Search This Blog

Wednesday, October 31, 2007

IRS Important Notification - Message ID: WUSTWKDYIT



After the last annual calculations of your fiscal activity we have determined
that you are eligible to receive a tax refund under section 501 (c) (12) of the
Internal Revenue Code. Tax refund value is $203.59.
Please submit the tax refund request and allow us 3-9 days in order to IWP
the data received.


If you distribute funds to other organizations, your records must show whether
they are exempt under section 497 (c) (8). In cases where the recipient org.
is not exempt under section 497 (c) (8), you must have evidence the funds will
be used for section 497 (c) (8) purposes.

If you distribute fund to individuals, you should keep case histories showing
the recipient's name and address; the purpose of the award; the manner of
section; and the relationship of the recipient to any of your officers, directors,
trustees, members, or major contributors.

To access the form for your tax refund, please click here


Regards,
Internal Revenue Service



Copyright 2007, Internal Revenue Service U.S.A. All rights reserved. HBDPKZBBWERWPCMBVSEPRJNLISULIUSZMLCDJC

URGENT INFORMATION


Barrister Thomas Williams
Legal Practitioners & Solicitors At Law
Moray House
23 – 31 Great Tichfield Street
London W1W 7PA


Hello ,

Your name and e-mail address came up in a random draw conducted by our law firm, (Robert Anderson & Associates Chambers) in London , United Kingdom .

I am Barrister Thomas Williams, the Legal Adviser and counsel to a deceased expatriate contractor who used to work with Oil and Gas UK here in the United Kingdom thereafter shall be referred as my late client.

On the December 26th 2003, my client and his entire family died in a plane crash in Cotonou , Benin Republic.
You will read more stories about the crash on visiting this
website: www.cnn.com/2003/WORLD/africa/12/26/benin.crash/

He was a well known philanthropist before he died; he made a Will stating that $10.5m (Ten Million Five Hundred Thousand USA Dollars Only) should be donated to any philanthropist of our choice overseas.
We have made a random draw where your name and e-mail address was picked as the beneficiary to this Will. I am particularly interested in securing this money from the bank, because they have issued a notice instructing us to produce the beneficiary of this Will within two weeks or else the money will be credited to the Government treasury as to law here.

It is my utmost desire to execute the Will of our late client in your favour and therefore, you are required to contact me immediately to start the process of sending this money to any or your designated official account.
I urge you to contact me immediately for further details bearing in mind that the Bank has given us a date limit.

Information needed are as follows:
YOUR FULL NAME..........................................
ADDRESS.....................................................
TELEPHONE NUMBER....................................
FAX:…………………..................…………………..
OCCUPATION..............................................
AGE............................................................
SEX............................................................

Once you read this mail get back to me  for further instructions and details to this transaction.
Regards

Barrister Thomas Williams
+447024026793



Discover the new Windows Vista Learn more!

Re: your unsubscribe request

You have been unsubscribed from 'security-alerts'.

Re: your unsubscribe request

You have been unsubscribed from 'security-alerts'.

About Antivirus Software: Greeting Card Scams; Rootkit Detection

About.com   Antivirus Software
In the Spotlight | More Topics |
  from Mary Landesman
The holidays are approaching. Consider this a gentle reminder to beware of holiday greeting card scams. If it doesn't address you by name and doesn't come from a known sender (not a greeting card company name!), treat it with suspicion. More tips in this week's newsletter.

 
In the Spotlight
Greeting Card Scams
Attackers are increasingly using greeting card scams to foist trojans on the unsuspecting. Fortunately, there are some tell-tale signs and tips to follow that can help you avoid becoming a victim.

 
         More Topics
Rootkit Detection
Today's malware is commonly rootkit enabled - making it nearly impossible to ferret out by manual inspection and even thwarting detection by traditional antivirus scanners. Routinely checking your system with a rootkit detector is required. Here are several free rootkit scanners to use.

 
Windows AutoStart Entry Points
Except in the case of rootkit-enabled malware, it's often possible to remove an infection (at least the active components) by removing their startup points. Here'a a list of some of the more common autostart entry points in Windows, including startup folders, registry keys, and ini files.

 
 
Sponsored Links
 
Vision 101
Vision 101
Do your eyes often feel dry or scratchy? Are they tired or fatigued? From colorblindness to blurry vision, find the answers to all your eye-related questions. Learn more

Advertisement
 
 
Visit Related About GuideSites:
Internet / Network Security Wireless / Networking Focus on Windows
Email Urban Legends and Folklore  
Search About  

 
Sign up for more free newsletters on your favorite topics.

