Search This Blog

Wednesday, August 31, 2011

Welcome to the avaif group

Hello,

I've added you to my avaif group at Yahoo! Groups, a free,
easy-to-use service. Yahoo! Groups makes it easy to send and receive
group messages, coordinate events, share photos and files, and more.


Description of the group:
------------------------------------------------------------------------
py2hit3x1fudavtwd1

Complete your Yahoo! Groups account:
----------------------------------------------------------------------
Your email address has been added to the email list of a Yahoo! Group.
To gain access to all of your group's web features (previous messages,
photos, files, calendar, etc.) and easier control of your message
delivery options, we highly recommend that you complete your account
by connecting your email address to a Yahoo account. It is easy and free.
Please visit:
http://groups.yahoo.com/convacct?email=security.world%40gmail.com&list=avaif

Important information about the avaif group
------------------------------------------------------------------------
* To send a message to the members of this group, send an email to:
avaif@yahoogroups.com

* To leave the group, you can unsubscribe by replying to this message,
or by sending an email to:
avaif-unsubscribe@yahoogroups.com

Regards,

Moderator, avaif

Report abuse:
------------------------------------------------------------------------
Because Yahoo! Groups values your privacy, it is a violation of our
service rules for moderators to add subscribers to a group against
their wishes. If you feel this has happened, please notify us:
http://help.yahoo.com/l/us/yahoo/groups/original/members/forms/abuse.html

You may also change your email preferences to prevent group owners from
adding you to their groups. To do so, please go here:
http://groups.yahoo.com/s?tag=JHiyj4pHuZROFw7pWyfK8vixPWUczmWTC-t0B5sNAw_cPMcqdLpougA7R01BqD2g-7L2dU_Zgps5dZQYHVwm

Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/

Linux Foundation chief: 'You are an idiot' if you don't give back to open source

  Jim Zemlin talks about Torvalds' leadership, HTML5 and mobile's future | Android smartphones surge to 42% share
 
  Network World Linux and Open Source

Forward this to a Friend >>>


Linux Foundation chief: 'You are an idiot' if you don't give back to open source
Some of those who use Linux, free for the taking, don't give back in equal measure. Still, the time for cajoling those users -- even commercial projects like Ubuntu leader Canonical -- into participating is over, says Jim Zemlin, executive director of the nonprofit Linux Foundation. Read More


WEBCAST: GFI Software

GFI MailEssentials Complete Appliance Demonstration
View a 20-minute product demo of this comprehensive email protection solution that combines antivirus, anti-spam and attachment filtering in a robust, highly scalable, easy-to-manage platform. View now

WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Jim Zemlin talks about Torvalds' leadership, HTML5 and mobile's future
As the executive director of the Linux Foundation, Jim Zemlin is frequently asked to forecast the future of the IT industry. While he's happy to do so, he's the first to admit that he could be wrong. Read More

Android smartphones surge to 42% share
Google's Android smartphones surged by 15% in popularity in the U.S., topping out the field with a nearly 42% share, according to a ComScore survey. Read More


WHITE PAPER: GFI Software

Messaging and Web Security Best Practices for 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years. Read More

Oracle-Google trial start may be delayed
The start of the trial in Oracle's lawsuit against Google over alleged Java copyright and patent violations in the Android mobile OS could be delayed, according to a judge's ruling issued Monday in U.S. District Court for the Northern District of California. Read More

Linux at 20: New challenges, new opportunities
The rise of cloud computing and mobility could elevate the open source OS to a level of unprecedented dominance Read More


WHITE PAPER: Riverbed

Application-Aware Network Performance Management
Riverbed® Cascade© stacks up extremely well against the competition. How well? In particular, Cascade outperforms other application-aware network performance management solutions in such important areas as product strength and cost efficiency. Read Now.

Rapid7 Launches Open Source Magnificent 7
Alan Shimel: Rapid7 has continued to put its money where its mouth is regarding support of open source security projects. Read More

Marketers, Open Source is Different
Stephen Spector: As an open source community manager, I am often asked about the best way to market solutions to open source communities. Read More

Chasing Unicorns, My Quest For A TouchPad
It all started last Friday when HP announced that it was abandoning the consumer, mobile and even the PC market. I then became a locust in the swarm determined to buy a $99 TouchPad. Read More

Visit Open Source Subnet for more news and blogs
Visit the Open Source Subnet home page for daily news items, blogs, discussions and podcasts of interest to enterprise open source users. Follow Open Source Subnet on Twitter @OSSubnet. Read More

 
 
 

