Thursday, June 30, 2005

Crypto usb

Hi
I search for a crypto engin on usb 2.0.
The engin must allow a high throu-put.
Up to now I find only usb-tokens oder signature devies.
Background: In a VPN Wlan network, build up with linksys wrt54g, is the
problem of the buthelnec by the cpu. Because the Broadcom cpu has not enough
power to server the 54 MB/s Wlan.

So I need a usb device with overtake the crypto rutines.
Thx
Ryven

ps. Sorry about my bad english.

--
To UNSUBSCRIBE, email to debian-firewall-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Hoax-Slayer: June Online Version Now Available

Hoax-Slayer: June Online Version Now Available

Hello,

This is just a note to let you know that the June issue of
the Hoax-Slayer Newsletter is now available for viewing online.
To access the online version of the newsletter, click the link
below:
http://www.hoax-slayer.com/current-issue.html
<a href="http://tinyurl.com/cz9mj">Current Issue</a>

Note:
The full plain-text version of the newsletter has already been
sent this month. This second email is to ensure that *all*
subscribers get to see the current issue. For details, see:
http://tinyurl.com/cwt43
<a href="http://tinyurl.com/cwt43">AOL users click here</a>

Best regards,
Brett

*************************************************************

<_________Information about Hoax-Slayer_________________________>

To UNSUBSCRIBE from: Hoax-Slayer Newsletter, just follow this link:

http://www.hoax-slayer.com/cgi-bin/mojo/mojo.cgi?f=u&l=hxez&e=security.world@gmail.com&p=8185

Click the link, or copy and paste the address into your browser.

Alternatively, you can visit the special Unsubscribe webpage via
the link below and follow the instructions:
<http://www.hoax-slayer.com/unsub.html>

To view the Hoax-Slayer Privacy Policy visit:
<http://www.hoax-slayer.com/privacy.html>

_______________________________________________________________

The Hoax_Slayer Newsletter is published by:
Brett M.Christensen
Queensland, Australia
All Rights Reserved
(c) Brett M. Christensen, 2005
<mailto:bchristensen@hoax-slayer.com>
***************************************************************

[SECURITY] [DSA 736-1] New spamassassin packages fix potential DOS

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory 736-1 security@debian.org
http://www.debian.org/security/ Michael Stone
July 01, 2005 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : spamassassin
Vulnerability : mail header parsing error
Problem type : remote DOS
Debian-specific: no
CVE Id(s) : CAN-2005-1266
Debian Bug : 314447

A vulnerability was recently found in the way that SpamAssassin parses
certain email headers. This vulnerability could cause SpamAssassin to
consume a large number of CPU cycles when processing messages containing
these headers, leading to a potential denial of service (DOS) attack.

The version of SpamAssassin in the old stable distribution (woody) is
not vulnerable.

For the stable distribution (sarge), this problem has been fixed in
version 3.0.3-2. Note that packages are not yet ready for certain
architectures; these will be released as they become available.

For the unstable distribution (sid), this problem has been fixed in
version 3.0.4-1.

We recommend that you upgrade your sarge or sid spamassassin package.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 3.1 (sarge)
- ------------------

Source archives:

http://security.debian.org/pool/updates/main/s/spamassassin/spamassassin_3.0.3-2.diff.gz
Size/MD5 checksum: 44610 b1b383fc4f9dc0792ecd954fa99aaa56
http://security.debian.org/pool/updates/main/s/spamassassin/spamassassin_3.0.3.orig.tar.gz
Size/MD5 checksum: 999558 ca96f23cd1eb7d663ab55db98ef8090c
http://security.debian.org/pool/updates/main/s/spamassassin/spamassassin_3.0.3-2.dsc
Size/MD5 checksum: 776 4f3092c679992ad322598f4195f4800c

Architecture independent packages:

http://security.debian.org/pool/updates/main/s/spamassassin/spamassassin_3.0.3-2_all.deb
Size/MD5 checksum: 768948 b2d7f49923aa67d8a016e5a3b3545249

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_alpha.deb
Size/MD5 checksum: 61552 84fcd819583c747545fda079a074d987

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_i386.deb
Size/MD5 checksum: 58438 18138ce49c9d249fb5d93487e60481a2

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_ia64.deb
Size/MD5 checksum: 65020 65e214d1922317d511e23c32f7e19ff6

m68k architecture (Motorola Mc680x0)

http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_m68k.deb
Size/MD5 checksum: 57536 b13aad3cb78a148e8838ddfdb301dbd5

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_mips.deb
Size/MD5 checksum: 60228 8578263361ff0e95ed0bddc2493d620e

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_mipsel.deb
Size/MD5 checksum: 60202 2338edb2f9679396005d490232147b7b

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_powerpc.deb
Size/MD5 checksum: 60578 e547e452fc5e7ed28b04065af1b677a0

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_s390.deb
Size/MD5 checksum: 59436 32ab8a7fef23ac35912ae51cc22aad29

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_sparc.deb
Size/MD5 checksum: 58370 8791b8226b25a0bc5381f39257ecd547

- -------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iQCVAwUBQsSl5w0hVr09l8FJAQJckQP+It+rZFa4xKdZUM5f3OWBXEOUdxbsZ3vB
Q/2V/PHyNOP2xXT81M+ZUXk+Tggi4TuBFaxXfg/gHOuYE7vcfBfT/hpxjvgDgTXI
PDUQSpdRjmPMgQq84eUryJzQNwwXv5iVFjeKDrDTDd3qnBja707XZTUuotYGgUp2
KdvwCAkNzrE=
=TN0J
-----END PGP SIGNATURE-----

--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

[SECURITY] [DSA 735-1] New sudo packages fix pathname validation race

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory 735-1 security@debian.org
http://www.debian.org/security/ Michael Stone
July 01, 2005 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : sudo
Vulnerability : pathname validation race
Problem type : local
Debian-specific: no
CVE Id(s) : CAN-2005-1993
Debian Bug : 315115

A local user who has been granted permission to run commands via sudo
could run arbitrary commands as a privileged user due to a flaw in
sudo's pathname validation. This bug only affects configurations which
have restricted user configurations prior to an ALL directive in the
configuration file. A workaround is to move any ALL directives to the
beginning of the sudoers file; see the advisory at
http://www.sudo.ws/sudo/alerts/path_race.html for more information.