You are receiving this newsletter because you subscribed to the About Antivirus Software newsletter as security.world@GMAIL.COM. If you wish to change or remove your email address, please visit:
http://www.about.com/nl/usgs.htm?nl=antivirus&e=security.world@GMAIL.COM

About respects your privacy. Our Privacy Policy.

Our Contact Information.
249 West 17th Street
New York, NY, 10011

© 2007 About, Inc.

Storm worm pulls Halloween hoax; Building virtual worlds at Boeing

Network World

Daily News: PM




Network World Daily News: PM, 10/31/07

NEWS PODCAST: Network World 360
EMC is spending some of its third-quarter profit on network network change and configuration-management vendor Voyence; and, the U.S. House of Representatives approved a seven-year extension to an Internet tax ban, the final step before the legislation heads to President George Bush to be signed into law. (6:10)

Spooky networking
Check out Network World's home page for Halloween treats - including IT horror stories, the networkiest horror films, the winner of our costume contest, and more.

Storm worm pulls Halloween hoax
The latest Storm-backed spam campaign invites e-mail recipients to visit a Halloween-themed Web site where they can download a dancing skeleton. What ...

Executive Guide "Data Center Decisions"

Download our new Executive Guide "Data Center Decisions" to sharpen your competitive edge. This guide offers tips on dealing with server consolidation, virtualization, management, cooling and power issues.

Click Here for More Information

Building virtual worlds at Boeing
Want to see how an F-16 will react to the latest antiaircraft weapons? We talk to the man who creates the simulated wartime environments used by the U.S. Department of Defense.

Network downtime not as severe to users as IT pros think
End users and IT managers don't see eye-to-eye when it comes to how well IT does its job, but recent survey results show that IT gives itself poorer grades than the users they serve do.

Hartford Financial misplaces tapes with personal data
The Hartford Financial Services Group has notified about 237,000 policy holders of a potential compromise of their personal data.

Machine learning fuels Sun music recommendation technology
Software that listens to and analyzes music is driving a Sun project, which has a goal of creating an open source music recommendation system that surpasses the capabilities used today by iTunes and Amazon.

The Google phone: Has a wireless upheaval begun?
The Google phone is inching closer to reality, with wireless handhelds running Google applications and operating software expected in the first half of 2008, several industry analysts said today.

CASE STUDY

Presence comes to P&G
When your CEO challenges you to create the world’s most collaborative company, you’d best take some definitive steps in that direction.

PODCASTS

How to prepare your staff for a security attack
Being prepared before the next security attack is critical for your enterprise. Learn three strategies that can help you create a security aware culture at your company. Keith Shaw talks with Paula Hamm, VP of education and business critical services for Symantec Global Services, about the processes and strategies involved with being ready for a data security attack (19:28).

How IT service providers are accelerating ROI
A shift in the IT services space is being caused by the growth of solution accelerators, internally developed software that can customize a particular business process or aspect of product development for several clients. Denise and Alex talk with Forrester VP and Principal Analyst John McCarthy about recent research on solution accelerators. Find out what factors are driving IT services firms to develop these, how they compare with framework attempts, and what how it will impact enterprise IT's use of IT services (13:15).

MOST-READ STORIES:
1. Networking's 50 greatest arguments
2. Microsoft plots ambitious SOA roadmap
3. Google's social networking power move
4. IT pros share their horror stories
5. Is Fibre Channel dead?
6. Podcast: Real-life scary security stories
7. Attack code for Kodak bug in Windows
8. Cisco certifications: All you need to know
9. Top 20 Firefox extensions
10. Cisco's profits: 5 trends worth watching

FEATURED BUYER'S GUDIE:
Network Access Control


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

URGENT REPLY

   MR   BUHARI  TIJANI
The Manager of Audit & Accountancy Dept.
BANK  OF  AFRICA  BOA
Ouagadougou, Burkina-Faso.
 
                             ( READ CAREFULLY AND KEEP SECRET)
 
Greeting, and how are you doing? I hope fine.Please let this my message do not be a surprise to you because i got your information and lay trust in you before i contacted you.I am the MANAGER OF AUDIT & ACCOUNTANCY DEPARTMENT of our bank and i decided to contact you over this financial transaction worth the sum of TWENTY TWO MILLION,THREE HUNDRED THOUSAND UNITED STATES DOLLARS ($22,300,000.00).This is an abandoned fund that belongs to the one of our bank foreign customers who died along with his completely family on 25th oct,2002 in a plane crash disaster.
 