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. 'You are an idiot' if you don't give back to open source
  2. Google one of many victims in SSL certificate hack
  3. Cisco, VMware expand collaboration
  4. IPv6: What you need to do now
  5. The ribbon is winding further into Windows
  6. Thinnest material in the world could boost Internet speeds tenfold-plus
  7. Sprint's mysterious Oct. 7 event fuels more iPhone, LTE speculation
  8. Google, OpenDNS deploy DNS tweak for faster browsing
  9. Top cybersecurity concerns: Malicious code, employees run amok
  10. Death by Morto A? It's your own fault, says Microsoft
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_linux_open_source_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

Feds move to block AT&T-T-Mobile merger

  Match Made in Hell: 7 Worst Tech Mergers and Acquisitions | VMworld's quirkiest moments
 
  Network World Daily News PM

Forward this to a Friend >>>


Feds move to block AT&T-T-Mobile merger
The U.S. Department of Justice Wednesday moved to block the proposed $39 billion merger between AT&T and T-Mobile. Read More


WHITE PAPER: Citrix Systems

Case study: Getting started with desktop virtualization
The promise of virtualized desktops is widely recognized and desktop virtualization is topping most IT departments' priority lists. But while the "why" of desktop virtualization is clear, it's the "how" that is most challenging. Follow one customer's journey to a more agile and secure business environment. Learn more.>>

WHITE PAPER: Schooner Information Technology

The Short Guide to MySQL High-Availability Options
The Short Guide to MySQL High-Availability Options: An analysis of today's MySQL high-availability challenges and what asynchronous, semi-synchronous and fully synchronous replication offer toward reducing downtime, achieving full data consistency, automating failover, and simplifying administration. Read now!

Match Made in Hell: 7 Worst Tech Mergers and Acquisitions
Read More

VMworld's quirkiest moments
The VMworld Conference here, attended by more than 19,000 people, is highlighting the dynamic creativity of VMware's software division managers and technical staff as they present what's in the works for virtualization of desktops, servers and their management. But that doesn't mean this show isn't without its quirky moments. Here are a few: Read More

Microsoft claims its private cloud is up four times cheaper than VMware's
Microsoft has always positioned Hyper-V to be a less expensive alternative to VMware. Now the software giant says that with VMware's new VRAM-based pricing, it calculates a private cloud built on Microsoft can cost up to $70,000 less than one built under VMware's licensing schemes. Read More

Sprint cheers government move to halt AT&T-T-Mobile deal
It's not often that a company will cheer when the government directly intervenes in its industry, but things are different when you face potential oblivion without government action. Read More


WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

AT&T gets its first LTE tablet
AT&T may not have its LTE network officially up and running yet but that isn't stopping the carrier from selling its first-ever LTE-capable tablet computer. Read More

TouchPad fire sale such a hit that HP will burn another building
Never mind a better mouse trap; just sell tablets for a third of what they cost to build and the world will beat a path to your door. That may appear to be the lesson HP is taking from the "success" of its $99 sell-off of discontinued TouchPad stock, but the company is actually attempting to quell the ire of those shut out during the first buying frenzy. Read More

Google adds offline access to Gmail in Chrome
Chrome browser users will be able to access Gmail when they're not connected to the Internet starting Wednesday and will gain similar offline capabilities for Docs and Calendar in the coming week, the company announced on Wednesday. Read More

Stanford's Open Networking Summit to highlight OpenFlow, SDN
Stanford University this October will host the first Open Networking Summit, which will focus on the history, state and future of OpenFlow and software-defined networking technologies. The event, orchestrated by Stanford University's Clean Slate Program, will be held Oct. 17-19 at the university's Li Ka Shing Center. It will feature hands-on tutorials as well as keynotes and sessions featuring subject matter experts. Read More


WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

IBM acquiring i2 for criminal mastermind software
Expanding its portfolio of analytic software for state and local governments, IBM is in the process of acquiring security analytics software provider i2, the companies announced Wednesday. Terms of the deal were not disclosed. Read More

Spotify woos iPhone, iPad developers with iOS tool
Spotify, the much buzzed about digital music streaming service that made its U.S. debut in July is looking to extend its reach even further by releasing a tool for Apple iOS developers. Read More

Apache patches Web server DoS vulnerability
The Apache open-source project patched its Web server software Tuesday to quash a bug that a denial-of-service tool has been exploiting. Read More

How the network supports cloud computing
Over the last few years there have been a seemingly endless array of articles and reports written on cloud computing. These articles are helpful in that they identify trends in the growing adoption of cloud computing. However, these articles and reports seldom focus on what all of this means to the network. The next two newsletters will focus on the impact of cloud computing on the network in general and will look at the role of the application delivery controller in particular. Read More

IFA: Video diary - behind the scenes at Sony
Follow IDG's Nick Barber behind the scenes ahead of the Sony press conference at the IFA consumer electronics show in Berlin. Read More