For the old stable Debian distribution (woody), this problem has been
fixed in version 1.6.6-1.3woody1. For the current stable distribution
(sarge), this problem has been fixed in version 1.6.8p7-1.1sarge1. Note
that packages are not yet ready for certain architectures; these will be
released as they become available.

We recommend that you upgrade your sudo package.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 3.0 (woody)
- ------------------

woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6.orig.tar.gz
Size/MD5 checksum: 333074 4da4bf6cf31634cc7a17ec3b69fdc333
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.3woody1.dsc
Size/MD5 checksum: 663 9d642dfebcaa64925b0dc8222fdef8fb
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.3woody1.diff.gz
Size/MD5 checksum: 32343 4e6a3617874f1a947073adbe8f5a8bd7

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.3woody1_alpha.deb
Size/MD5 checksum: 150074 adfd1c1e51dbe1dc66d5929c38035753

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.3woody1_hppa.deb
Size/MD5 checksum: 145954 62d30eb38b9605b3aeee404d7df6ad67

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.3woody1_i386.deb
Size/MD5 checksum: 133990 cbeaf7f9f666dcd118b3e6a5aff980c5

m68k architecture (Motorola Mc680x0)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.3woody1_m68k.deb
Size/MD5 checksum: 131568 0c43529165c66b41b1afee8a5fcab94c

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.3woody1_mips.deb
Size/MD5 checksum: 142726 fdd7c5c36fc97e6d43bd38c389eb6661

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.3woody1_mipsel.deb
Size/MD5 checksum: 142672 b569048607197ae6d1a6bda1b8678b28

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.3woody1_powerpc.deb
Size/MD5 checksum: 139220 89f8dba75e485aa186892b7ff8cae0a9

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.3woody1_s390.deb
Size/MD5 checksum: 138806 4ce4d39f104be67c037df435b2fbfcfa

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.3woody1_sparc.deb
Size/MD5 checksum: 141510 d09ac30ed8b11148616094bc11f6ff89

Debian 3.1 (sarge)
- ------------------

sarge was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1.dsc
Size/MD5 checksum: 647 727b653bb76115569d23a447b0886526
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1.diff.gz
Size/MD5 checksum: 22106 534fb1a1ed826d19585a210830b1b3e8
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7.orig.tar.gz
Size/MD5 checksum: 585302 ad65d24f20c736597360d242515e412c

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1_alpha.deb
Size/MD5 checksum: 176226 9e39a081bcfb34bcc51b26d9a741cdcb

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1_hppa.deb
Size/MD5 checksum: 170318 3f2cdd1fa837bfe741e2a00c2c7998ff

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1_i386.deb
Size/MD5 checksum: 159542 31bf940fb0e3efcfc3b6dd7a8d6183b7

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1_ia64.deb
Size/MD5 checksum: 194802 2f256e875cd8af6341e9d9e70f6d594e

m68k architecture (Motorola Mc680x0)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1_m68k.deb
Size/MD5 checksum: 154864 c7bf16b5de02b5dc53de79b050d4b610

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1_mips.deb
Size/MD5 checksum: 168270 950106a439c05ba869fab23e5173c0d6

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1_mipsel.deb
Size/MD5 checksum: 168074 142d0e2675335cc3db32017057ae4fab

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1_powerpc.deb
Size/MD5 checksum: 164932 eb71691a92c039e51c8af2838d1b66cf

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1_s390.deb
Size/MD5 checksum: 167808 5a3b22d227258306b36e9e925e4a36b0

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1_sparc.deb
Size/MD5 checksum: 162398 759a6f3d0facda5ca05037f40a4c0c64

- -------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iQCVAwUBQsSdaA0hVr09l8FJAQJeIwP/RsNnnkEEwvGv8JTvXBg/UfLQhrIxog7b
T3pnGKwM1RajhQSsSipmZG43JkTRsKt4N3PtWLNup8+pIi03u8trMMKYcbQEU3ol
XJ5B/+QdOEL/iuUfkpREnrTxfomTN8cbWDoW+yf67AEFGbB6bsInKCO/IPFvIyLE
q/Jnf4yX2Wg=
=Npjy
-----END PGP SIGNATURE-----

--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Sprint sets deadline to switch off legacy nets - Is there reason to panic?


NETWORK WORLD NEWSLETTER: TIM GREENE ON VPNS
06/30/05
Today's focus: Sprint sets deadline to switch off legacy nets -
Is there reason to panic?

Dear security.world@gmail.com,

In this issue:

* Sprint plans to shut down its legacy nets: What does this mean
  for users?
* Links related to VPNs
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Breach Security Inc.
What's Hidden In Your SSL Traffic? Network IDS solutions cannot
decrypt SSL.

SSL traffic passes through your network without examination.
Potential security breaches go undetected. BreachViewSSL
non-intrusively decrypts SSL traffic to deliver clear text to
the IDS for inspection. Eliminate this blind spot to avoid
being the victim of a hack. For a free evaluation copy visit
http://www.fattail.com/redir/redirect.asp?CID=107470
_______________________________________________________________
FREE NETWORK WORLD PRINT SUBSCRIPTIONS FOR NETWORK WORLD
e-NEWSLETTER SUBSCRIBERS

SUBSCRIBE TODAY - Receive 51 complimentary issues of Network
World Magazine. Network World delivers an extensive line-up of
product, service and industry news, comparative product reviews,
product tests, technology insiders, expert opinion and
management advice.
http://www.fattail.com/redir/redirect.asp?CID=107306
_______________________________________________________________

Today's focus: Sprint sets deadline to switch off legacy nets -
Is there reason to panic?

By Tim Greene

Sprint is accelerating the adoption of IP VPN services by
declaring it will shut down its frame relay and ATM services in
four years.

Doing so will force its customers to either make the transition
to Layer 2 and Layer 3 IP services or go elsewhere. But
customers are likely to come up against similar pushes by other
carriers that want to move to IP, even if they have yet to set a
concrete deadline, as Sprint has.