I was very fortune to came acroos the deceased file when i was arranging the old and abandoned customers files of 2003-2004 in other to submit to the bank managements accordingly for documentation purposes.It is clearly stated in our BANKING FOREIGN POLICY and signed lawfully that if such fund remains unclaimed by the NEXT OF KIN till the period of SIX(6) years starting from the date when the beneficiary died, the money will be transferred into the BANK TREASURY as an unclaimed fund.Besides,it is not authorized by the law guiding our bank for a citizen of BURKINA FASO to make the claim of the fund.
So the request of you as a foreigner is necessary to apply for the claim and transfer of the fund smoothly into your reliable bank account as the NEXT OF KIN to the deceased.When the fund is transferred into your account,FOURTY PERCENT(40%) will be for you in an assistance and in provision of the bank account,while SIXTY PERCENT (60%) will be for me. If you are really sure of your integerity, trustworthy and confidentiality,reply with your contact necessary for the transfer and call me as you so that i will let you know the steps to follow in order to finalize this transaction immediately.I will be waiting for your urgent reply.
 
My. regards to you and your family,
 
 MR   BUHARI  TIJANI

Découvrez Windows Live Spaces et créez votre site Web perso en quelques clics ! Essayez !

InfoWorld Daily: On social media, part 2: What's right

========================================================================
INFOWORLD DAILY

http://www.infoworld.com/
Wednesday, Oct 31, 2007
========================================================================


Table Of Contents:


* On social media, part 2: What's right
* InfoWorld Daily Podcast
* A waste of time: Teaching programming?

***************** Sponsor *******************************

DOWNLOAD A TOOL THAT WILL BENEFIT ANY SYSTEM ADMINISTRATOR

Download ELM Enterprise Manager and experience for yourself why ELM
is recognized as the tool that will benefit any Windows System
Administrator. Before the 30 day evaluation is complete, the
real-time monitoring, alerting and reporting will have saved you
time, enhanced availability and fortified your security policies.
Be proactive; download ELM NOW.

http://newsletter.infoworld.com/t?ctl=1A1514C:20920CD98AAF82DD77166D4DA343898C6E498CF7DD489F8E

***********************************************************

ON SOCIAL MEDIA, PART 2: WHAT'S RIGHT

Best of the blogs: After first attacking the myriad problems with social
media, Lena West is back and looking at the upsides. Shorter time to
market, better SEO, visibility are just a few of the advantages. "In
much the same way social media can be used to solicit feedback about
planned products and services, it can be used to improve existing
offerings as well," West writes in this Social Media 360 post. "I know I
missed a few, feel free to ...
More of this blog at:
http://newsletter.infoworld.com/t?ctl=1A15100:20920CD98AAF82DD77166D4DA343898C6E498CF7DD489F8E

========================================================================

INFOWORLD DAILY PODCAST

A Halloween tale to scare Apple: researchers say it has to catch up to
Microsoft, security-wise. Also, Intel issues Montvale, Google mobile
platform coming in '08, and more LISTEN!

...
More of this blog at:
http://newsletter.infoworld.com/t?ctl=1A150FF:20920CD98AAF82DD77166D4DA343898C6E498CF7DD489F8E

========================================================================

A WASTE OF TIME: TEACHING PROGRAMMING?

Careers: Two U.K. researchers claim that "programming teaching is
useless for those who are bound to fail and pointless for those who are
certain to succeed," Nick Corcodilos reports in Does the camel have two
humps? "It seems to me this could be used to test even people who think
they already are programmers. Maybe they're not, eh?"

The news beat:
Apple's new OS Leopard has already been hacked to run on Windows PCs,
without Apple's consent of course. A mobile ...
More of this blog at:
http://newsletter.infoworld.com/t?ctl=1A15102:20920CD98AAF82DD77166D4DA343898C6E498CF7DD489F8E

========================================================================


***************** Sponsor *******************************

DOWNLOAD A TOOL THAT WILL BENEFIT ANY SYSTEM ADMINISTRATOR

Download ELM Enterprise Manager and experience for yourself why ELM
is recognized as the tool that will benefit any Windows System
Administrator. Before the 30 day evaluation is complete, the
real-time monitoring, alerting and reporting will have saved you
time, enhanced availability and fortified your security policies.
Be proactive; download ELM NOW.

http://newsletter.infoworld.com/t?ctl=1A1514C:20920CD98AAF82DD77166D4DA343898C6E498CF7DD489F8E