The Race to Thin: A Look Back at the Incredible Shrinking Laptop
Join us as we chronicle the shrinking of laptops over time--from suitcase-size 'luggable' computers to notebooks so thin and light you might forget you're carrying them. Read More

 
 
 

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. 'You are an idiot' if you don't give back to open source
  2. Google one of many victims in SSL certificate hack
  3. Cisco, VMware expand collaboration
  4. IPv6: What you need to do now
  5. The ribbon is winding further into Windows
  6. Thinnest material in the world could boost Internet speeds tenfold-plus
  7. Sprint's mysterious Oct. 7 event fuels more iPhone, LTE speculation
  8. Google, OpenDNS deploy DNS tweak for faster browsing
  9. Top cybersecurity concerns: Malicious code, employees run amok
  10. Death by Morto A? It's your own fault, says Microsoft
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

[SECURITY] [DSA 2200-1] nss security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2200-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
August 31, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : nss
Vulnerability : comprimised certificate authority
Problem type : local(remote)
Debian-specific: no
CVE ID : not available

Several unauthorised SSL certificates have been found in the wild issued
for the DigiNotar Certificate Authority, obtained through a security
compromise with said company. Debian, like other software
distributors, has as a precaution decided to disable the DigiNotar
Root CA by default in the NSS crypto libraries.

For the oldstable distribution (lenny), this problem has been fixed in
version 3.12.3.1-0lenny5.

For the stable distribution (squeeze), this problem has been fixed in
version 3.12.8-1+squeeze2.

For the unstable distribution (sid), this problem has been fixed in
version 3.12.11-2.

We recommend that you upgrade your nss packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk5ec2AACgkQXm3vHE4uylqWOgCePJ7ZxFxowQr+ashVepfiGkQr
jfUAni/Kbo0YSC9jq3qjrH8D0x3oPmKq
=H29c
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/20110831174703.GA4517@pisco.westfalen.local

[SECURITY] [DSA 2299-1] ca-certificates security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2299-1 security@debian.org
http://www.debian.org/security/ Thijs Kinkhorst
August 31, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : ca-certificates
Vulnerability : comprimised certificate authority
Problem type : local/remote
Debian-specific: no
Debian Bug : 639744

An unauthorized SSL certificate has been found in the wild issued
the DigiNotar Certificate Authority, obtained through a security
compromise with said company. Debian, like other software
distributors, has as a precaution decided to disable the DigiNotar
Root CA by default in its ca-certificates bundle.

For other software in Debian that ships a CA bundle, like the
Mozilla suite, updates are forthcoming.

For the oldstable distribution (lenny), the ca-certificates package
does not contain this root CA.

For the stable distribution (squeeze), the root CA has been
disabled starting ca-certificates version 20090814+nmu3.

For the testing distribution (wheezy) and unstable distribution
(sid), the root CA has been disabled starting ca-certificates
version 20110502+nmu1.

We recommend that you upgrade your ca-certificates packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJOXmW6AAoJEOxfUAG2iX57w/sIAM1IXqr2QRL8NfF9dU8iWvzI
2HzaqwiCE1+MmFxg/vvXuosgxVTbqytRkJ6fnbbsz3pPtjeQCZqG/z0RP7d7Dkv+
YdAc4aMoCyAzavYoGjCw0vIgs6BJNeZmJVixqpceDzHie+o0FNL29FkHjpgeTpZk
9oIRSaeG+YMUypmJf9V0ZpDIO/S/6WzNqfrskOkm8xZimHkMAOaSh86r3gmdX9Rd
RGqR3nEG1iiR6/yHB4UyZsnOJC93z5Rb9xH0vCmzcDyv7mbSOq+JxE8uN7H3YvOe
4dJeJX9jwCtQHb8Miw3j9IRHs0bOQLpuxUlxl+9F5DElPIqsXnfXAZC0HrqtkYo=
=yv4N
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/20110831164820.2972E59DE4@kinkhorst.com

VMworld: Security, regulatory concerns still a challenge in virtualization

  Top cybersecurity concerns: Malicious code, employees run amok | Android Devices Exposed: 7 Ways to Thwart Hackers
 
  Network World Security

Forward this to a Friend >>>


VMworld: Security, regulatory concerns still a challenge in virtualization
While VMware users harbor little doubt about the cost savings and productivity gains brought by virtualizing their networks, security concerns still exist on many fronts, whether it's figuring out how to meet regulatory compliance with auditors, or evaluating cloud services. Read More


WHITE PAPER: GFI Software

PCI-DSS Compliance and GFI Software Products
The intent of this document is to provide you with GFI's understanding of the requirements, and how the GFI Software product line can assist you to meet PCI compliance as outlined in the PCI DSS Requirements. Read now!