The trend has been for service providers to add IP connections
to existing frame relay and ATM networks they provide for their
customers. This integration gives customers the option to expand
their WANs without ripping out their current networks to adopt
IP all at once. Customers get experience with IP and service
providers can keep customers on their frame relay networks until
their IP networks are fully ready.

Meanwhile, customers reap the benefit of lower IP prices that
are designed to lure frame relay users.

There is no reason to panic here. So far Sprint is the only
major carrier to issue a deadline, and it is giving so much lead
time that most businesses will be able to figure out what they
want to do before it's time to renew their service contracts.

Customers who are satisfied with frame relay and reluctant to
switch to IP will likely be able to hang onto their service for
awhile given how pervasive frame relay is and given that frame
relay can be used as an access technology to an IP MPLS backbone
network. What looks like frame relay to the customer could in
fact be carried over the provider's IP backbone, an arrangement
that should be agreeable to both frame-relay diehards and
service providers eager to simplify their networks.

Businesses with frame relay and ATM WANs should explore IP VPN
services as an alternative for two reasons. It seems that the
transition is inevitable, so they should familiarize themselves
with it. And two, with service providers encouraging customers
to adopt IP, customers should be on the lookout for bargains,
which is one of the most effective enticements service providers
have to steer customers in the direction they want them to go.

RELATED EDITORIAL LINKS

Carriers push users to move off legacy nets
Network World, 06/20/05
http://www.networkworld.com/nlvpn2947
_______________________________________________________________
To contact: Tim Greene

Tim Greene is a senior editor at Network World, covering virtual
private networking gear, remote access, core switching and local
phone companies. You can reach him at <mailto:tgreene@nww.com>.
_______________________________________________________________
This newsletter is sponsored by Breach Security Inc.
What's Hidden In Your SSL Traffic? Network IDS solutions cannot
decrypt SSL.

SSL traffic passes through your network without examination.
Potential security breaches go undetected. BreachViewSSL
non-intrusively decrypts SSL traffic to deliver clear text to
the IDS for inspection. Eliminate this blind spot to avoid
being the victim of a hack. For a free evaluation copy visit
http://www.fattail.com/redir/redirect.asp?CID=107469
_______________________________________________________________
ARCHIVE LINKS

Breaking VPN news from Network World, updated daily:
http://www.networkworld.com/topics/firewalls.html

Archive of the VPN newsletter:
http://www.networkworld.com/newsletters/vpn/index.html
_______________________________________________________________
The rise of Asset Centric Security - WEBCAST explains

Conventional IT security architectures are not designed to be
flexible and cost-effective. One of the more damaging threat
source facing organizations today, in information security
terms, is the blended threat that have multiple means of
propagation and require an integrated security response, driven
by an asset-centric strategy. Tune in today, 24/7 and learn the
details.
http://www.fattail.com/redir/redirect.asp?CID=107345
_______________________________________________________________
FEATURED READER RESOURCE
FOCUS ON RECOVERY

IT professionals are changing the way they back up and recover
data, experts say, with new emphasis on the speedier fetching of
data made possible by advancing technologies. At a recent
storage conference in Orlando, disk-based backup solutions were
touted - find out if attendees agreed and if faster storage
solutions will soon be available. Click here:
<http://www.networkworld.com/news/2005/062005-data-recovery.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Backdoor password in Enterasys Vertical Horizon switches


NETWORK WORLD NEWSLETTER: JASON MESERVE'S VIRUS AND BUG PATCH
ALERT
06/30/05
Today's focus: Backdoor password in Enterasys Vertical Horizon
switches

Dear security.world@gmail.com,

In this issue:

* Patches from Gentoo, OpenPKG, Mandriva, others
* Beware new bot,Codbot, that can be used to log keystrokes and
  download malware
* Links related to Virus and Bug Patch Alert
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=107233
_______________________________________________________________
WHITE HAT HACKERS

Can hackers be ethical? Should you hire a hacker? Many security
experts advise organizations to hire ethical hackers - aka white
hat hackers - as consultants to carry out penetration testing of
their networks. But what are the risks? How would you even go
about hiring a hacker? Find out what NW says:
http://www.fattail.com/redir/redirect.asp?CID=107365
_______________________________________________________________

Today's focus: Backdoor password in Enterasys Vertical Horizon
switches

By Jason Meserve

Today's bug patches and security alerts:

Backdoor password in Enterasys Vertical Horizon switches

Jacek Lipkowski is reporting an undocumented system account
(user is "tiger", password is "tiger123") has been found in the
Vertical Horizon VH-2402S with firmware 02.05.00 or 02.05.09.07.
Enterasys seems to have released a fix for the problem:
<http://www.enterasys.com/download/download.cgi?lib=vh>
**********

Gentoo patches flaw in Trac

A flaw in Trac, a Web-based management system for bug tracking
and wiki projects, could allow an attacker to run malicious
applications on the affected machine. For more, go to:
<http://security.gentoo.org/glsa/glsa-200506-21.xml>

Gentoo releases fix for Tor

A flaw in Tor, a second-generation version of Onion Routing,
could be exploited by an attacker to view certain system memory
segments. For more, go to:
<http://security.gentoo.org/glsa/glsa-200506-18.xml>
**********

iDefense warns of flaws in IpSwitch WhatsUp Professional 2005

According to an advisory from iDefense, "Remote exploitation of
a SQL injection vulnerability in IpSwitch Inc.'s WhatsUp
Professional 2005 Service Pack 1 could allow a remote attacker
to gain administrative access to the application." For more, go
to:

iDefense advisory:
<http://www.networkworld.com/go2/0627bug2a.html>

IpSwitch fix:
<http://www.networkworld.com/go2/0627bug2b.html>
**********

OpenPKG fixes shtool

The shtool utility creates temporary files in a non-secure
manner, leaving them exploitable to a symlink attack. A hacker
could use this to potentially run malicious code on the affected
machine. For more, go to:
<http://www.openpkg.org/security/OpenPKG-SA-2005.011-shtool.html>
**********

Trustix releases "multi" update

A new update from Trustix fixes flaws in cpio, razor-agents,
sudo and telnet. The most serious of these could be exploited to
run malicious applications on the affected machine. For more, go
to:
<http://www.trustix.org/errata/2005/0030/>
**********