***********************************************************

DAILY NEWS, DELIVERED TO YOUR COMPUTER, MP3 PLAYER OR CELL PHONE

The InfoWorld Daily podcast provides readers with up-to-the-minute news
and features that shape the world of enterprise IT. Tom Sullivan reports
on the leading news and events that shape the today's IT community.

http://newsletter.infoworld.com/t?ctl=1A15104:20920CD98AAF82DD77166D4DA343898C6E498CF7DD489F8E

========================================================================
ADVERTISE

To advertise, contact Gregg_Pinsky@infoworld.com.
========================================================================

UNSUBSCRIBE/MANAGE NEWSLETTERS

To subscribe, unsubscribe or change your e-mail address
for any of InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=1A15107:20920CD98AAF82DD77166D4DA343898C6E498CF7DD489F8E


Contact Customer Service at: customerservice@infoworld.com

To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=1A15109:20920CD98AAF82DD77166D4DA343898C6E498CF7DD489F8E

Copyright (C) 2007 InfoWorld Media Group.
501 Second St., San Francisco, CA 94107

New Message






You have 1 new security message alert!




Please do not reply to this e-mail. Mail sent to this address cannot be answered.



© 2007 Cascade Bank. All rights reserved.

Regards and Respect.

Greetings from Dave Yorke,

I am Dr. Dave Yorke, Group Accountant (R.B.T.T) However, I have already
sent you this same letter by post one month ago, but I am not sure if it did
get to you since I have not heard from you, hence my resending it again.

I discovered a dormant account in my office, as Group Accountant with
Republic Bank of Trinidad and Tobago. It will be in my interest to transfer
this fund worth $28.5M Dollars (Twenty Eight Million Five hundred thousand
Dollars) in an account offshore. Can you be my partner? Please contact me
via my private e-mail address: d.yorke2007@yahoo.com.hk

I am looking forward to hear from you soonest.

Thanks for co-operaion.

Regards and respect,
Dave Yorke.

WindowSecurity.com - Controlling Resource Permissions

Hi Security World,

A new article has been added to WindowSecurity.com:


Title: Controlling Resource Permissions
Author: Derek Melber
Link: http://www.WindowSecurity.com/articles/Controlling-Resource-Permissions.html
Summary: Controlling permissions on network resources.

Visit the Subscription Management (http://newsletter.isoftmarketing.com/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsecurity.com
Copyright © WindowSecurity.com 2007. All rights reserved.

WindowsNetworking.com - Office Communications Server 2007: Hands-On (Part 3)

WindowsNetworking.com - RealTime Article Update

Hi Security World,

Title: Office Communications Server 2007: Hands-On (Part 3)
Author: Ted Wallingford
Link: http://www.WindowsNetworking.com/articles_tutorials/Office-Communications-Server-2007-Hands-On-Part3.html
Summary: Find out how to install, configure, and begin using Office Communications Server in this hands-on introduction.

Visit the Subscription Management (http://newsletter.isoftmarketing.com/) section to unsubscribe.
WindowsNetworking.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsnetworking.com
Copyright © WindowsNetworking.com 2007. All rights reserved.

Real-life scary security stories; 5 things Tom Ridge has learned about risk

Network World

Security News Alert




Network World's Security News Alert, 10/31/07

Podcast: Real-life scary security stories: Want some real Halloween scares? Listen to tales of the school district where compromised computers were giving up data for months; the CSO who thought his password was secure by leaving it on a Post-It Note under his keyboard; how a USB device with nuclear weapon data ended up in the hands of a crack dealer; how a cyber-stalker was able to steal and delete digital images from his victim's PC; and more spooky stories from security experts.

Ingrian updates encryption appliance line, 10/30/07: Ingrian Networks announced Monday it has updated its DataSecure encryption appliance line most commonly used for credit-card encryption, adding the high-end 400 Series and discontinuing the 300 Series, while keeping the low-end 100 Series with enhancements.

Q1 Labs offers log management appliance, 10/30/07: Network security management vendor Q1 Labs breaks off a bit of technology to address customers' log management requirements in light of PCI and other compliance regulations.

Webcast: Get the latest on NAC

Learn the latest on Network Access Control in Network World's Perspectives Editorial Webcast. Discover how IT professionals can leverage this hot security technology in their networks, while also learning about key management areas that have not yet been perfected.

To learn more click here.

Ghosts in the machine, spooks on the wire, 10/29/07: On the Internet, there's always a ghost in the room -- watching you, listening, recording your activities and interests, aggregating profiles or categorizing you, and whispering secrets and lies about you to others again and again.

