everyone. With QuickBase your team
can manage projects, tasks and documents, share and update information instantly, and
control access to date. QuickBase is perfect for mid-size and large businesses. Sign up
now and try QuickBase FREE for 30 days!
__________________________________________________________________

What's New in Visual Basic and C# for Visual Studio 2005?
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,hazs,cusx,co7e,jjlo

Visual Basic and C# get updates in the latest version of Microsoft's IDE. Those changes
fall into three areas: changes to the language itself; changes to the compiler and how it
converts source code into managed executables, and changes to the IDE to better support
coding in that language.
_________________________________________________________________

Download: Toad for Oracle
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,c0bp,f0ey,co7e,jjlo

Do you know whos been in your database?
Detect unauthorized access and internal abuse of your database with Toad(R) for Oracle 
the industry leading development & administration tool. Download a trial of Toad now.
__________________________________________________________________

Download: Automate Excel Reporting with SoftWidgets Spread Server.
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,acgt,8miy,co7e,jjlo

Load user-defined Excel templates, containing formatted sheets and charts, with data from
any database. Generated files can be distributed to a file server or as an email
attachment. For advanced spreadsheet generation requirements, extend Spread Server via
custom Excel macros and/or .NET snap-in.
_________________________________________________________________

Check out technical whitepapers on JupiterWeb with the following links:
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,8o9x,l9rs,co7e,jjlo
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,5dfk,6n6u,co7e,jjlo
_______________________________________________________________

internet.com and EarthWeb are divisions of JupiterWeb
JupiterWeb is a Jupitermedia Corporation property
23 Old Kings Highway South
Darien, CT 06820

If you wish to be removed from future JupiterWeb Special Offer mailings, please go to:
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,k5q5,vn4,co7e,jjlo

__________________________________________________________________________________

You are subscribed to Wireless Application Development at this email address
security.world@gmail.com.

Please click here if you would like to unsubscribe from this Distribution List:
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,dm3e,7yr0,co7e,jjlo&MLM_UNIQUEID=9058ade9fc&MLM_MID=86554&MLM_MLID=1&MLM_JOBID=619

Please click here if you would like to stop receiving Announcement Lists messages from
Jupitermedia:
http://nl.internet.com/ct.html?rtr=on&s=1,1usa,1,7bth,9guq,co7e,jjlo&MLM_UNIQUEID=9058ade9fc&MLM_MID=86554&MLM_MLID=1&MLM_JOBID=619

Or you may email announcementlist@jupitermedia.com or write to: Jupitermedia Corporation,
Attention:
Announcement Lists, 23 Old Kings Highway South, Darien, CT 06820
__________________________________________________________________________________

Security, compliance and management converge

NETWORK WORLD NEWSLETTER: SCOTT CRAWFORD ON NETWORK/SYSTEMS MANAGEMENT
08/31/05
Today's focus: Security, compliance and management converge

Dear security.world@gmail.com,

In this issue:

* What the convergence of security, compliance and management
  means
* Links related to Network/Systems Management
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by HP
FROM THE NETWORK CORE TO THE NETWORK EDGE

Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance.
http://www.fattail.com/redir/redirect.asp?CID=111652
_______________________________________________________________
TROUBLE IN PARADISE?

As technologies such as VoIP emerge to advance networks, many
believe the tools to manage them are falling behind. Traditional
management software models simply can't keep up with the rate of
real-time change that today's applications sustain. Is there a
solution pending or should network managers rely on their own
innovations? Click here:
http://www.fattail.com/redir/redirect.asp?CID=111607
_______________________________________________________________

Today's focus: Security, compliance and management converge

By Scott Crawford

The convergence of security, compliance, and management has
become a significant area of focus for Enterprise Management
Associates.

On Sept. 8, I'll be hosting an EMA Webcast that takes a look at
some of the ways this convergence is shaping the managed
enterprise (more information about that below). Until then, let
me whet your appetite for this event by giving you some examples
of why this trend is something the enterprise should know more
about.

Beyond the core benefits of centralization and automation are
even more significant ways in which security, compliance, and
enterprise management combine to provide maximum value. Using
tools such as vulnerability management to inform and define
software management priorities, for example, has revolutionized
many approaches to systems management.

More recently, we've seen security management tools increasingly
integrate remediation functionality themselves. This represents
the logical next step in their evolution, since closing gaps
completes a lifecycle approach to security and compliance
management.

However, when this task touches on business-critical
functionality, it is not something undertaken lightly. Patch
management is perhaps the best-known example of this - but that
raises the thorny issue of automating systems reconfiguration in
response to a security event. No one wants to be responsible for
deploying the "Mother of All Denial-of-Service Vehicles"!

Because of these and other factors, we are seeing three primary
ways in which security and compliance are converging with
management.

First, when security and compliance issues are central, or when
security and compliance products have a more mature concept of
the relevant issues, they are best positioned to directly manage
critical functionality themselves. Identity-based access
management fits into this category - but increasingly, so do
emerging tools like policy management systems that address a
wide range of policy-dependent issues.

