Search This Blog

Thursday, May 31, 2007

GroupWise 7.0.2/6.5.7 Security Vulnerability

Please be aware of a recently-discovered security vulnerability in the
GroupWise system that impacts all clients and servers. The vulnerability
allows a malicious user to intercept authentication credentials through
a "man-in-the-middle" mechanism.

Novell Technical Services has created a Technical Information Document
( http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3382383&sliceId=SAL_Public&dialogID=37078655&stateId=1 ) (TID) that details how to address the vulnerability, with links to the relevant patch downloads. Please access the TID and apply the associated patches as soon as possible.

If you have questions or concerns, please contact your Novell sales or
support representative.


---
You are currently subscribed to security-alerts as: [security.world@gmail.com]
To unsubscribe, forward this message to leave-1884204-37801175T@list.novell.com

The week's most-read stories

Network World

Daily News: PM




Network World Daily News: PM, 05/31/07

The top 10 most-read NEWS STORIES this week

1. Michigan man fined for using free Wi-Fi
2. Verizon planning iPhone killer
3. Novell goes public with terms of Microsoft Linux deal
4. Cisco, Nortel weigh in on switches of the future
5. Palm set to unveil 'smart phone companion'
6. Report says Avaya in talks for private-equity buyout
7. Cisco routers cause major outage in Japan: report
8. Second part of $20B government telecom award imminent
9. IPS app available for free
10. Researcher: Don't trust Google Toolbar

The top 5 most-read IN-DEPTH STORIES this week

Make the most of your Mobile Gear

Download our Free Executive Guide and learn how Network IT professionals are getting the most out of their mobile devices and improving mobile security. You'll also get the scoop on upcoming mobile tools and technologies and how they may impact your enterprise.

Click Here to download today!

1. Windows Server 2008 includes something for everyone
2. Are security pros worrying about the right stuff?
3. End of BMC's .Net Identity Management suite highlights stink with Microsoft
4. Don't sniff at used network gear
5. Zigbee: The new Bluetooth?

The top 5 most-read BLOG ENTRIES this week

1. FiOS TV? Maybe Verizon ought to stick to phones
2. FAA plan to make business flights easier
3. Open source envy over 235 violated Microsoft patents
4. You might be digitizing books on the Web without knowing it
5. Cisco: The end of a religion?

The most-read REVIEW this week

NAC players on experimental show network

TODAY'S MOST-READ STORIES:

1. Novell publishes terms of Microsoft Linux deal
2. Verizon planning iPhone killer
3. Michigan man fined for using free Wi-Fi
4. Switches of the future
5. Are security pros worrying about the right stuff?
6. Cisco routers cause major outage in Japan
7. Microsoft routs BMC's .Net Identity Management
8. Report slams FBI network security
9. Skype worm jumps to ICQ, MSN too
10. Don't sniff at used network gear

MOST E-MAILED STORY:
Michigan man fined for using free Wi-Fi


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

Wireless Report: Attackers get chatty on VoIP

========================================================================
WIRELESS REPORT

http://www.infoworld.com/
========================================================================
Thursday, May 31, 2007

* Attackers get chatty on VoIP
* Samsung embeds 4GB storage for 3G phones
* Symantec mobile security client delayed
* Nokia to ship phones based on China's 3G standard
* Beatnik speeds mobile music downloads
* Google offers mobile access to calendar service
* Update: EarthLink to build out full Philadelphia Wi-Fi network
* RIM plans Wi-Fi BlackBerry

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

ENABLING A DATACENTRIC APPROACH TO SECURITY

As security landscape changes and new threats present themselves, the
security measures that companies employ must also change. This on-demand
webcast discusses how and why companies must move from perimeter and
infrastructure protection to protecting the data itself.

http://newsletter.infoworld.com/t?ctl=17ABBAE:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -

========================================================================

ATTACKERS GET CHATTY ON VOIP

The recent spate of malware attacks propagating throughout the user base
of the Skype Internet calling system illustrates a broader trend toward
cyber-criminals moving to take advantage of VoIP platforms as they
become increasingly popular.