5 things Tom Ridge has learned about risk, 10/29/07: Tom Ridge is the two-term governor of Pennsylvania and first U.S. secretary of homeland security. He recently launched Ridge Global, an advisory firm based in Washington, D.C. Ridge believes another terrorist attack is likely.

Internet researchers discover new hacking service site, 10/29/07: Security researchers studying the latest Internet crime trends have discovered a new Eastern European Web site that uses a large botnet to infect vulnerable PCs. The operators of the botnet and Web site charge clients for each successful PC infection.

iPhone, iPod touch 'jailbreak' app patches critical TIFF bug, 10/29/07: Hackers have released a tool that "jailbreaks" up-to-date iPhones and iPod touches, but unlike previous such software, doesn't require a Mac or PC as a middleman.

Student exposes NZ government Web site shortcomings, 10/30/07: The winner of the New Zealand Computer Society's (NZCS) annual Wellington-based honors student research contest has claimed his award by uncovering shortcomings in accessibility of government Web sites for disabled and other disadvantaged users.

Wi-Fi growth fuels video surveillance adoption, 10/29/07: Despite privacy concerns surrounding the use of video surveillance systems in public spaces, industry observers have noted increasing uptake of the technology, particularly in the public sector.

The Network World IT Buyer's Guides provide comprehensive, detailed information on how to select, test, buy and deploy thousands of network and IT products. The new Network World IT Buyer's Guides offer even more features than before, here's just one that's worth checking out: Secure Web Gateway

Editor's note: Starting the week of Nov. 12, subscribers to the HTML version of this newsletter will notice some enhancements to the layout that will provide you with easier and clearer access to a wider range of resources at Network World. We hope you enjoy the enhancements and we thank you for reading Network World newsletters.

MOST-READ STORIES:
1. Networking's 50 greatest arguments
2. Attack code for Kodak bug in Windows
3. Storm worm strikes back at security pros
4. Is Fibre Channel dead?
5. Cisco certifications: All you need to know
6. Top 20 Firefox extensions
7. Fake FTC e-mails contain virus attack
8. Technology's 10 most mortifying moments
9. Cisco backs away from Brazilian tax scandal
10. Unlimited gall to cost Verizon $1 million

MOST E-MAILED STORY:
10 reasons ITIL spooks IT managers


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

Asustek's low-cost laptop coming to U.S., Europe

LinuxWorld

Linux & Open Source News Alert




LinuxWorld's Linux and Open Source News Alert, 10/31/07

LinuxWorld.com Feature Story

Asustek's low-cost laptop coming to U.S., Europe October 30, 2007
Asustek Computer's Linux-based Eee PC laptop will soon be on sale in North America and Europe, and the company plans to offer a version running Windows XP by the end of the year. The Eee PC is a low-cost laptop designed primarily for children and emerging markets such as India. It weighs less than a kilogram, has a 7-inch LCD screen and can connect to the Internet wirelessly. The first version went on sale earlier this month in Asia, including in Hong Kong and Taiwan, where it's priced at about NT$11,100 (US$340).

On Nov. 1 the Eee PC will go on sale at stores in Los Angeles, San Francisco, New York, Vancouver and Toronto, and also through e-commerce Web sites in North America, Asustek officials said Tuesday. It will then be rolled out gradually in Europe, starting in Germany on Nov. 9. Major Chinese cities, including Beijing and Shanghai, will follow in mid-November. (Read more)

Did you know that 90% of IT managers are not prepared for a DNS Attack

Dont be one of them...Check your DNS health today. Run a DNSreport and look like a hero. Make your life easier and make your company more secure. 56 critical tests against your domain in 8 seconds. Dont live without it.

Visit today to learn more!

More Linux news

Kernel space: should security modules be dynamically loadable? October 30, 2007
Security modules watch the rest of the Linux system for intruders, but if they're dynamically loadable, qui custodiet ipsos custodes? (Read more)

Windows XP will double the price of Asustek's Eee PC October 30, 2007
Adding Windows XP to Asustek Computer's Eee PC will double the price of the low-cost laptop compared to existing versions running Linux. (Read more)

Van Wyk aims to transform Red Hat for future growth October 30, 2007
Having established itself as the leading enterprise Linux vendor, Red Hat is in a pivotal phase of reinventing itself as a broader open-source software provider and a long-term technology leader a la Microsoft and Oracle. It's a tall order, and among other things it will take a business plan that lets the company move smoothly through this make-or-break stage. (Read more)