Mandriva patches squid

According to an alert from Mandriva, "A bug was found in the way
that Squid handles DNS replies. If the port Squid uses for DNS
requests is not protected by a firewall, it is possible for a
remote attacker to spoof DNS replies, possibly redirecting a
user to spoofed or malicious content." For more, go to:
<http://www.mandriva.com/security/advisories?name=MDKSA-2005:104>

Mandriva fixes dbus

A flaw in the way dbus messages are sent between applications
could be exploited by another user to view the data being sent.
For more, go to:
<http://www.mandriva.com/security/advisories?name=MDKSA-2005:105>
**********

Today's roundup of virus alerts:

W32/Rbot-AGH - An Rbot variant that exploits the Windows LSASS
and RPC-DCOM vulnerabilities as it spreads through network
shares. It installs "LimeWire.exe" on the infected machine and
allows backdoor access through IRC. (Sophos)

W32/Sdbot-ZM - This Sdbot variant exploits a number of known
Windows flaws in its attempt to infect a machine. If successful,
it drops "nawdll32.exe" in the Windows System directory and it
can allow backdoor access via IRC. (Sophos)

Troj/Drivol-A - A Trojan that attempts to download and run
malicious code from a remote Web site. It initially installs
"fvek.exe" on the infected machine. (Sophos)

W32/Mytob-BV - Wow, another Mytob variant. Again, it spreads
through e-mail and network shares, providing backdoor access to
the infected machine through IRC. This particular variant drops
"TimeManager.exe" on the infected machine. (Sophos)

Troj/Pyfls-A - Another Trojan that tries to download additional
malicious code from a preconfigured site. It drops "b.tmp" on
the infected host. (Sophos)

W32.Codbot.AL - A new bot that can be used to log keystrokes and
download malware. It spreads by exploiting some well-known
Windows vulnerabilities and provides unauthorized access through
IRC. (Panda Software)

W32.Semapi.A - An e-mail worm that uses variable message
attributes when it spreads. Fortunately, it does display the
message "semapi.dll" cannot be found. (Panda Software)
_______________________________________________________________
To contact: Jason Meserve

Jason Meserve is the Multimedia Editor at Network World and
writes about streaming media, search engines and IP Multicast.
Jason can be reached at <mailto:jmeserve@nww.com>. Check out his
Multimedia Exchange weblog at:
<http://www.networkworld.com/weblogs/multimedia/>

Check out our weekly Network World Radio program at:
<http://www.networkworld.com/radio/>
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=107232
_______________________________________________________________
ARCHIVE LINKS

Virus and Bug Patch Alert archive:
http://www.networkworld.com/newsletters/bug/index.html

Breaking security news, updated daily
http://www.networkworld.com/topics/security.html
_______________________________________________________________
FEATURED READER RESOURCE
FOCUS ON RECOVERY

IT professionals are changing the way they back up and recover
data, experts say, with new emphasis on the speedier fetching of
data made possible by advancing technologies. At a recent
storage conference in Orlando, disk-based backup solutions were
touted - find out if attendees agreed and if faster storage
solutions will soon be available. Click here:
<http://www.networkworld.com/news/2005/062005-data-recovery.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Securing the CIRT: Walk the talk


NETWORK WORLD NEWSLETTER: M. E. KABAY ON SECURITY
06/30/05
Today's focus: Securing the CIRT: Walk the talk

Dear security.world@gmail.com,

In this issue:

* Practice the security you preach
* Links related to Security
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by VeriSign
VeriSign Releases Security Briefing

The latest VeriSign Internet Security Intelligence Briefing
reports on the latest trends in network attacks, online fraud,
and general Internet usage, analyzing data gathered from January
to April 2005. The briefing covers the latest intelligence on
phishing and pharming attacks, identity theft, and the growth of
bot networks.
http://www.fattail.com/redir/redirect.asp?CID=106235
_______________________________________________________________
FREE NETWORK WORLD PRINT SUBSCRIPTIONS FOR NEWSLETTER
SUBSCRIBERS

Security is one of the most pressing issues in all of IT, and
you need to stay on top of it. Network World delivers the
hottest security news. Network IT Executives depend upon Network
World for the information they need to keep their networks
secure! Subscribe today at
http://www.fattail.com/redir/redirect.asp?CID=107304
_______________________________________________________________

Today's focus: Securing the CIRT: Walk the talk

By M. E. Kabay

For many months, I have been dipping into the Department of
Defense CD-ROM called "Introduction to Computer Incident
Response Team (CIRT) Management" in my series on CIRTs. This
week I want to expand on a theme presented late in that course:
the importance of securing the CIRT and more broadly, of using
our own advice.

The course narrator very properly notes:

"Once the CIRT becomes known, it will be an attractive target
for intruder attacks. A security breach at your CIRT site can be
devastating to your reputation and have repercussions for the
commands you support; in terms of security procedures, practice
what you preach. You will need to provide solid physical, host,
and network security in addition to appropriate staff training."

He continues:

"A compromise of any data related to incidents can have legal
repercussions as well as financial and credibility consequences.
What types of data need to be secured? Incident reports,
electronic mail, vulnerability reports, and even briefing notes
and slides."

More generally, all security personnel should be scrupulous in
respecting security regulations and best practices.

I was just chatting before I wrote this piece with some security
officers at a large corporation who were doing a due-diligence
interview with me before approving enrollment for one of their
employees in our graduate program. The questions centered around
the confidentiality of company-specific information in the case
study reports that the student would submit for grading during
the 18-month program.

I explained that no student is expected to reveal his or her
employer's name or even location; that students use an internal
e-mail address defined by our teaching platform and used on our
access-controlled extranet; and finally that all of our
instructors are themselves security professionals. I said that
it is a matter of course for security professionals to be under
nondisclosure whether a contract is signed or not - at least, to
maintain a professional reputation. We all agreed that working
in security eventually affects our behavior in a reflex way; we
laughed that it's almost impossible not to look away when
someone enters a password on a keyboard.

Another example of practicing what we preach is backups. For a
security professional to lose data because of a lack of backups
would be intensely embarrassing.