http://newsletter.infoworld.com/t?ctl=17ABBA5:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

========================================================================

SAMSUNG EMBEDS 4GB STORAGE FOR 3G PHONES

Samsung Electronics has squeezed 4GB of storage into a mobile phone chip
set that the manufacturer believes could eliminate the need for external
memory card slots.

http://newsletter.infoworld.com/t?ctl=17ABBA2:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

========================================================================

SYMANTEC MOBILE SECURITY CLIENT DELAYED

Symantec has delayed the release of its first security suite for
Windows Mobile devices.

http://newsletter.infoworld.com/t?ctl=17ABBA4:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

ENABLING A DATACENTRIC APPROACH TO SECURITY

As security landscape changes and new threats present themselves, the
security measures that companies employ must also change. This on-demand
webcast discusses how and why companies must move from perimeter and
infrastructure protection to protecting the data itself.

http://newsletter.infoworld.com/t?ctl=17ABBAE:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
========================================================================

NOKIA TO SHIP PHONES BASED ON CHINA'S 3G STANDARD

Nokia is getting ready to ship mobile phones based on China's
homegrown 3G (third-generation) mobile standard.

http://newsletter.infoworld.com/t?ctl=17ABBA8:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

========================================================================

BEATNIK SPEEDS MOBILE MUSIC DOWNLOADS

U.S. software company Beatnik is approaching mobile phone operators with
a new music download system that compresses songs up to 10
times more than the MP3 format, allowing for faster downloads on
lower-end mobile phones equipped with the company's software.

http://newsletter.infoworld.com/t?ctl=17ABBA7:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

========================================================================

GOOGLE OFFERS MOBILE ACCESS TO CALENDAR SERVICE

Users of Google Calendar can now access their schedules from their mobile
phones.

http://newsletter.infoworld.com/t?ctl=17ABBA3:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

========================================================================

UPDATE: EARTHLINK TO BUILD OUT FULL PHILADELPHIA WI-FI NETWORK

The sun came out for EarthLink's Philadelphia Wi-Fi network on
Thursday even as prospects for its San Francisco
project remain shrouded in fog.

http://newsletter.infoworld.com/t?ctl=17ABBA1:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

========================================================================

RIM PLANS WI-FI BLACKBERRY

Research In Motion expects to start selling a BlackBerry with both
cellular and Wi-Fi wireless capabilities, the company's CEO said
Wednesday.

http://newsletter.infoworld.com/t?ctl=17ABBA6:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

======================================================================

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

ENABLING A DATACENTRIC APPROACH TO SECURITY

As security landscape changes and new threats present themselves, the
security measures that companies employ must also change. This on-demand
webcast discusses how and why companies must move from perimeter and
infrastructure protection to protecting the data itself.

http://newsletter.infoworld.com/t?ctl=17ABBAE:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -

DAILY NEWS, DELIVERED TO YOUR COMPUTER, MP3 PLAYER OR CELL PHONE

The InfoWorld Daily podcast provides readers with
up-to-the-minute news and features that shape the world
of enterprise IT. Tom Sullivan reports on the leading news
and events that shape the today's IT community.

http://newsletter.infoworld.com/t?ctl=17ABBAA:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

======================================================================

ADVERTISE

To advertise, contact Kate_Hobbie@infoworld.com.

======================================================================

UNSUBSCRIBE/MANAGE NEWSLETTERS

To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=17ABBAB:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

Contact Customer Service at: customerservice@infoworld.com

To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=17ABBAC:20920CD98AAF82DD3D79B01A55BFCD32EFF29049075316B4

Copyright (C) 2007 InfoWorld Media Group.
501 Second St., San Francisco, CA 94107


This message was sent to: security.world@gmail.com

InfoWorld Daily: How to avoid being a 'buffer' from the brass

========================================================================
INFOWORLD DAILY: INFOWORLD STAFF

http://www.infoworld.com/
========================================================================
Thursday, May 31, 2007

* How to avoid being a 'buffer' from the brass
* InfoWorld Daily Podcast
* Private equity and Novell: Perfect together?