Second, when there is compatibility between security and
compliance tools and enterprise management, remediation may best
be negotiated between their respective strengths. This is the
meeting ground of evolving integrated products such as endpoint
compliance enforcement systems, and next-generation security
event management systems.

Third, when an enterprise management product has principal
responsibility for critical functionality, extending its
capabilities in security and compliance management may make the
most sense, particularly when it adds to the return on
investment of the management product and reduces the need for
other security- or compliance-specific expenditures.
Configuration and change management software is an example of
this group, which can be further enhanced with greater
integration of identity-based controls.

We'll go into a lot more detail on these topics and even more
examples on Sept. 8 at 4 p.m. Eastern/1 p.m. Pacific. I invite
you to join us for this event by registering here
<http://www.emausa.com/ema_lead.php?ls=securityNWW0905>.

Next week in this space I'll talk about some of the gaps in this
trend, which will give you an idea of what to look for in the
new and emerging ways in which security and compliance are
converging with enterprise management.

The top 5: Today's most-read stories

1. 2005 salary survey <http://www.networkworld.com/nlnsm3898>

2. Google dives deeper into networking
<http://www.networkworld.com/nlnsm6209>

3. Cisco aims to simplify switch mgmt.
<http://www.networkworld.com/nlnsm6210>

4. VoIP season about to heat up
<http://www.networkworld.com/nlnsm6211>

5. A proposal for governing the 'Net
<http://www.networkworld.com/nlnsm6212>

Today's most-forwarded story:

VoIP rollouts generate heat, power concerns
<http://www.networkworld.com/nlnsm6213>

_______________________________________________________________
To contact:

Scott Crawford, CISSP, is a Senior Analyst focused on IT
security, systems and application management with Enterprise
Management Associates in Boulder, Colo., an analyst and market
research firm focusing exclusively on all aspects of enterprise
management systems and services. The former information security
chief for the International Data Centre of the Comprehensive
Nuclear-Test-Ban Treaty Organization in Vienna, Austria, Crawford
has also been a systems professional with the University Corporation
for Atmospheric Research as well as Emerson, HP, and other
organizations in both public and private sectors. He can be
reached at scrawford@enterprisemanagement.com
_______________________________________________________________
This newsletter is sponsored by HP
FROM THE NETWORK CORE TO THE NETWORK EDGE

Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance.
http://www.fattail.com/redir/redirect.asp?CID=111652
_______________________________________________________________
ARCHIVE LINKS

Archive of the Network/Systems Management newsletter:
http://www.networkworld.com/newsletters/nsm/index.html

Management Research Center:
http://www.networkworld.com/topics/management.html
_______________________________________________________________
FEATURED READER RESOURCE
VoIP

For the latest in VoIP, check out NW's Research Center on this
very topic. Here you will find a collection of the latest news,
reviews, product testing results and more all related to keeping
VoIP networks performing at their best. Click here for more:
<http://www.networkworld.com/topics/voip.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html

_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Linux computing on the couch, from across the room

NETWORK WORLD NEWSLETTER: PHIL HOCHMUTH ON LINUX
08/31/05
Today's focus: Linux computing on the couch, from across the
room

Dear security.world@gmail.com,

In this issue:

* Package ties remote control to Linux
* Links related to Linux
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by HP
FROM THE NETWORK CORE TO THE NETWORK EDGE

Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance.
http://www.fattail.com/redir/redirect.asp?CID=111670
_______________________________________________________________
TROUBLE IN PARADISE?

As technologies such as VoIP emerge to advance networks, many
believe the tools to manage them are falling behind. Traditional
management software models simply can't keep up with the rate of
real-time change that today's applications sustain. Is there a
solution pending or should network managers rely on their own
innovations? Click here:
http://www.fattail.com/redir/redirect.asp?CID=111599
_______________________________________________________________

Today's focus: Linux computing on the couch, from across the
room

By Phil Hochmuth

Linux PC enthusiasts may be tired of hearing about all the ways
Microsoft PCs are taking over the living room. Having conquered
most home offices and dens, Windows is now running such
entertainment apps as MP3 players, CDs and DVDs with its XP
Media Center Edition, complete with a PC-friendly remote control
that's similar to a cable TV or home electronics controller. But
Linux can also play in the home entertainment arena, with help
from a package called Linux Infrared Remote Control.

The software <http://www.lirc.org/> allows Linux computers to
receive infrared signals and translate them into instructions
that can be used to operate any application the box can run. By
connecting a USB or serial IR receiver, or through built-in IR
interfaces (such as IrDA ports on laptops), LIRC can be used to
launch applications or other services, and control the operation
of programs such as MP3 and CD players, or any other device
attached to the PC. IR commands can even be mapped to mouse
movements, allowing users to mirror point-and-click functions on
a remote.

Most standard infrared remotes can be used with the system. LIRC
commands are set up by defining a function - such as hitting
"play" on an MP3 app, or launching a Web site - then mapping the
function to a remote control's IR signal. The application
"learns" the signal by pointing the remote at the IR receiver.