I constantly urge my students to do backups of their schoolwork
so that they never have to repeat what they have already done in
case of a disk failure or a human error. Personally, I can
demonstrate that I do a differential backup every day, clone my
main computer's disk to my laptop at least once a week (actually
daily when I'm teaching undergraduate courses) and create a full
backup to DVDs once a month. I've only had a few occasions over
these last decades when I needed those backups, but the minor
effort involved was more than repaid by the ease of recovery and
by the ability to look someone straight in the eye when telling
them how to protect their data.

We have to walk what we talk.

RELATED EDITORIAL LINKS

For a PDF flier with descriptions of free DoD IA training products
http://iase.disa.mil/eta/ProductDes.pdf

To order free DoD IA training products
http://tinyurl.com/dknn

Start-up debuts with an all-in-one security platform
Network World, 06/27/05
http://www.networkworld.com/news/2005/062705-netd.html?rl

Test: Keeping your endpoints in line
Network World, 06/27/05
http://www.networkworld.com/nlsec2944
_______________________________________________________________
To contact: M. E. Kabay

M. E. Kabay, Ph.D., CISSP, is Associate Professor in the
Division of Business and Management at Norwich University in
Northfield, Vt. Mich can be reached by e-mail
<mailto:mkabay@norwich.edu> and his Web site
<http://www2.norwich.edu/mkabay/index.htm>.

A Master's degree in the management of information assurance in
18 months of study online from a real university - see
<http://www.msia.norwich.edu/>
_______________________________________________________________
This newsletter is sponsored by VeriSign
VeriSign Releases Security Briefing

The latest VeriSign Internet Security Intelligence Briefing
reports on the latest trends in network attacks, online fraud,
and general Internet usage, analyzing data gathered from January
to April 2005. The briefing covers the latest intelligence on
phishing and pharming attacks, identity theft, and the growth of
bot networks.
http://www.fattail.com/redir/redirect.asp?CID=106234
_______________________________________________________________
ARCHIVE LINKS

Archive of the Security newsletter:
http://www.networkworld.com/newsletters/sec/index.html

Security Research Center:
http://www.networkworld.com/topics/security.html

Instant sign-up for Security News Alert:
http://www.networkworld.com/isusecna

Instant sign-up for Virus & Bug Patch Alert:
http://www.networkworld.com/isubug
_______________________________________________________________
FEATURED READER RESOURCE
FOCUS ON RECOVERY

IT professionals are changing the way they back up and recover
data, experts say, with new emphasis on the speedier fetching of
data made possible by advancing technologies. At a recent
storage conference in Orlando, disk-based backup solutions were
touted - find out if attendees agreed and if faster storage
solutions will soon be available. Click here:
<http://www.networkworld.com/news/2005/062005-data-recovery.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Novell guides transition to OES


NETWORK WORLD NEWSLETTER: DAVE KEARNS ON NOVELL NETWARE TIPS
06/30/05
Today's focus: Novell guides transition to OES

Dear security.world@gmail.com,

In this issue:

* Novell releases documents to help you migrate to OES
* Links related to Novell NetWare Tips
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Oracle
Boost the quantity and quality of customer interactions!

How can companies get a fuller, sharper picture of their
customers to boost the quantity and quality of customer
interactions? By creating a standardized customer-data model via
an "information grid." IDC analyst Stephen Hendrick explains how
to achieve a "360-degree view" of customers for better selling
and marketing.
http://www.fattail.com/redir/redirect.asp?CID=107436
_______________________________________________________________
LICENSE TO KILL

Mainstream companies are starting to reap benefits from
harnessing unused computing power. By lashing together sometimes
hundreds of servers to create a powerful grid, businesses are
using their technology better. But software licensing,
organizational and cultural issues, and data management can be
barriers to grid adoption. Find out how to overcome these
barriers - click here:
http://www.fattail.com/redir/redirect.asp?CID=107393
_______________________________________________________________

Today's focus: Novell guides transition to OES

By Dave Kearns

Last issue, I told you about Novell's "Where to Start: Open
Enterprise Server Migration Guide" which outlines six fairly
easy and straightforward projects to help you begin to explore
OES and the wonders of familiar NetWare utilities and services
running on Linux.

After you've gotten your feet wet with these demonstration
projects, Novell hopes you'll be ready to plunge right in and go
for a full-fledged move to OES. To help you plan a successful
migration, Novell has made available a deployment guide (
<http://www.networkworld.com/nlnovell2946> ).

The guide has quick links to the documentation for the tools
you'll need to perform the following "move to OES" tasks:

* Installing a new OES-on-NetWare server.
* Installing a new OES-on-Linux server.
* Consolidating NetWare/Windows NT/Windows 2000/Windows 2003
  servers onto OES (either NetWare or Linux).
* Migrating data from a NetWare server to OES.
* Upgrading SuSE Linux Enteprise Server 9 to OES.
* Upgrading NetWare 4, 5 or 6 to OES.

But even before doing that, there's a very helpful guide to help
you get the network right the first time. The Getting Started
guide is in five parts: assessment, design, implementation,
training and support. Each section talks about why you need that
step and then outlines a methodology to follow to help you reach
the goals you have for the network. The assessment phase, for
example, asks you to consider (among other things):

* How well a migration to OES fits your corporate strategy.
* What your stakeholder and business requirements are.
* What open source services and applications are available to
  meet your needs.
* Whether regulatory policies and requirements need to be taken
  into account.

The Guide then goes on to point you to specific white papers (as
well as "beige papers" - documents written by the team that did
Novell's own OES deployment) that will help you implement what
the assessment has told you that you need to do.

There's a lot at stake for Novell in OES, possibly the fate of
the company. It's going to do whatever it can to see that your
first venture into OES-land is as pleasant an experience as
possible. You should at least explore the possibility of doing
this migration.
_______________________________________________________________
To contact: Dave Kearns

Dave Kearns is a writer and consultant in Silicon Valley. He's
written a number of books including the (sadly) now out of print
"Peter Norton's Complete Guide to Networks." His musings can be
found at Virtual Quill <http://www.vquill.com/>.