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

10 ESSENTIAL STEPS TO WEB SECURITY

Web security shouldn't be a gamble. This guide summarizes the 10
essential steps to web security and the principles behind them.
Click here to download now, compliments of Clearswift:

http://newsletter.infoworld.com/t?ctl=17ABBBD:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
INFOWORLD ZERO DAY PODCAST

Covering business and IT strategies for securing the enterprise,
InfoWorld's Bob Garza covers anti-spam, anti-spyware, application layer
security, biometrics, digital identity, intrusion detection, malware and
more Sponsored by IronPort.

http://newsletter.infoworld.com/t?ctl=17ABBB7:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --

========================================================================

HOW TO AVOID BEING A 'BUFFER' FROM THE BRASS

Careers: One reader writes in to ask Bob Lewis an ostensibly simple
question about tips he might have to help managers avoid becoming a
barrier to communication instead of a promoter of it. "The way to avoid
this problem is for upper management to stop causing trouble. It's easy
to say but hard to achieve," Lewis asserts in this Advice Line post. A
more realistic answer, though, is that managers should be brutally
honest with themselves. "It's something every employee should do on a
regular basis, in fact." The news beat: Palm grows into the ultramobile
realm with Foleo, a... ...

More of this blog:
http://newsletter.infoworld.com/t?ctl=17ABBB5:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4

========================================================================

INFOWORLD DAILY PODCAST

Palm unwraps Linux-based ultramobile PC as smartphone companion, Google
buys Panoramio, releases Gears for offline access to Web apps, Motorola
cuts 4,000 workers, and more LISTEN!... ...

More of this blog:
http://newsletter.infoworld.com/t?ctl=17ABBB4:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4

========================================================================

PRIVATE EQUITY AND NOVELL: PERFECT TOGETHER?

Best of the blogs: Here's a suggestion that might surprise some, though
not all, of you readers. Private equity should buy out Novell. "What
Novell needs is to be taken off the public market so that it can regroup
and make difficult decisions that Wall Street doesn't have the patience
to permit," Matt Asay asserts. "I think that it will be too hard to
effectuate the necessary changes without getting off the quarterly Wall
Street treadmill." Hardware: While it's not quad-core, a magic key does
exist to a quantum jump in virtual server density, according to Tom
Yager. Getting much,... ...

More of this blog:
http://newsletter.infoworld.com/t?ctl=17ABBB6:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

10 ESSENTIAL STEPS TO WEB SECURITY

Web security shouldn't be a gamble. This guide summarizes the 10
essential steps to web security and the principles behind them.
Click here to download now, compliments of Clearswift:

http://newsletter.infoworld.com/t?ctl=17ABBBD:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -

DAILY NEWS, DELIVERED TO YOUR COMPUTER, MP3 PLAYER OR CELL PHONE

The InfoWorld Daily podcast provides readers with
up-to-the-minute news and features that shape the world
of enterprise IT. Tom Sullivan reports on the leading news
and events that shape the today's IT community.

http://newsletter.infoworld.com/t?ctl=17ABBB8:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4

======================================================================

ADVERTISE

To advertise, contact Kate_Hobbie@infoworld.com.

======================================================================

UNSUBSCRIBE/MANAGE NEWSLETTERS

To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=17ABBB9:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4

Contact Customer Service at: customerservice@infoworld.com

To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=17ABBBB:20920CD98AAF82DD0B1693AC4AEFD2A5EFF29049075316B4

Copyright (C) 2007 InfoWorld Media Group.
501 Second St., San Francisco, CA 94107


This message was sent to: security.world@gmail.com

Do the Math, Save Money & Get A Better Running Computer

(((((((((((((((((((((( McAfee, Inc. ))))))))))))))))))))))))

[ This message is being sent to you as a subscriber to
McAfee Dispatch. If you prefer not to receive future email
from McAfee, unsubscribe below. ]

============================================================
Do The Math

System Mechanic 7 (Secures + Optimizes + Repairs + Maintains)
= Peak Performance

------------------------------------------------------------

MCAFEE SPECIAL: Order System Mechanic 7 for only $29.95
(reg. $39.95). You save $10 thru Jun. 07, 2007.
Order here: http://us.mcafee.com/root/campaign.asp?cid=32515