WHITE PAPER: CenturyLink Business

Why IT Leaders Aren't Scared of Cloud Security
Examine this CIO report in which your peers offer advice on cloud services and data protection. Learn 3 key tips for taking the right approach to securing a hybrid cloud infrastructure to dispel any data doubts. Read now!

Top cybersecurity concerns: Malicious code, employees run amok
When 3,300 information-technology professionals were asked about cybersecurity, they said malicious code attacks accounted for the main type of cyberattack their organizations suffered during the past year, although "internal unintentional actions" by well-meaning insiders also wreaked havoc. Read More

Android Devices Exposed: 7 Ways to Thwart Hackers
Take a deep breath. There's a new report out highlighting a huge spike in threats against Google's Android platform. Yes, it's something to be concerned about. But don't freak out or return your cool new Samsung Galaxy Tab. Read More


WHITE PAPER: Riverbed

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

Trend Micro: Virtualization changing our anti-malware business big time
Virtualization -- in particular Trend Micro's close alliance with VMware -- is bringing about a strategic shift in Trend's anti-malware business as its products become designed for use with VMware's vShield technology. Read More

Hackers stole Google SSL certificate, Dutch firm admits
The Dutch company that issued a rogue digital certificate for all Google Internet domains said Tuesday that its network had been hacked last month. Read More


WHITE PAPER: CA Technologies

Defend Against Insider Threats
Organizations must accept the reality that insider threats are no longer an abstract concept. This paper explains the factors that are increasing the insider threat and details a proactive approach that leverages identity and access management to reduce risk and improve compliance. Learn More

Google, OpenDNS deploy DNS tweak for faster browsing
Nearly 40 million Internet users will experience faster Web browsing starting today, thanks to a protocol tweak being deployed by Google, OpenDNS and several content delivery networks that allows them to more precisely serve up content from the nearest available server. Read More

Akamai employee tried to sell secrets to Israel
A 43-year-old former Akamai employee has pleaded guilty to espionage charges after offering to hand over confidential information about the Web acceleration company to an agent posing as an Israeli consular official in Boston. Read More

Five Things CIOs Need to Know about Anonymous
1. Nobody's in charge. "We are Anonymous. We are legion." This cryptic slogan is used by a band of hackers who call themselves Anonymous. Active for nearly a decade now, the group catapulted into prominence in the past year with attacks on PayPal, Visa, HBGary and Sony. Often called a hacking collective, Anonymous is essentially a movement. There is no central authority. From time to time, participants band together to launch "operations," led by a small group of trusted associates. The operation leaders write up orders and invite anyone who is interested to participate. Operations can happen online or in the real world. Read More

Death by Morto A? It's your own fault, says Microsoft
The Morto A worm is having continued success despite its reliance on a list of lame passwords to take over victim machines. Read More

 
 
 

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

MOST-READ STORIES

  1. The ribbon is winding further into Windows
  2. Death by Morto A? It's your own fault, says Microsoft
  3. New Windows worm spreads by attacking weak passwords
  4. Windows Servers & Workstations vulnerable to worm in the wild
  5. Microsoft bashes VMware at VMworld, again
  6. IPv6: What you need to do now
  7. Distracted to death (Jennifer Aniston naked)
  8. Cisco buys Microsoft Office collaboration company
  9. Acme Packet: 'We're building a signal system for the Internet'
  10. Scariest IPv6 attack scenarios
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

I tried calling you yesterday...you GOTTA see this

This is crazy, you have to see it for yourself to believe it.

I found this site the other day and the video on it is completely SHOCKING..

I did my research and everything the guy sys on the video is true.

It's insane, you gotta see it

http://www.25ormorehrly.yolasite.com

Let me know what you think..

Talk soon,
Admin
----------------------------------------
DIN sent this email to security.world@gmail.com
Questions? Contact cashinyourhandz@yahoo.com or DIN, c/o FanBridge, Inc. - 14525 SW Millikan Way, #16910, Beaverton, Oregon 97005, United States

Update Your Information - http://fburls.com/updt/154281|b17rBkeFa6YK9haPB19KUh4aba|security.world@gmail.com|767989
Forward to a friend - http://fburls.com/fwrd/154281|b17rBkeFa6YK9haPB19KUh4aba|178745552|767989
Unsubscribe - http://fburls.com/usub/154281|b17rBkeFa6YK9haPB19KUh4aba|178745552|767989
Privacy Policy - http://www.fanbridge.com/learn/privacy.php

This email message is powered by FanBridge:
http://www.fanbridge.com/b.php?id=154281
Powering Valuable Fan Relationships