Kearns is the author of three Network World Newsletters: Windows
Networking Tips, Novell NetWare Tips, and Identity Management.
Comments about these newsletters should be sent to him at these

respective addresses: <mailto:windows@vquill.com>,
<mailto:netware@vquill.com>, <mailto:identity@vquill.com>.

Kearns provides content services to network vendors: books,
manuals, white papers, lectures and seminars, marketing,
technical marketing and support documents. Virtual Quill
provides "words to sell by..." Find out more by e-mail at
<mailto:info@vquill.com>
_______________________________________________________________
This newsletter is sponsored by Oracle
Boost the quantity and quality of customer interactions!

How can companies get a fuller, sharper picture of their
customers to boost the quantity and quality of customer
interactions? By creating a standardized customer-data model via
an "information grid." IDC analyst Stephen Hendrick explains how
to achieve a "360-degree view" of customers for better selling
and marketing.
http://www.fattail.com/redir/redirect.asp?CID=107435
_______________________________________________________________
ARCHIVE LINKS

Archive of the Novell NetWare Tips newsletter:
http://www.networkworld.com/newsletters/netware/index.html

Novell news page:
http://www.networkworld.com/news/financial/novell.html
_______________________________________________________________
FEATURED READER RESOURCE
FOCUS ON RECOVERY

IT professionals are changing the way they back up and recover
data, experts say, with new emphasis on the speedier fetching of
data made possible by advancing technologies. At a recent
storage conference in Orlando, disk-based backup solutions were
touted - find out if attendees agreed and if faster storage
solutions will soon be available. Click here:
<http://www.networkworld.com/news/2005/062005-data-recovery.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Evident Software baselines usage with NetFlow


NETWORK WORLD NEWSLETTER: DENISE DUBIE ON NETWORK OPTIMIZATION
06/30/05
Today's focus: Evident Software baselines usage with NetFlow

Dear security.world@gmail.com,

In this issue:

* Evident Software uses Cisco's NetFlow for data on app usage
* Links related to Network Optimization
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Akamai
Improve your web application performance

Join Forrester Research's Thomas Mendel for a complimentary On
Demand Webcast and learn the latest strategies for delivering
fast and secure web applications to users anywhere in the
world--even those in remote or low-bandwidth locations.
http://www.fattail.com/redir/redirect.asp?CID=107471
_______________________________________________________________
LICENSE TO KILL

Mainstream companies are starting to reap benefits from
harnessing unused computing power. By lashing together sometimes
hundreds of servers to create a powerful grid, businesses are
using their technology better. But software licensing,
organizational and cultural issues, and data management can be
barriers to grid adoption. Find out how to overcome these
barriers - click here:
http://www.fattail.com/redir/redirect.asp?CID=107388
_______________________________________________________________

Today's focus: Evident Software baselines usage with NetFlow

By Denise Dubie

Evident Software last week announced a service at Cisco's
Networkers 2005 conference in Las Vegas that takes advantage of
the NetFlow information on Cisco gear.

Evident's representatives say the company is making its IT usage
and accounting software available as a service to customers
looking to get a better handle on application usage for
cost-cutting measures. Tapping NetFlow, Evident's professional
services group can help IT managers at large enterprise
companies get granular information on the assets they know they
have and the assets they may not be entirely aware of - as well
as who's using them.

"Other tools use NetFlow to track performance and availability
information," says Helen Donnelly, Evident's vice president of
marketing. "Evident's Usage Baseline service uses NetFlow to
help IT managers get a report on what assets are being used, how
and by whom."

NetFlow is a part of Cisco's IOS software that shows how
specific applications are being used and how that usage affects
the network. Vendors such as NetQoS, NetScout and AdventNet use
NetFlow to help improve performance on enterprise nets.

Donnelly says Evident can help large companies begin an IT
governance initiative. For example, IBM's office of the CIO
estimates it will save 6% of its global network costs with the
IT intelligence provided by Evident. And Fidelity Investments
has also saved over $90 million since implementing Evident,
according to the company.

The Usage Baseline requires customers to install Evident's
software in their data centers while the professional services
group does its work. The software resides on Microsoft Windows
or Sun Solaris servers and collects application flows, or
conversation data, from a variety of network probes, devices,
servers and end users. Evident uses a distributed model and
recommends users install its software on servers across networks
and in data centers. A centralized server collects the data from
distributed servers and acts as an administration console for IT
managers.

The Usage Baseline is available immediately for $150,000, to
assess a single data center in a period of four to eight weeks.

RELATED EDITORIAL LINKS

Vendors track IT usage and calculate costs
Network World, 10/05/04
http://www.networkworld.com/nlnetop1493

Tech Update: Apdex interprets app measurements
Network World, 06/27/05
http://www.networkworld.com/nlnetop2943
_______________________________________________________________
To contact: Denise Dubie

Senior Editor Denise Dubie covers network and systems management
for Network World. Reach her at <mailto:ddubie@nww.com>.
_______________________________________________________________
Business Continuity - is it practical?
A Special Report produced by Network World, sponsored by NSI

All forward thinking network executives must consider the
possibilities of system loss. So what are the options for a
comprehensive data protection and recovery strategy? Download
the special report Cost-effective Application Protection and
Recovery and read about creating a plan and factoring cost along
with other insightful and timely information.
http://www.fattail.com/redir/redirect.asp?CID=107412
_______________________________________________________________
ARCHIVE LINKS

Archive of the Network Optimization newsletter:
http://www.networkworld.com/newsletters/accel/index.html
_______________________________________________________________
FEATURED READER RESOURCE
FOCUS ON RECOVERY

IT professionals are changing the way they back up and recover
data, experts say, with new emphasis on the speedier fetching of
data made possible by advancing technologies. At a recent
storage conference in Orlando, disk-based backup solutions were
touted - find out if attendees agreed and if faster storage
solutions will soon be available. Click here:
<http://www.networkworld.com/news/2005/062005-data-recovery.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Many organizations don't have e-mail policies


NETWORK WORLD NEWSLETTER: MICHAEL OSTERMAN ON MESSAGING
06/30/05
Today's focus: Many organizations don't have e-mail policies

Dear security.world@gmail.com,

In this issue:

* Companies lack policies on e-mail retention and deletion
* Links related to Messaging
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Oracle
Boost the quantity and quality of customer interactions!