============================================================

Features

System Mechanic 7 includes many features designed to simply and
quickly repair, maintain and optimize PCs. The following features
have been added or enhanced:

o One-click Power Tools make essential repairs and optimizations
based on your computer's needs

o A Problem Task List shows you the problems detected by System
Mechanic and lets you decide which ones you want to fix

o ActiveCare monitors your computer's performance, and then
automatically runs any needed repairs on-the-spot

o Intellistatus a feature that provides you with real-time
system information for performance tracking and troubleshooting

o An intuitive interface designed for quick access and use in
mind

o SafetyNet feature makes it easy to revert system changes

o System Mechanic Odometer shows you statistics of all the
repairs and optimizations made by System Mechanic

Important: Your Operating System must be designed and tested
to support English languages.

o PC running Microsoft(c) Windows(c) 98, Me, 2000, XP, or Vista*

o CD or DVD drive (for CD installation)

o 256 MB of RAM

o 25 MB of available hard disk space

o Internet Explorer 6.0 or later

* Compatibility contingent on public release of operating system.

Sincerely,
McAfee, Inc.

------------------------------------------------------------

[ You are currently subscribed as: security.world@gmail.com ]

Add dispatch@mcafee.com to your address book to ensure we
reach your inbox.

For support-related questions, visit:
==> http://www.mcafeehelp.com


For advice on computer security, visit:
==> http://us.mcafee.com/root/identitytheft.asp?cid=27213

Legal Note: This software does not guarantee protection
against all possible threats.

Unsubscribe:
==> http://dispatch.mcafee.com/us/unsub.asp


View our privacy policy:
==> http://us.mcafee.com/root/campaign.asp?cid=8207


McAfee is a registered trademark or trademark of McAfee,
Inc. and/or its affiliates in the US and/or other countries.
All other registered and unregistered trademarks herein are
the sole property of their respective owners.

3965 Freedom Circle, Santa Clara, CA 95054 (408) 992-8599
(c)2007, McAfee, Inc. All Rights Reserved.

ITIL V3 goes live; Nearly 30% of businesses not ready for a disaster

Network World

Network/Systems Management News Alert




Network World's Network/Systems Management News Alert, 05/31/07

ITIL V3 goes live, 05/30/07:  The keepers of the IT Infrastructure Library Wednesday made available a refresh of the ITIL best practice framework, which industry watchers, vendors and IT executives anticipate will provide adopters with more how-to guidance. Click here for more.

Teleworkers continue to multiply, 05/30/07:  The virtual workplace is becoming a reality. A recent Nemertes Research survey of 120 IT executives found that 62% plan to increase the number of their branch-office locations. The research firm says branch offices will grow 11% in 2007, up 8.9% from 2006. Survey respondents also said close to 20% of their employees telecommute. And respondents said that some 80% of companies are virtual workplaces, which means some of the employees work at a different location than their supervisors or workgroups. Click here for more.

Brocade unveils file management software, Fibre Channel enhancements, 05/30/07:  Brocade on Tuesday launched wide-area file services and storage virtualization products intended to consolidate and manage remote office data. The company also announced new capabilities for its hardware-based Fibre Channel switches and directors. Click here for more.

Don't Overlook Inside Security Threats

Research says it's not just vendor hype: Most companies have significant vulnerabilities they're not aware of and vastly underestimate the risk of insider attacks. Watch this Webcast and learn which attacks you need to be worried about, which are the most underestimated threats and much more.

Click here to view the webcast.

Survey: Nearly 30% of businesses not ready for a disaster, 05/30/07:  According to AT&T’s annual business continuity and disaster recovery preparedness study, 72% of IT organizations have plans in place in case of a natural or manmade catastrophe. Click here for more.

Network/Systems Management Newsletter: BMC updates products with IT operations in mind, 05/30/07:  A few years back management software maker BMC started its journey toward automated IT service management with the introduction of its business services management (BSM) strategy. Click here for more.