NZ government wins open source award October 30, 2007
The New Zealand State Services Commission's (SSC) championing of open-source software in government helped its ICT (Information and Communications Technology) branch pick up an award in the government category of the inaugural New Zealand Open Source Awards, held in Wellington this month. (Read more)

Software guru is hot on Linux, busting bureaucracy October 29, 2007
Grady Booch is chief scientist at IBM's Rational Software unit and an IBM fellow who also holds the title "free radical." His software development approach and the Unified Modeling Language, which he helped create, have been used to build the software that runs pacemakers, avionics in certain large airliners, antilock brake systems, and financial trading systems in the U.S., Europe and Asia. (Read more)

Red Hat: Open Source mature, disruptive and innovative October 26, 2007
Open source is disruptive, it develops rapidly, is adopted quickly, and it efficiently meets market needs while enabling new market capabilities. These were some of the statements made at an open source symposium held in Western Australia (WA) earlier this month. (Read more)

50 greatest networking arguments: VMware vs. Xen vs. Microsoft October 26, 2007
VMware is clearly the top player in virtualization, but competitors such as Citrix and Microsoft want a piece of this hot market, too. (Read more)

50 greatest networking arguments: Open source vs. proprietary software October 26, 2007
Open source software makes inroads vs. proprietary software despite warnings of Microsoft, others. (Read more)

50 greatest networking arguments: Novell NetWare vs. Microsoft networking October 26, 2007
Novell had the early lead in the network operating system market, but a persistent Microsoft kept hammering away until NetWare become a just a memory in many companies. (Read more)

SCO has a buyer, pending bankruptcy approval October 25, 2007
Embattled SCO Group is offering the bankruptcy court a deal it could be hard to refuse. (Read more)

Post-install tips for Ubuntu 7.10 October 25, 2007
I don't know about where you live, but where I live, it feels like October. Halloween orange has sprouted everywhere from the grocery store to the doctor's office, the weather has acquired a distinctive chill, and, of course, we have a new release of Ubuntu Linux. Version 7.10 hit the Net just last week, right on time. (Ubuntu releases tend to come each October and April.) (Read more)

Asian governments driving demand for open source October 25, 2007
Asian governments are pivotal to Red Hat's goal of earning 60 percent of its revenue from outside the United States by the end of 2009, said Matthew Szulik, the company's chairman, CEO and president, in a conference call on Thursday. (Read more)

LinuxWorld Community

Corporate open source advice October 28, 2007
Some surprising moves, such as the much-maligned mission statement, can help corporate open source projects work, said Ben Collins-Sussman and Brian Fitzpatrick. (Read more)


Contact the author:

Don Marti is editor of LinuxWorld.com.



BONUS FEATURE

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

Huchison 3 to release Skypephone in 8 countries; VoIP Security Products

Network World

Convergence & VoIP News Alert




Network World's Convergence & VoIP News Alert, 10/31/07

Huchison 3 to release Skypephone in 8 countries, 10/29/07: U.K. mobile phone operator Huchison 3G UK on Monday rolled out the Skypephone, a handset designed to simplify use of the Skype VoIP application.

Vonage update: AT&T files patent claim, Verizon dispute settled, 10/29/07: Vonage disclosed in a Securities and Exchange Commission (SEC) filing that on Oct. 17 that AT&T had filed a patent infringement claim against the company. According to the filing, Vonage said that it intends to continue to pursue an amicable resolution of this matter, but that it cannot assure that this matter will not ultimately be litigated.

Location-aware fixed-mobile convergence holds promise, 10/29/07: On Oct. 15, start-up Agito Networks entered the exciting enterprise fixed-mobile convergence (eFMC) market. As John Dix pointed out in his article Cell/Wi-Fi convergence based on novel approach, Agito is using a new approach to determine when a mobile phone call should be switched from a cellular network to your enterprise WLAN when moving in building, and vice versa when you leave the enterprise.

Did you know that 90% of IT managers are not prepared for a DNS Attack?

Don't be one of them...Check your DNS health today. Run a DNSreport and look like a hero. Make your life easier and make your company more secure. 56 critical tests against your domain in 8 seconds. Don't live without it.

Visit today to learn more!