How can companies get a fuller, sharper picture of their
customers to boost the quantity and quality of customer
interactions? By creating a standardized customer-data model via
an "information grid." IDC analyst Stephen Hendrick explains how
to achieve a "360-degree view" of customers for better selling
and marketing.
http://www.fattail.com/redir/redirect.asp?CID=107434
_______________________________________________________________
LICENSE TO KILL

Mainstream companies are starting to reap benefits from
harnessing unused computing power. By lashing together sometimes
hundreds of servers to create a powerful grid, businesses are
using their technology better. But software licensing,
organizational and cultural issues, and data management can be
barriers to grid adoption. Find out how to overcome these
barriers - click here:
http://www.fattail.com/redir/redirect.asp?CID=107386
_______________________________________________________________

Today's focus: Many organizations don't have e-mail policies

By Michael Osterman

As part of a major survey we just wrapped up on hosted
messaging, we asked organizations about the e-mail policies that
they have established - or that they haven't.

We found that the most commonly instituted e-mail policy focused
on limiting the amount of storage per server through the
establishment of quotas. Three out of four organizations have
such policies, which are typically designed to maintain an
acceptable number of mailboxes per server, to keep back-up and
restore times at reasonable levels and so forth.

Less common, however, are policies related the retention or
deletion of e-mail. We found that fewer than half of
organizations have retention policies in place that specify how
long to keep e-mail, while only slightly more have retention
policies focused on limiting the length of time that e-mail can
be kept. Even fewer organizations have policies about when to
delete e-mail.

One of the problems organizations face if they do not have
appropriate policies regarding e-mail retention or deletion is
that they expose themselves to greater liability in the event of
a lawsuit or regulatory action. For example, imagine that a
court orders a plaintiff to turn over to a defendant all
relevant e-mail from five senior executives that discuss a
particular topic. If the plaintiff is unable to do so, a court
can instruct a jury to consider that the plaintiff might have
had something to hide in those e-mail messages and to take that
into account in their deliberations - not a very welcome
prospect if you're being sued.

Similarly, if you're being investigated by a government agency
and you keep stuff in e-mail longer than you must, you might be
exposing yourself to greater liability. For example, my neighbor
used to be a senior executive at a company in the aircraft
industry. His company was required to keep certain types of
documents for seven years - at seven years plus one day, all of
those documents were destroyed in order to limit potential
liability.

In short, all organizations should have an e-mail retention
policy in place that focuses on retention and deletion
schedules, acceptable use of e-mail and the like. I'd like to
hear your thoughts on this issue - please drop me a line at
<mailto:michael@ostermanresearch.com>

RELATED EDITORIAL LINKS

Anti-spam market weeds out vendors
Network World, 06/27/05
http://www.networkworld.com/news/2005/062705-spam.html?rl
_______________________________________________________________
To contact: Michael Osterman

Michael D. Osterman is the principal of Osterman Research
<http://www.ostermanresearch.com/>, a market research firm that
helps organizations understand the markets for messaging,
directory and related products and services. He can be reached
by clicking here <mailto:michael@ostermanresearch.com>
_______________________________________________________________
This newsletter is sponsored by Oracle
Boost the quantity and quality of customer interactions!

How can companies get a fuller, sharper picture of their
customers to boost the quantity and quality of customer
interactions? By creating a standardized customer-data model via
an "information grid." IDC analyst Stephen Hendrick explains how
to achieve a "360-degree view" of customers for better selling
and marketing.
http://www.fattail.com/redir/redirect.asp?CID=107433
_______________________________________________________________
ARCHIVE LINKS

Archive of the Messaging newsletter:
http://www.networkworld.com/newsletters/gwm/index.html
_______________________________________________________________
How well do you know your customers?

Accurate customer data directly impacts loyalty and business
planning, yet few companies update data regularly. Experts
address the challenges of ensuring a consistent, coherent
customer view across the enterprise.
http://www.fattail.com/redir/redirect.asp?CID=107320
_______________________________________________________________
FEATURED READER RESOURCE
FOCUS ON RECOVERY

IT professionals are changing the way they back up and recover
data, experts say, with new emphasis on the speedier fetching of
data made possible by advancing technologies. At a recent
storage conference in Orlando, disk-based backup solutions were
touted - find out if attendees agreed and if faster storage
solutions will soon be available. Click here:
<http://www.networkworld.com/news/2005/062005-data-recovery.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Using Bluetooth for more than a wireless headset


NETWORK WORLD NEWSLETTER: KEITH SHAW ON WIRELESS COMPUTING
DEVICES
06/30/05
Today's focus: Using Bluetooth for more than a wireless headset

Dear security.world@gmail.com,

In this issue:

* Mobile Action Handset Manager
* Links related to Wireless Computing Devices
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=107239
_______________________________________________________________
LICENSE TO KILL

Mainstream companies are starting to reap benefits from
harnessing unused computing power. By lashing together sometimes
hundreds of servers to create a powerful grid, businesses are
using their technology better. But software licensing,
organizational and cultural issues, and data management can be
barriers to grid adoption. Find out how to overcome these
barriers - click here:
http://www.fattail.com/redir/redirect.asp?CID=107405
_______________________________________________________________

Today's focus: Using Bluetooth for more than a wireless headset

By Keith Shaw

Over the past two years, I've been hosting the Network World
Wireless & Mobility Technology Tour (the latest tour finished
just last week in Denver and Boston). The tour's keynote
speaker, Craig Mathias of the Farpoint Group, always asks the
audience whether they are using Bluetooth. A smattering of hands
go up in the air, and then he asks them if they are using
Bluetooth for something other than a wireless headset for their
phones. Most of the hands go down.

If you are serious about using Bluetooth for something other
than a headset, head to the Mobile Action Web site (
<http://global.mobileaction.com/product/product_Bluetooth.jsp> )
to read up on its new Handset Manager MA-720, a Bluetooth data
suite that aims to link cellular phones with PCs. The latest
versions adds more device access and improves data transfer
speeds, as well as provide a single platform for all
Bluetooth-enabled Mobile Action Handset Manager models, the
company says.