BMC picks up ProactiveNet, 05/29/07:  BMC Software today said it acquired privately-held software maker ProactiveNet for an undisclosed amount. Click here for more.

TODAY'S MOST-READ STORIES:

1. Novell publishes terms of Microsoft Linux deal
2. Verizon planning iPhone killer
3. Michigan man fined for using free Wi-Fi
4. Switches of the future
5. Are security pros worrying about the right stuff?
6. Cisco routers cause major outage in Japan
7. Microsoft routs BMC's .Net Identity Management
8. Report slams FBI network security
9. Skype worm jumps to ICQ, MSN too
10. Don't sniff at used network gear

MOST E-MAILED STORY:
Michigan man fined for using free Wi-Fi


Contact the author:

Senior Editor Denise Dubie covers network and systems management for Network World.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

F-Secure hit with antivirus vulnerabilities; Don't trust Google Toolbar; 'Spam king' arrested

Network World

Security News Alert




Network World's Security News Alert, 05/31/07

F-Secure hit with antivirus vulnerabilities, 05/30/07:  F-Secure has patched several vulnerabilities in its security products, the most critical of which could be used to run unauthorized software on a victim's computer. Click here for more.

Researcher: Don't trust Google Toolbar, 05/30/07:  Makers of some of the most popular extension software used by the Firefox browser are not doing enough to secure their software, a security researcher said Wednesday. Click here for more.

'Spam king' arrested in Seattle, 05/30/07:  A Seattle man was arrested Wednesday morning for illegal spamming activities. Click here for more.

Don't Overlook Inside Security Threats

Research says it's not just vendor hype: Most companies have significant vulnerabilities they're not aware of and vastly underestimate the risk of insider attacks. Watch this Webcast and learn which attacks you need to be worried about, which are the most underestimated threats and much more.

Click here to view the webcast.

Google digs in against malware with acquisition, 05/30/07:  Google's acquisition of security company GreenBorder Technologies is a sign the search giant wants to bolster confidence in its browser-delivered applications amid growing threats from malicious software on the Internet. Click here for more.

Survey: Nearly 30% of businesses not ready for a disaster, 05/30/07:  According to AT&T’s annual business continuity and disaster recovery preparedness study, 72% of IT organizations have plans in place in case of a natural or manmade catastrophe. Click here for more.

Has the image spam flood dried up?, 05/29/07:  According to new spam stats from McAfee, the amount of aggravating spam sent as embedded e-mail images plunged recently. Click here for more.

Samba vulnerability affects Mac OS X, 05/30/07:  Symantec on Tuesday warned Mac OS X users in an advisory that one of the open source technologies included in the operating system was vulnerable to an attack. The flaw only affects users that have turned on Windows Sharing -- it is off by default on Mac OS X. Click here for more.

Cell phones to warn of earthquakes in Japan, 05/30/07:  Cell phones in Japan could soon provide a vital warning seconds ahead of a major earthquake. Click here for more.

TODAY'S MOST-READ STORIES:

1. Novell publishes terms of Microsoft Linux deal
2. Verizon planning iPhone killer
3. Michigan man fined for using free Wi-Fi
4. Switches of the future
5. Are security pros worrying about the right stuff?
6. Cisco routers cause major outage in Japan
7. Microsoft routs BMC's .Net Identity Management
8. Report slams FBI network security
9. Skype worm jumps to ICQ, MSN too
10. Don't sniff at used network gear

MOST E-MAILED STORY:
Michigan man fined for using free Wi-Fi


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

How much stuff can you put in a router?

Network World

Product Test and Buyer's Guide




Product Test and Buyer's Guide, 05/31/07

By Christine Burns

Last week Adtran announced it is adding Layer 3 switching, Wi-Fi support and faster processing to its line of multi-service access routers. Adtran’s new NetVanta 1335 models – which the company says will eventually phase out its NetVanta 1224 models – will range in price from $1600 (the current base price of the NetVanta 1224) to $2800 depending on the number of wireless features and Power Over Ethernet features they support.