Once set up, a Linux PC with a remote control interface can
become a powerful home entertainment gadget. A quiet-running
LIRC-enabled Linux PC or laptop attached to a TV and stereo can
provide lots of fun features, from couch-based Web surfing
(great for live Fantasy Football stat tracking on the Web during
NFL games) as well as bringing a library of MP3s out of the PC
den and onto the living room stereo system. Outfitted with a TV
input card and a fat hard drive, the PC could even take over as
a cable television receiver and digital video recorder. (TiVo
is, after all, a Linux-based appliance.)

It could also be argued that having a Linux-based home
entertainment PC removes the risk of having "Slammer" or
"ILOVEYOU" being added to your music collection, or the "BSOD"
while trying to watch CNN or MTV.

The top 5: Today's most-read stories

1. 2005 salary survey <http://www.networkworld.com/nllinux3885>

2. Google dives deeper into networking
<http://www.networkworld.com/nllinux6168>

3. Cisco aims to simplify switch mgmt.
<http://www.networkworld.com/nllinux6169>

4. VoIP season about to heat up
<http://www.networkworld.com/nllinux6170>

5. A proposal for governing the 'Net
<http://www.networkworld.com/nllinux6171>

Today's most-forwarded story:

VoIP rollouts generate heat, power concerns
<http://www.networkworld.com/nllinux6172>

_______________________________________________________________
To contact: Phil Hochmuth

Phil Hochmuth is a Network World Senior Editor and a former
systems integrator. You can reach him at
<mailto:phochmut@nww.com>.
_______________________________________________________________
This newsletter is sponsored by HP
FROM THE NETWORK CORE TO THE NETWORK EDGE

Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance.
http://www.fattail.com/redir/redirect.asp?CID=111669
_______________________________________________________________
ARCHIVE LINKS

Breaking Linux news from Network World and around the 'Net,
updated daily: http://www.networkworld.com/topics/linux.html

Archive of the Linux newsletter:
http://www.networkworld.com/newsletters/linux/index.html
_______________________________________________________________
FEATURED READER RESOURCE
VoIP

For the latest in VoIP, check out NW's Research Center on this
very topic. Here you will find a collection of the latest news,
reviews, product testing results and more all related to keeping
VoIP networks performing at their best. Click here for more:
<http://www.networkworld.com/topics/voip.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Whitepapers Download

NETWORK WORLD NEWSLETTER: WHITEPAPERS DOWNLOAD
08/31/05

Dear security.world@gmail.com,

Today we have 5 feature articles for you from WiredRed
Software, BMC, Internet Security Systems, Chelsio
Communications, and APC.
You can see all of the available whitepapers at:
http://www.networkworld.com/productcentral/whitepapers.html
_______________________________________________________________
WiredRed Software
Web Conferencing - The Case for Installed Software

e/pop Web Conferencing - Share desktop, apps, PowerPoint and
multiparty video. Secure connections with SSL and even your own
PKI. Easy admin with user, feature and QoS controls. Software or
service: easy 5 minute server install, or one phone call hosted
service activation. Free trial.
http://www.fattail.com/redir/redirect.asp?CID=111508
_______________________________________________________________
BMC
Effortless Systems Management

Now, you don't have to choose between functionality and
simplicity in systems management. BMC Performance Manager
enables a unique approach to systems management that
automatically applies the appropriate technology based on IT
policy. Find out more in this complimentary white paper from BMC
Software. Get it now!
http://www.fattail.com/redir/redirect.asp?CID=110901
_______________________________________________________________
Internet Security Systems
Spyware Prevention: Internet Security Systems' Multi-Layered
Approach to Stopping Information Theft

Learn how spyware infiltrates and endangers organizations, and
how to establish a multi-layered security solution that will
search and destroy existing spyware and block installation and
execution of incoming spyware.
http://www.fattail.com/redir/redirect.asp?CID=110857
_______________________________________________________________
Chelsio Communications
The Value Proposition of TCP Offload for 10Gb Ethernet

TCP offload has been a controversial technology, partly because
past implementations showed little performance or cost benefits.
With the recent advent of 10 Gbps Ethernet, and the resulting
CPU-to-network performance gap, the value proposition of a
properly architected TCP offload engine is demonstrated both in
terms of performance and cost savings.
http://www.fattail.com/redir/redirect.asp?CID=112125
_______________________________________________________________
APC
Determining Total Cost of Ownership for Data Center and Network
Room Infrastructure

An improved method for measuring Total Cost of Ownership of data
center and network room physical infrastructure and relating
these costs to the overall Information Technology infrastructure
is described, with examples. The largest cost driver is shown to
be unnecessary unabsorbed costs resulting from the oversizing of
the infrastructure.
http://www.fattail.com/redir/redirect.asp?CID=112037
_______________________________________________________________
Whitepaper index on Network World Fusion:

Akamai
Web Application Performance Directly Impacts Business
http://adserver.fattail.com/redir/redirect.asp?CID=107522

APC
Determining Total Cost of Ownership for Data Center and Network
Room Infrastructure
http://adserver.fattail.com/redir/redirect.asp?CID=111763

APC
Calculating Total Power Requirements for Data Centers
http://adserver.fattail.com/redir/redirect.asp?CID=111764