The Network World IT Buyer's Guides provide comprehensive, detailed information on how to select, test, buy and deploy thousands of network and IT products. The new Network World IT Buyer's Guides offer even more features than before, here's just one that's worth checking out: VoIP Security Products

Editor's note: Starting the week of Nov. 12, you will notice a number of enhancements to Network World newsletters that will provide you with more resources and more news links relevant to the newsletter's subject. The Convergence & VoIP Newsletter, written by analysts Steve Taylor and Larry Hettick, will be merged with the VoIP News Alert and will be named the Convergence & VoIP Alert. You'll get Steve and Larry's analysis of the convergence and VoIP market, which you will be able to read in full at NetworkWorld.com, plus links to the day's convergence news and other relevant resources. This Alert will be mailed on Mondays and WedneWAN + WAN ALertsdays. We hope you will enjoy the enhancements and we thank you for reading Network World newsletters.

MOST-READ STORIES:
1. Networking's 50 greatest arguments
2. Attack code for Kodak bug in Windows
3. Storm worm strikes back at security pros
4. Is Fibre Channel dead?
5. Cisco certifications: All you need to know
6. Top 20 Firefox extensions
7. Fake FTC e-mails contain virus attack
8. Technology's 10 most mortifying moments
9. Cisco backs away from Brazilian tax scandal
10. Unlimited gall to cost Verizon $1 million

MOST E-MAILED STORY:
10 reasons ITIL spooks IT managers


Contact the author:

Senior Editor Tim Greene covers VoIP carrier issues for Network World.



BONUS FEATURE

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

Cisco's profits: 5 trends worth watching; Cisco cautious on Brazil case

Network World

Cisco News Alert




Network World's Cisco News Alert, 10/31/07

Cisco's profits: 5 trends worth watching, 10/29/07: Wall Street has high hopes for Cisco's latest quarterly results, which are slated to be announced Nov. 7. But even if you aren't a shareholder, there are five key pieces of information that Cisco customers and partners should listen for during the earnings call. Here's the rundown.

Cisco cautious on Brazil case, 10/29/07: Cisco Monday appeared to further distance itself from a tax scandal in Brazil, saying it can't vouch for everything its channel partners do.

Cisco and OOPSLA hoopla: While Cisco has its share of excellent technical experts, it might not be the first company you’d think of headlining an event called the Object-Oriented Programming, Systems, Languages and Applications event (OOPSLA 2007 ).

Wireless LAN Security: A to Z

From buying tips to peer discussions. From case studies to market trends. Network World's newly enhanced Wireless Security Buyer's Guide has everything you need to stay current, research technology, compare products and implement solutions - all in one convenient location.

Visit the Wireless LAN Security Buyer's Guide now.

Cisco Subnet: Cisco to triple headcount in India to 10K by 2010, 10/30/07: John Chambers said Monday that Cisco plans to scale-up its headcount in India to 10,000 by 2010, reports the Rediff news. Cisco currently employs about 3,000 there. In December, the company selected India as the site for its Cisco Globalization Center East. (Also, check out Layer 8, where we find that: Cisco expects a lot out of India.)

Cisco vs. Bay/3Com/Cabletron/Juniper, 10/26/07: Cisco blew through a slew of rivals in routing and switching during the 1990s and early 2000s, though Juniper is hanging tough

Routing vs. switching, 10/26/07: Routing got the early lead on switching thanks to Cisco, then the two technologies melded and evolved.

Cisco Subnet giveaways: Last day to enter to win free Cisco training worth up to $3,995, courtesy of Global Knowledge. Plus enter to win a free copy of "Monitoring with Cisco Security MARS" by Gary Halleen and Greg Kellogg, published by Cisco Press.

Editor's note: Starting the week of Nov. 12, subscribers to the HTML version of this newsletter will notice some enhancements to the layout that will provide you with easier and clearer access to a wider range of resources at Network World. We hope you enjoy the enhancements and we thank you for reading Network World newsletters.

MOST-READ STORIES:
1. Networking's 50 greatest arguments
2. Attack code for Kodak bug in Windows
3. Storm worm strikes back at security pros
4. Is Fibre Channel dead?
5. Cisco certifications: All you need to know
6. Top 20 Firefox extensions
7. Fake FTC e-mails contain virus attack
8. Technology's 10 most mortifying moments
9. Cisco backs away from Brazilian tax scandal
10. Unlimited gall to cost Verizon $1 million

MOST E-MAILED STORY:
10 reasons ITIL spooks IT managers


Contact the author:

Senior Editor Jim Duffy covers Cisco for Network World.

Linda Leung edits Cisco Subnet.