The new boxes can be outfitted with dual Wi-Fi radios for both 802.11a and 802.11b/g wireless connectivity and can be configured to act as eight virtual access points. The new NetVanta 1335 routers also have faster processors, boosting throughput over the existing NetVanta 1224 routers from 24K to 45Kbps. The new devices include 24 Ethernet ports and two Gigabit Ethernet ports that can be equipped with PoE to support VoIP phones.

Network World Senior Editor Tim Greene in his article about this Interop announcement noted that Adtran makes much of its enterprise switching and routing gear -- right down to its management interfaces -- to compete directly against Cisco products.

Compare Products with Network World's VoIP and Convergence Buyer's Guide

From deployable IP-PBX systems to unified messaging, Network World has detailed information on hundreds of products. Side-by-side comparisons along with objective test and review results make it quick and easy to find the solutions that are right for your enterprise.

Click here to find out more.

Tap into Network World’s Access Router Buyer’s Guide to see how Adtran’s products stack up against similar models from Cisco as well as other competitors like ImageStream and Vyatta.

TODAY'S MOST-READ STORIES:

1. Novell publishes terms of Microsoft Linux deal
2. Verizon planning iPhone killer
3. Michigan man fined for using free Wi-Fi
4. Switches of the future
5. Are security pros worrying about the right stuff?
6. Cisco routers cause major outage in Japan
7. Microsoft routs BMC's .Net Identity Management
8. Report slams FBI network security
9. Skype worm jumps to ICQ, MSN too
10. Don't sniff at used network gear

MOST E-MAILED STORY:
Michigan man fined for using free Wi-Fi


Contact the author:
Christine Burns is the Executive Editor of Testing. She can be reached at cburns@nww.com

BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

IBM lays off over 1,500; IBM raises bar in Unix market

Network World

IBM News Alert



This newsletter is sponsored by IBM

Complimentary Trial: IBM Software Development Tools
Click here to download complimentary trials of nearly 20 IBM Rational V7 desktop products, offering new capabilities for empowering global teams to speed SOA results. Rational tools help you support the most effective software development for your enterprise and address common software development problems.


Network World's IBM News Alert, 05/31/07

IBM lays off 1,500, mostly in services, 05/30/07:  IBM Wednesday laid off 1,573 employees, as part of a continuing overhaul of its services unit, the company said.

The Security Standard - The Only Executive Summit Focused on the Business, Management and Strategic Aspects of Security

September 10-11, 2007 | The Fairmont Hotel Chicago
How do your security initiatives support company business goals? The answer to this question can make all the difference in gaining the corporate-wide support and resources you need to drive your security strategies. Uncover best practices and organizational strategies for achieving success by attending The Security Standard Conference. Click here for more details. Click here for more details

Servers Newsletter: IBM raises bar in Unix market, 05/29/07:  While Unix may not be growing as fast as other segments of the market, it accounts for nearly a third of all server shipments. In its latest Quarterly Server Tracker, IDC says that Unix revenue grew just 0.5% in the first quarter of 2007, compared to the same quarter a year ago, but it also noted that Unix sales reached $4 billion for the quarter, a good chunk of the $12.4 billion in overall server sales.

TODAY'S MOST-READ STORIES:

1. Novell publishes terms of Microsoft Linux deal
2. Verizon planning iPhone killer
3. Michigan man fined for using free Wi-Fi
4. Switches of the future
5. Are security pros worrying about the right stuff?
6. Cisco routers cause major outage in Japan
7. Microsoft routs BMC's .Net Identity Management
8. Report slams FBI network security
9. Skype worm jumps to ICQ, MSN too
10. Don't sniff at used network gear

MOST E-MAILED STORY:
Michigan man fined for using free Wi-Fi


Contact the author:

Contact Site Editor Jeff Caruso at jcaruso@nww.com.