APC
Avoiding Costs From Oversizing Data Center and Network Room
Infrastructure
http://adserver.fattail.com/redir/redirect.asp?CID=111765

Arbor Networks
Safe Quarantine - Automated Worm Suppression
http://adserver.fattail.com/redir/redirect.asp?CID=103413

Arbor Networks
Best Practices for Simplifying Regulatory Compliance
http://adserver.fattail.com/redir/redirect.asp?CID=107288

BMC
Effortless Systems Management
http://adserver.fattail.com/redir/redirect.asp?CID=110902

Chelsio Communications
The Value Proposition of TCP Offload for 10Gb Ethernet
http://adserver.fattail.com/redir/redirect.asp?CID=112082

Chelsio Communications
Jumbo Ethernet Frames: Advantages and Disadvantages
http://adserver.fattail.com/redir/redirect.asp?CID=112092

Chelsio Communications
Independent Performance Benchmarks of 10Gb Ethernet with TCP
Offload
http://adserver.fattail.com/redir/redirect.asp?CID=112095

Ciena
Adaptive WAN: Enabling Web Services, Networked Remote Storage
and Grid Computing
http://adserver.fattail.com/redir/redirect.asp?CID=109276

Internet Security Systems
Spyware Prevention: Internet Security Systems' Multi-Layered
Approach to Stopping Information Theft
http://adserver.fattail.com/redir/redirect.asp?CID=110610

Iomega
REV drives-revolutionizing backup
http://adserver.fattail.com/redir/redirect.asp?CID=110862

Mimosa Systems
Mimosa NearPoint: Unified Protection, Archiving & Recovery for
Microsoft Exchange
http://adserver.fattail.com/redir/redirect.asp?CID=111767

Neterion
10 Gb Ethernet or 1 GbE Trunking?
http://adserver.fattail.com/redir/redirect.asp?CID=111768

Permeo
What Does Secure On Demand Access Really Mean?
http://adserver.fattail.com/redir/redirect.asp?CID=111513

Permeo
SSL VPNs and the Lockdown Loophole
http://adserver.fattail.com/redir/redirect.asp?CID=111514

Permeo
SSL VPN Selection Guidelines and Best Practices
http://adserver.fattail.com/redir/redirect.asp?CID=111515

ProCurve Networking by HP
Protecting the Extended Enterprise Network: Security Strategies
and Solutions White Paper
http://adserver.fattail.com/redir/redirect.asp?CID=109419

ShoreTel
Computerworld VoIP Survey
http://adserver.fattail.com/redir/redirect.asp?CID=103490

Siemens
LifeWorks@Com: Unified Domains and Unified User Experiences
http://adserver.fattail.com/redir/redirect.asp?CID=102196

SSH Communications Security
SSH Communications Security introduces the new SSH G3
Architecture
http://adserver.fattail.com/redir/redirect.asp?CID=99692

WiredRed
Web Conferencing - The Case for Installed Software
http://adserver.fattail.com/redir/redirect.asp?CID=108954
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

The API 'maturity lifecycle'

NETWORK WORLD NEWSLETTER: DAVE KEARNS ON WINDOWS NETWORKING TIPS
08/31/05
Today's focus: The API 'maturity lifecycle'

Dear security.world@gmail.com,

In this issue:

* An explanation for why older apps, devices get left behind
* Links related to Windows Networking Tips
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by HP
FROM THE NETWORK CORE TO THE NETWORK EDGE

Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance.
http://www.fattail.com/redir/redirect.asp?CID=111719
_______________________________________________________________
TROUBLE IN PARADISE?

As technologies such as VoIP emerge to advance networks, many
believe the tools to manage them are falling behind. Traditional
management software models simply can't keep up with the rate of
real-time change that today's applications sustain. Is there a
solution pending or should network managers rely on their own
innovations? Click here:
http://www.fattail.com/redir/redirect.asp?CID=111640
_______________________________________________________________

Today's focus: The API 'maturity lifecycle'

By Dave Kearns

Last issue I started talking about why installing service packs
or operating system upgrades sometimes breaks older
applications, services and devices so that they no longer work.
I said I had a theory that explains at least some of these
problems, although I'm sure there are other reasons also.

First, there's the issue of buggy new software. Anything as
complex as a service pack or an operating system upgrade has a
huge amount of code, not all of which gets tested in every
environment. That's why I advocate testing in a lab first and
waiting a short period of time to hear what others discover in
their labs. But even once the software is stable and relatively
bug-free, there are still instances of applications, services
and devices which simply no longer work, or no longer work as
intended.

My theory for this involves what I call the "maturity
lifecycle."

Each new version of an operating system tends to introduce new
functionality, which is made available to third-party
application vendors through new APIs. Many APIs can be rather
complex, and many aren't finalized until just before the
operating system ships.