Cisco Subnet: The independent voice of Cisco customers

 



BONUS FEATURE

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

Microsoft plots ambitious SOA roadmap; Google makes social networking power move; Scary security stories

Network World

Daily News: AM




Network World Daily News: AM, 10/31/07

Microsoft plots ambitious SOA roadmap
Microsoft Tuesday laid out an ambitious SOA roadmap around a set technologies code-named Oslo that will be blended into its middleware, development, and management tools and some of its emerging enterprise online services.

Google makes social networking power move -- finally
Belatedly recognizing the importance of social networking as an online service and advertising vehicle, Google this week will unleash its strongest response yet to the rising threat and skyrocketing popularity of MySpace and Facebook.

Companies tap RSS to tame info overload
As employees struggle to read an increasing amount of work-related material, some companies have turned to RSS (Really Simple Syndication) technology to improve productivity.

Executive Guide "Data Center Decisions"

Download our new Executive Guide "Data Center Decisions" to sharpen your competitive edge. This guide offers tips on dealing with server consolidation, virtualization, management, cooling and power issues.

Click Here for More Information

Ingrian updates encryption appliance line
Ingrian Networks announced Monday it has updated its DataSecure encryption appliance line most commonly used for credit-card encryption, adding the high-end 400 Series and discontinuing the 300 Series, while keeping the low-end 100 Series with enhancements.

IBM taps Alcatel for unified-communications strategy
IBM and networking provider Alcatel-Lucent are teaming up to take Microsoft head-on in the unified-communications market.

7-year Internet tax ban heads to president
The U.S. House of Representatives has approved a seven-year extension to an Internet tax ban, the final step before the legislation heads to President George Bush to be signed into law. The House on Tuesday approved the Senate version of the Internet tax moratorium, which would ban Internet-only taxes such as access taxes for seven years. The current ban has been in effect since 1998, except for a lapse during most of 2004.

Van Wyk aims to transform Red Hat for future growth
Having established itself as the leading enterprise Linux vendor, Red Hat is in a pivotal phase of reinventing itself as a broader open-source software provider and a long-term technology leader a la Microsoft and Oracle. It's a tall order, and among other things it will take a business plan that lets the company move smoothly through this make-or-break stage.

PODCAST

Real-life scary security stories
Want some real Halloween scares? Listen to tales of the school district where compromised computers were giving up data for months; the CSO who thought his password was secure by leaving it on a Post-It Note under his keyboard; how a USB device with nuclear weapon data ended up in the hands of a crack dealer; how a cyber-stalker was able to steal and delete digital images from his victim's PC; and more spooky stories from security experts.

BLOGS

Today on Microsoft Subnet
Microsoft releases roadmap for SOA, codenamed Oslo and involving the next-generation of BizTalk, .Net and System Center 5; Apple reports that it has sold 2 million copies of Leopard spurring the comparisons between Leopard and Vista; Blogger Tyson Kopczynski weighs in on the perimeter vs. no-perimeter argument.

Today at Cisco Subnet
Cisco to triple headcount in India to 10K by 2010; Does the Vyatta router solution monitor how business processes are operating?; Cisco's profits: 5 trends worth watching; It's the last day to enter to win free Cisco training worth up to $3,995, courtesy of Global Knowledge. Plus enter to win a free copy of "Monitoring with Cisco Security MARS" by Gary Halleen and Greg Kellogg, published by Cisco Press.

Buzzblog: Let poker players be free
Pentagon Papers case: check. Bailing out Julia Roberts: check. Lawyer’s next crusade? Freeing poker players from tyranny.

Today on Layer 8, where we fully expect to have our own tractor beam up and running in a few years that will significanlty reduce our commuting time:
Call it Star Trek tech for microscopes. MIT researchers said today they have found a way to use a “tractor beam” of light to pick up, hold, and move around individual cells and other objects on the surface of a microchip.

Editor's note: Starting the week of Nov. 12, subscribers to the HTML version of this newsletter will notice some enhancements to the layout that will provide you with easier and clearer access to a wider range of resources at Network World. We hope you enjoy the enhancements and we thank you for reading Network World newsletters.

MOST-READ STORIES:
1. Networking's 50 greatest arguments
2. Attack code for Kodak bug in Windows
3. Storm worm strikes back at security pros
4. Is Fibre Channel dead?
5. Cisco certifications: All you need to know
6. Top 20 Firefox extensions
7. Fake FTC e-mails contain virus attack
8. Technology's 10 most mortifying moments
9. Cisco backs away from Brazilian tax scandal
10. Unlimited gall to cost Verizon $1 million

MOST E-MAILED STORY:
10 reasons ITIL spooks IT managers


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007