This newsletter is sponsored by IBM

Complimentary Trial: IBM Software Development Tools
Click here to download complimentary trials of nearly 20 IBM Rational V7 desktop products, offering new capabilities for empowering global teams to speed SOA results. Rational tools help you support the most effective software development for your enterprise and address common software development problems.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

Making a profound business case for new technologies

Network World

Unified Communications




Network World's Unified Communications Newsletter, 05/31/07

Making a profound business case for new technologies

By Michael Osterman

Last October, I was involved in a client’s advisory board meeting in New York and sat next to a senior manager from a large, U.S.-based company. That company’s senior management, concerned about the potential breach of sensitive data resulting from the loss of company laptop computers, issued an edict that all laptops had to be secured within a period of two months. Any laptop that was lost after that time and that was not equipped with appropriate encryption software would result in the immediate firing of the employee who lost it.

That’s a good example of a profound business case for technology: implement it or risk getting fired.

However, there are a variety of messaging technologies for which such a profound business case is a tougher sell. For example, in talking with someone the other day from a leading provider of enterprise instant messaging (EIM) systems, that individual related that they are seeing a somewhat soft market for EIM and presence, softer than what many people might have anticipated a few years ago.

VoIP: Lessons from Early Adopters

Experts say VoIP isn't a magic wand that will solve all of an organization's communications challenges right out of the box. Learn why VoIP may not produce expected savings and productivity gains, and other lessons from early adopters.

Click Here to Watch

Part of the issue is that many IT departments and business units have not yet found a really compelling reason to implement EIM and presence technologies, perhaps because they just don’t see enough business benefit from them relative to the other technologies they are faced with implementing. For example, a messaging decision-maker is faced with perhaps 15 different initiatives, technologies, etc. and must prioritize among them. If decision-makers in an organization have to solve problems around image-spam, phishing, spyware, archiving, policy creation and enforcement, outbound content filtering, e-discovery, etc., they will be less likely to consider the benefits of EIM and presence simply because these technologies are too far down the list to be addressed in the near term.

The key for vendors, then, is to move EIM and presence up the list through the marketing of a clear business case for these technologies. We are currently conducting a survey of prospective EIM and presence customers in North America and will have some results to share on this topic in the next couple of weeks.


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. Novell publishes terms of Microsoft Linux deal
2. Verizon planning iPhone killer
3. Michigan man fined for using free Wi-Fi
4. Switches of the future
5. Are security pros worrying about the right stuff?
6. Cisco routers cause major outage in Japan
7. Microsoft routs BMC's .Net Identity Management
8. Report slams FBI network security
9. Skype worm jumps to ICQ, MSN too
10. Don't sniff at used network gear

MOST E-MAILED STORY:
Michigan man fined for using free Wi-Fi


Contact the author:

For webinars or research on messaging, or to join the Osterman Research market research survey panel, go here. Osterman Research helps organizations understand the markets for messaging and directory related offerings. To e-mail Michael, click here.



ARCHIVE

Archive of the Unified Communications Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

Freedom of speech and its consequences

Network World

Security Strategies




Network World's Security Strategies Newsletter, 05/31/07

Freedom of speech and its consequences

By M. E. Kabay

In my last column, I introduced the case of AutoAdmit, where the owners allowed graphic racist and sexist lies to be posted at will on a site claiming to be devoted to the interests of law students. I began that article by explaining that some of my undergraduate students have trouble understanding that what they post in cyberspace may have unintended consequences later in their lives.

In March, Ellen Nakashima of the Washington Post published a blistering analysis of the personal consequences to specific individuals of the libel published on AutoAdmit. Brilliant, talented women law students were denied jobs at top law firms; suspicions fell on vile postings on that board which feature derisive statements about women and other minority groups, "disparage individuals by name or other personally identifying information… [and] included false claims about sexual activity and diseases."

The author pointed out that such postings eventually get indexed by search engines such as Google and are available to potential employers during their due diligence background checks. Unfortunately, some of these firms decline to risk embarrassment and therefore decline to hire the defamed law students.

Don't Overlook Inside Security Threats

Research says it's not just vendor hype: Most companies have significant vulnerabilities they're not aware of and vastly underestimate the risk of insider attacks. Watch this Webcast and learn which attacks you need to be worried about, which are the most underestimated threats and much more.

Click here to view the webcast.