Independent software vendors (ISV) have two choices: develop to
the initial, tentative, experimental API or wait for the final
release of the API. The operating system vendor and the
independent vendor both have an interest in getting the
third-party applications rolled out for the first release of the
new operating system. That's why the tentative API is released
and that's why the ISV uses it. To encourage the ISV to do this,
the operating system vendor will institute lax enforcement of
the rules in the final API. Things like syntax, variable types,
and more will be inclusive of both the initial API as well as
the final one. But, over time, as new APIs - and the new data
link libraries (DLL) which accompany them - are released, the
rules will be tightened and enforcement will be stricter.

Some ISVs will create new versions of their software which
incorporate the final API and remove outdated or no longer
supported functions of the tentative API. Some won't. The
reasons why they don't are myriad - some vendors go out of
business, some applications or devices are no longer being
bought by consumers and some choose different development paths
(with different products) to accomplish the same result. In any
of these cases, your older application, service or device simply
won't work with the new operating system upgrade.

When there's a long time between releases of an operating
system, though, the new, more "mature" API, as well as its
enforcement, may be distributed with a service pack - sometimes
on purpose but frequently not, as developers simply include the
newest versions of the DLLs without really considering what they
might do in terms of breaking old software. If enough people
complain, it'll be called a "bug" and rolled back. But not
always.

So there are reasons why you should thoroughly test upgrades and
service packs even after a year or so has passed since their
release and most known "bugs" have been fixed. You need to know
how it will run with your applications, services and devices.

The top 5: Today's most-read stories

1. 2005 salary survey <http://www.networkworld.com/nlwnt3873>

2. Google dives deeper into networking
<http://www.networkworld.com/nlwnt6189>

3. Cisco aims to simplify switch mgmt.
<http://www.networkworld.com/nlwnt6190>

4. VoIP season about to heat up
<http://www.networkworld.com/nlwnt6191>

5. A proposal for governing the 'Net
<http://www.networkworld.com/nlwnt6192>

Today's most-forwarded story:

VoIP rollouts generate heat, power concerns
<http://www.networkworld.com/nlwnt6193>

_______________________________________________________________
To contact: Dave Kearns

Dave Kearns is a writer and consultant in Silicon Valley. He's
written a number of books including the (sadly) now out of print
"Peter Norton's Complete Guide to Networks." His musings can be
found at Virtual Quill <http://www.vquill.com/>.

Kearns is the author of three Network World Newsletters: Windows
Networking Tips, Novell NetWare Tips, and Identity Management.
Comments about these newsletters should be sent to him at these

respective addresses: <mailto:windows@vquill.com>,
<mailto:netware@vquill.com>, <mailto:identity@vquill.com>.

Kearns provides content services to network vendors: books,
manuals, white papers, lectures and seminars, marketing,
technical marketing and support documents. Virtual Quill
provides "words to sell by..." Find out more by e-mail at
<mailto:info@vquill.com>
_______________________________________________________________
This newsletter is sponsored by HP
FROM THE NETWORK CORE TO THE NETWORK EDGE

Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance.
http://www.fattail.com/redir/redirect.asp?CID=111718
_______________________________________________________________
ARCHIVE LINKS

Breaking Windows networking news from Network World, updated
daily: http://www.networkworld.com/topics/windows.html

Operating Systems Research Center:
http://www.networkworld.com/topics/operating-systems.html

Archive of the Windows Networking Tips newsletter:
http://www.networkworld.com/newsletters/nt/index.html
_______________________________________________________________
FEATURED READER RESOURCE
VoIP

For the latest in VoIP, check out NW's Research Center on this
very topic. Here you will find a collection of the latest news,
reviews, product testing results and more all related to keeping
VoIP networks performing at their best. Click here for more:
<http://www.networkworld.com/topics/voip.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Fischer targets 'next generation' of identity mgmt.

NETWORK WORLD NEWSLETTER: DAVE KEARNS ON IDENTITY MANAGEMENT
08/31/05
Today's focus: Fischer targets 'next generation' of identity
mgmt.

Dear security.world@gmail.com,

In this issue:

* Fischer International's approach to identity management
* Links related to Identity Management
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by HP
FROM THE NETWORK CORE TO THE NETWORK EDGE

Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance.
http://www.fattail.com/redir/redirect.asp?CID=111660
_______________________________________________________________
FREE NETWORK WORLD PRINT SUBSCRIPTIONS - SIGN UP NOW!

Security is one of the most pressing issues in all of IT, and
you need to stay on top of it. Network World delivers the
hottest security news. Network IT Executives depend upon Network
World for the information they need to keep their networks
secure! SUBSCRIBE TODAY AT:
http://www.fattail.com/redir/redirect.asp?CID=111729
_______________________________________________________________

Today's focus: Fischer targets 'next generation' of identity
mgmt.

By Dave Kearns

Which company would you say is the oldest "pure play"
provisioning company?

Anyone who said Business Layers or Oblix gets no credit.
Although both were involved in provisioning from the beginning
(defined as 1998), neither is still around as a "pure play"
company - Business Layers was acquired by Netegrity which, in
turn, was bought out by Computer Associates. Oblix was snapped
up by Oracle earlier this year.

No, the longest-running company in pure play provisioning is
also one of the least well known. Fischer International
<http://www.fischerinternational.com/> was founded in 1982 by
Addison Fischer, who is still chairman of the board. While it
didn't do provisioning at the beginning (no one did), its
long-running experience in the security arena gave it a leg up
on the competition in provisioning, especially when single and
reduced sign-on, password reset and other security-conscious
services are taken together with provisioning to create a
well-integrated identity management suite.

And "well integrated" is a key concept to Fischer CEO Renée
Bacherman. In a conversation last week, she talked about what
she referred to as the last generation of services and
applications, "applications layered on top of and beside other
applications without regard to integration, correlation,
business processes."

She continued:

"This resulted in numerous and complex islands of automation.
Organizations constantly struggle to integrate these islands of
automation to better exploit their technology investments.
Organizations have too much data and too little information
because the business process view is buried within many
different applications. Automated business process management
and compliance require integration technology for organizations
to fully realize the potential of their technology investments."

Bacherman calls Fischer's technologies the "next generation" of
identity management:

"Architecture is key. Only an identity management solution that
is built as an integration technology can quickly be assimilated
into an enterprise. These solutions must replicate the
hub-and-spoke and publish-and-subscribe architectures that the
EAI [enterprise application integration] vendors developed.
Since this technology inherently enables the business process
view, it facilitates the ability to include compliance by
design. Identity management delivers a centralized point of
administration, centralized audit database, out-of-the-box audit
policies and assessment workflows, all of which are coexistent
with the provisioning, password management, identity management
and self-service functionality."

I certainly can't argue with that. Still, a number of vendors
will respond that they also design their suites on integration
technology. So I'll give you one more reason to take a look at
Fischer: mobile technology.

In an upcoming release of the Fischer Identity Suite (due out by
the end of October), the workflow engine will allow you to
include mobile platforms in the approval process. Need an
approval right now, but the right manager is stuck at DFW
waiting for a plane? Route the workflow to her mobile platform
and she can approve (or disapprove) all of the waiting requests
while standing in line at the coffee shop, or in the waiting
lounge or anywhere else with mobile connectivity. That, I think,
really is "next generation" thinking.

The top 5: Today's most-read stories

1. 2005 salary survey <http://www.networkworld.com/nldsv3879>

2. Google dives deeper into networking
<http://www.networkworld.com/nldsv6199>

3. Cisco aims to simplify switch mgmt.
<http://www.networkworld.com/nldsv6200>

4. VoIP season about to heat up
<http://www.networkworld.com/nldsv6201>

5. A proposal for governing the 'Net
<http://www.networkworld.com/nldsv6202>

Today's most-forwarded story:

VoIP rollouts generate heat, power concerns
<http://www.networkworld.com/nldsv6203>

_______________________________________________________________
To contact: Dave Kearns

Dave Kearns is a writer and consultant in Silicon Valley. He's
written a number of books including the (sadly) now out of print
"Peter Norton's Complete Guide to Networks." His musings can be
found at Virtual Quill <http://www.vquill.com/>.

Kearns is the author of three Network World Newsletters: Windows
Networking Tips, Novell NetWare Tips, and Identity Management.
Comments about these newsletters should be sent to him at these

respective addresses: <mailto:windows@vquill.com>,
<mailto:netware@vquill.com>, <mailto:identity@vquill.com>.

Kearns provides content services to network vendors: books,
manuals, white papers, lectures and seminars, marketing,
technical marketing and support documents. Virtual Quill
provides "words to sell by..." Find out more by e-mail at
<mailto:info@vquill.com>
_______________________________________________________________
This newsletter is sponsored by HP
FROM THE NETWORK CORE TO THE NETWORK EDGE

Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance.
http://www.fattail.com/redir/redirect.asp?CID=111659
_______________________________________________________________
ARCHIVE LINKS

Archive of the Identity Management newsletter:
http://www.networkworld.com/newsletters/dir/index.html
_______________________________________________________________
Managed Network Services and Lowering Total Cost of Ownership

No IT organization can provide all services to all its users
without using external resources. A key task is to identify
which functions can be performed internally and which functions
should be outsourced. Learn more now.
http://www.fattail.com/redir/redirect.asp?CID=111527
_______________________________________________________________
FEATURED READER RESOURCE
VoIP

For the latest in VoIP, check out NW's Research Center on this
very topic. Here you will find a collection of the latest news,
reviews, product testing results and more all related to keeping
VoIP networks performing at their best. Click here for more:
<http://www.networkworld.com/topics/voip.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Broadband battle lines drawn

NETWORK WORLD NEWSLETTER: STEVE TAYLOR AND LARRY HETTICK ON
CONVERGENCE
08/31/05
Today's focus: Broadband battle lines drawn

Dear security.world@gmail.com,

In this issue:

* Broadband competition mapped out
* Links related to Convergence
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by HP
FROM THE NETWORK CORE TO THE NETWORK EDGE

Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance.
http://www.fattail.com/redir/redirect.asp?CID=111652
_______________________________________________________________
SIGN UP FOR 51 FREE ISSUES OF NETWORK WORLD MAGAZINE

Everyone is talking about the convergence of voice and data onto
the same infrastructure. Convergence touches on virtually every
aspect of the network, from the call center to the wireless LAN.
Find out what Network World Editors have to say each week in our
print publication.
SUBSCRIBE NOW AT:
http://www.fattail.com/redir/redirect.asp?CID=111726
_______________________________________________________________

Today's focus: Broadband battle lines drawn

By Steve Taylor and Larry Hettick

The battle for broadband market share between phone companies
and cable companies is heating up with both lower prices and
higher speeds. With recent FCC rulings, we expect the battle to
turn red-hot.