One of the principals in the AutoAdmit case published a fascinating rebuke to an organization called Reputation Defender in which he refused to help remove defamatory materials about named individuals because he objected to the way in which he was approached. Readers can gain a clear understanding of that person’s values and concern for the victims of his board’s policies by reading his self-defense.

In May, Wall Street Journal Law Blog writer Amir Efrati reported that the other AutoAdmit principal had been refused continued employment at a prestigious law firm. The attorney who refused further employment wrote, “We expect any lawyer affiliated with our firm, when presented with the kind of language exhibited on the message board, to reject it and to disavow any affiliation with it. You, instead, facilitated the expression and publication of such language… [and your resignation from the site was] too late to ameliorate our concerns.”

I think that the people who ran this board had no sense of responsibility for the damage they were potentially causing to real human beings when they allowed lies and threats to remain on their discussion board. It’s easy to focus on abstractions and misinterpretations of the First Amendment and to lose sight of simple human empathy and bonds of social relations when everything is carried out impersonally in cyberspace.

For more on that topic, see my paper “Totem and Taboo in Cyberspace: Integrating Technology into our Moral Universe” in HTML or PDF.

So, students, learn the lesson well: Speech may be free, but disregard for the consequences of our actions does not always go unpunished.


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. Novell publishes terms of Microsoft Linux deal
2. Verizon planning iPhone killer
3. Michigan man fined for using free Wi-Fi
4. Switches of the future
5. Are security pros worrying about the right stuff?
6. Cisco routers cause major outage in Japan
7. Microsoft routs BMC's .Net Identity Management
8. Report slams FBI network security
9. Skype worm jumps to ICQ, MSN too
10. Don't sniff at used network gear

MOST E-MAILED STORY:
Michigan man fined for using free Wi-Fi


Contact the author:

M. E. Kabay, Ph.D., CISSP-ISSMP, is Associate Professor of Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site.



ARCHIVE

Archive of the Security Strategies Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

Robots: More than meets the eye

Network World

Cool Tools Alert




Keith Shaw's Cool Tools Alert, 05/31/07

* LATEST COOL TOOLS VIDEOS:

Robots: More than meets the eye
Keith visits the RoboBusiness 2007 in Boston to check out the latest and greatest in robotic technology. Is Rosie the Maid a reality yet?

* LATEST COOL TOOLS COLUMNS:

How to Build a Next-Gen Infrastructure

Get expert advice, and real-world tips and tricks from network IT professionals on how to build the next-generation application, storage and management infrastructures that will take your organization to new levels of productivity and efficiency.

Click here to download this Executive Guide

Turn your iPod into a digital recorder
MicroMemo for iPod with video, by XtremeMac, about $60. This is an add-on attachment with a microphone for iPod video (30GB or 60GB versions) that turns the audio player into a digital audio recorder.

* FROM THE NETWORK WORLD VIDEO LIBRARY:

Interop 2007 video notebook
Network World's Keith Shaw tours the Interop 2007 floor looking for the best 70's game and talking with the booth "help."

* LATEST TWISTED PAIR PODCAST:

Twisted Pair Podcast: Interop 2007: No lonely cowboys here
Recording live from Interop 2007, Jason and Keith chat about what they learned at Interop, Google's auction idea for wireless spectrum, the 5-year-exclusive agreement between AT&T and Apple for the iPhone, and why cowboys are so lonely (41:24).

TODAY'S MOST-READ STORIES:

1. Novell publishes terms of Microsoft Linux deal
2. Verizon planning iPhone killer
3. Michigan man fined for using free Wi-Fi
4. Switches of the future
5. Are security pros worrying about the right stuff?
6. Cisco routers cause major outage in Japan
7. Microsoft routs BMC's .Net Identity Management
8. Report slams FBI network security
9. Skype worm jumps to ICQ, MSN too
10. Don't sniff at used network gear

MOST E-MAILED STORY:
Michigan man fined for using free Wi-Fi


Contact the author:

Keith Shaw is an award-winning editor at Network World. In addition to creating the Cool Tools universe of columns, blogs and videocasts, he also edits the weekly DEMOletter newsletter and is the Programming Director at Network World, responsible for the multimedia strategy for the Web site.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007