In June, SBC announced it would offer its SBC Yahoo DSL Express
for $14.95 per month, with speeds at 384K bit/sec to 1.5M
bit/sec. BellSouth offers FastAccess DSL Lite for $24.95 per
month at 256K bit/sec to 384K bit/sec. Last week, Verizon
lowered its DSL rates to $14.95 per month for access rates from
128K bit/sec to 768K bit/sec.

The cable companies have not been sitting idly by. While cable
modem services generally cost more, cable providers have focused
on offering higher speeds. For example, Comcast offers 384K
bit/sec to 4M bit/sec at $42.95.

Most providers have "strings attached" that require a specific
contract term and/or service bundle; bundles and promotions
lower the list price for most services.

Earlier this month
<http://www.networkworld.com/columnists/2005/082205nolle.html?rl>
the FCC removed the regulatory requirement for incumbent local
carriers to provide DSL broadband access to third-party ISPs
under the same terms and conditions as their own ISP. The FCC
based its ruling on an earlier U.S. Supreme Court decision that
classified Internet services as an "information service," not a
"telecommunications service."

Companies like AOL and Earthlink may have to re-think their
business models. While third-party ISPs get one year before they
must buy access facilities at "market rate," the battle for
faster and cheaper broadband will continue to rage.

As the local telcos keep up their frenetic pace of fiber and
high-speed broadband build-outs, these broadband battles are
moving toward a full-scale market-share war. And as cellular
companies deploy 3G wireless broadband, we expect a very
interesting 12 months ahead.

The top 5: Today's most-read stories

1. 2005 salary survey
<http://www.networkworld.com/nlconvergence3861>

2. Google dives deeper into networking
<http://www.networkworld.com/nlconvergence6204>

3. Cisco aims to simplify switch mgmt.
<http://www.networkworld.com/nlconvergence6205>

4. VoIP season about to heat up
<http://www.networkworld.com/nlconvergence6206>

5. A proposal for governing the 'Net
<http://www.networkworld.com/nlconvergence6207>

Today's most-forwarded story:

VoIP rollouts generate heat, power concerns
<http://www.networkworld.com/nlconvergence6208>

_______________________________________________________________
To contact: Steve Taylor and Larry Hettick

Steve Taylor is president of Distributed Networking Associates
and publisher/editor-in-chief of Webtorials. For more detailed
information on most of the topics discussed in this newsletter,
connect to Webtorials <http://www.webtorials.com/>, the premier
site for Web-based educational presentations, white papers, and
market research. Taylor can be reached at
<mailto:taylor@webtorials.com>

Larry Hettick is an industry veteran with more than 20 years of
experience in voice and data. He is Vice President for Telecom
Services and Infrastructure at Current Analysis, the leading
competitive response solutions company. He can be reached at
<mailto:lhettick@currentanalysis.com>
_______________________________________________________________
This newsletter is sponsored by HP
FROM THE NETWORK CORE TO THE NETWORK EDGE

Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance.
http://www.fattail.com/redir/redirect.asp?CID=111651
_______________________________________________________________
ARCHIVE LINKS

Archives of the Convergence newsletter:
http://www.networkworld.com/newsletters/converg/index.html
_______________________________________________________________
The Adaptive WAN for Business-Critical Applications

Discover how enterprises are moving beyond overlapping,
dedicated, single-application networks to a more flexible WAN
architecture that more intelligently uses bandwidth and supports
multiple and time-sensitive applications. Watch the webcast now
for more information.
http://www.fattail.com/redir/redirect.asp?CID=111523
_______________________________________________________________
FEATURED READER RESOURCE
VoIP

For the latest in VoIP, check out NW's Research Center on this
very topic. Here you will find a collection of the latest news,
reviews, product testing results and more all related to keeping
VoIP networks performing at their best. Click here for more:
<http://www.networkworld.com/topics/voip.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Juniper Markets Meru

All newsletters are sent from the domain "internet.com." Please use this domain name (not the entire "from" address, which varies) when configuring e-mail or spam filter rules, if you use them.


Search
Search internet.com
News Reviews Insights Tutorials WiMax VoIP HotSpots Forums Events Research Products Glossary About




Subscribe Now!
Wi-Fi Planet.com's Daily Newsletter
html * text
More Free Newsletters


Wi-Fi Glossary
Find a Wi-Fi Term


Find a Hotspot
by city
by State

Wi-Fi® is a registered certification mark of the Wi-Fi Alliance

internet.com
wireless channel
internet.com wireless channel
Wi-Fi Planet
HotSpotList.com
Palm Boulevard
PDAStreet
PocketPCcity
PocketPCWire
PracticallyNetworked.com
Psion Place
RIM Road
Ultrawideband Planet
Visor Village
WirelessAdWatch
Events
Research


internet.com
Developer
Downloads
International
Internet Lists
Internet News
Internet Resources
IT
Linux/Open Source
Personal Technology
Small Business
Windows Technology
xSP Resources

Search internet.com
Advertise
Corporate Info
Newsletters
Tech Jobs
E-mail Offers




Wi-FiPlanet News
NEW!   Juniper Markets Meru
[August 31, 2005]   Meru's latest partner gives the VoWLAN vendor a leg up in enterprise security.

NEW!   AirMagnet Attracts Fortress
[August 30, 2005]   The security company will resell a version of AirMagnet Enterprise for wireless intrusion prevention.

NEW!   NextWeb Makes Next Move
[August 30, 2005]   The fixed-wireless ISP snaps up a rival to enhance its California coverage.

NEW!   Hotspot Hits
[August 30, 2005]   The latest in public access Wi-Fi: T-Mobile offers free Wi-Fi to hurricane victims; Lots of new EV-DO sites from Verizon Wireless; SkyNetGlobal hotspots in Singapore to offer roaming; and more.

NEW!   VZ Wireless Slashes Broadband Price
[August 29, 2005]   The carrier hopes to entice voice subscribers to add data.

More News >>

Win a FREE Nokia 9300 smartphone.
The most anticipated device of 2005 could be
yours--absolutely free. With the launch of the stylish
and powerful Nokia 9300 just weeks away, we are
holding a prize draw giveaway. Could you be one of
the lucky winners? Enter now to find out.
http://ad.doubleclick.net/clk;19837689;11786394;h?http://www.nokiaforbusiness.com/amer/9300

Interested in placing your TEXT AD HERE? Click Here

Wi-FiPlanet Insights
NEW!   Selling Wi-Fi Phones with a Difference
[August 31, 2005]   Small Florida company Y-Tel is betting on the world embracing VoWi-Fi—but is targeting areas with little or no Wi-Fi infrastructure.

NEW!   Motorola Mesh Helps Drivers
[August 29, 2005]   Currently helping race car divers, the Motodrive mesh could someday help every commuter on the road.

Free Wi-Fi on Iowa Highways
[August 24, 2005]   The deployment is part of a broader plan by I Spot to create an advertising-supported hotspot network.

More Insights >>

Wi-FiPlanet Reviews
NEW!   WatchGuard Firebox Edge X5w
[August 26, 2005]  The Firebox Edge X5w is designed to be an all-in-one wireless firewall and VPN appliance for your small network. It promises to do it all, and it delivers.

Netgear RangeMax Wireless Router
[August 22, 2005]   Combine the best range/throughput features of an Atheros chip with smart beam-forming antennas, and you've got this small and slightly expensive device that will reach all areas of your home.

palmOne Wi-Fi Card
[August 10, 2005]   This SDIO card permits owners of several of Palm's handhelds to link up with public and private 802.11b-compatible wireless networks.

Linksys Wireless-G Broadband Router with SRX
[August 9, 2005]   MIMO in the home gets a workout with this retro-looking unit that in fact carries all the most up-to-date wireless tech and security a home user could ask for.

More Reviews >>

Featuring the world's largest collection of wholly-owned stock
photos, stock footage, photo objects, clipart, illustrations,
fonts, animations and flash components, this comprehensive
library contains over 4 million digital images from world renowned
photographers and brands such as Comstock Images, ThinkStock
Images, ThinkStock Footage, photos.com, Clipart.com & Hemera Images.
With top-notch customer service and Web site search capabilities,
the images you need are just clicks away: www.jupiterimages.com

Interested in placing your TEXT AD HERE? Click Here

Wi-FiPlanet Tutorials
RF Math Made Easy
[August 5, 2005]   When working with wireless LANs, you’ll eventually need to perform some RF mathematics. These tips will make conversions much easier.

Two Firewalls Too Much of a Good Thing
[August 2, 2005]  One Internet connection and two computers each running firewall software can mean PCs that refuse to talk to each other. Here's an easy way to break down walls. Plus, diagnosing the cause of a dysfunctional wireless network.

Mesh Networking a Viable Alternative
[July 14, 2005]   Mesh networking is making its way into municipal Wi-Fi networks, but use within enterprises is questionable. Learn the ins and outs of mesh networking and see if it fits into your wireless deployment.

More Tutorials >>



JupiterWeb networks:

internet.comearthweb.comDevx.comGraphics.com

Search JupiterWeb:

Jupitermedia Corporation has four divisions:
JupiterWeb, JupiterResearch, JupiterEvents and JupiterImages

Copyright 2005 Jupitermedia Corporation All Rights Reserved.
Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Jupitermedia Corporate Info | Newsletters | Tech Jobs | Shopping | E-mail Offers

Business Resources From Business.com
» Computer Networking

» Fixed Wireless Network Equipment

» Access Points

» Wireless Telecommunications Equipment and Supplies

» Bluetooth Wireless Telecommunications