The $54.95 MA-720 comes with an ivory white Bluetooth dongle and
accompanying software that matches a user's cellular handset.
The software (Handset Manager Version 9.0) supports 20 languages
and more than 80 GSM, CDMA and 3G phone models (go to
<http://www.mobileaction.com/> for a complete list and the
latest software versions). The system supports any PC's
Bluetooth Human Input Devices (HID), including keyboards and
mice, Mobile Action says. The new version now supports wireless
applications and devices such as MSN Messenger and Skype, and
the dongle driver supports Windows XP Service Pack 2.

But connecting to a PC is just the beginning of the software -
it has a phone book editor that lets you edit, back up and
organize your contacts list on a PC and upload it via Bluetooth
to the phone; a calendar synchronization application; a picture
editor that lets you compose and edit pictures and GIF clips
into animations; an MP3 clipper that lets you clip parts of an
MP3 file in order to create MP3 ring tones; and an audio
composer that lets you edit personal polyphonic ring tones with
up to 128 different instruments.
_______________________________________________________________
To contact: Keith Shaw

Keith Shaw is Senior Editor, Product Testing, at Network World.
In addition, he writes the " Cool Tools
<http://www.networkworld.com/columnists/cooltools.html> "
column, which looks at gizmos, gadgets and other mobile
computing devices.

You can reach Keith at <mailto:kshaw@nww.com>.
_______________________________________________________________
This newsletter is sponsored by Nokia
Empower Your Mobile Enterprise

Nokia believes that business mobility will fundamentally change
the way work gets done-and for the better. To allow the entire
organization to get the most from this paradigm shift in
productivity, Nokia Enterprise Solutions focuses on delivering
increased efficiency through enhanced mobility. Learn more by
downloading this white paper today!
http://www.fattail.com/redir/redirect.asp?CID=107238
_______________________________________________________________
ARCHIVE LINKS

Archive of the Wireless Computing Devices newsletter:
http://www.networkworld.com/newsletters/mobile/index.html

Keith Shaw's Cool Tools:
http://www.networkworld.com/columnists/cooltools.html
_______________________________________________________________
Silver bullets for application acceleration?

Companies want integrated solutions. Packaged solutions that
answer their key problems more or less out of the box. See how
you can improve the performance of Web-based applications to
users wherever they are.
http://www.fattail.com/redir/redirect.asp?CID=107358
_______________________________________________________________
FEATURED READER RESOURCE
FOCUS ON RECOVERY

IT professionals are changing the way they back up and recover
data, experts say, with new emphasis on the speedier fetching of
data made possible by advancing technologies. At a recent
storage conference in Orlando, disk-based backup solutions were
touted - find out if attendees agreed and if faster storage
solutions will soon be available. Click here:
<http://www.networkworld.com/news/2005/062005-data-recovery.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

US-CERT: Veritas Vulnerability Exploited



*********************************************************************

___________________________ Sponsors ________________________________

Wi-Fi Planet Conferences & Expos 2005
_____________________________________________________________________

*********************************************************************
http://esecurityplanet.com/
Thursday, June 30, 2005

eSecurityPlanet is part of the Earthweb network

All newsletters are sent from the domain "internet.com." Please use this domain name (not
the entire "from" address, which varies) when configuring e-mail or spam filter rules, if
you use them.

*********************************************************************

*********************************************************************
TRENDS
*********************************************************************

1. US-CERT: Veritas Vulnerability Exploited
The agency warns that the software is being actively exploited a week after the hole was
disclosed.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,984w,b2fi,co7e,jjlo
------------------------------------------------------------
2. Industry Groups Push For Cyber Crime Treaty
The coalition puts pressure on Senate for ratification.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,fpdu,hvd,co7e,jjlo
------------------------------------------------------------
3. 6/30: Trojan.GPcoder-C Encrypts Files
Trojan.Gpcoder.C is a Trojan horse that encrypts files on a compromised computer.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,i78h,lhs0,co7e,jjlo
------------------------------------------------------------
4. 6/30: Fugif Trojan Downloads Files
Download.Fugif is a Trojan horse that downloads remote files from predetermined Web
sites.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,2dtu,h65n,co7e,jjlo
------------------------------------------------------------
5. 6/30: Mytob-CT a Mass-Mailing Worm
W32/Mytob-CT is a mass-mailing worm and IRC backdoor Trojan.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,7nhv,4w2f,co7e,jjlo
------------------------------------------------------------
6. 6/30: Spybot-RDW Worm Runs DDoS
W32.Spybot.RDW is a worm that has distributed denial of service and back door
capabilities.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,5x0u,2om0,co7e,jjlo
------------------------------------------------------------
7. 6/30: Mytob-GM a Mass-Mailing Worm
W32.Mytob.GM@mm is a mass-mailing worm that opens a back door and lowers security
settings on the compromised computer.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,85oa,59s,co7e,jjlo
------------------------------------------------------------
8. 6/30: Kelvir-DU Worm Spreads Via IM
W32.Kelvir.DU is a worm that spreads through MSN Messenger.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,kp0i,1dvn,co7e,jjlo
------------------------------------------------------------
9. 6/30: Mytob-GN a Mass-Mailing Worm
W32.Mytob.GN@mm is a mass-mailing worm that has back door capabilities and uses its own
SMTP engine to send an email to addresses that it gathers from the compromised computer.

http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,h0x6,cm0f,co7e,jjlo
------------------------------------------------------------
10. 6/30: Troj/Bancb-Fam Detects Trojans
Troj/Bancb-Fam detects members of the Bancban family of Trojans.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,kbcq,3grv,co7e,jjlo
------------------------------------------------------------
11. 6/30: Rbot-AGQ Worm Hits Bad Passwords
W32/Rbot-AGQ is a worm and IRC backdoor Trojan for the Windows platform.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,idid,jqik,co7e,jjlo
------------------------------------------------------------
12. 6/30: Gatina-A an Email and Network Worm
W32/Gatina-A is an email and network worm.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,50p3,g6j4,co7e,jjlo
------------------------------------------------------------
13. 6/30: Rbot-AGP Worm Exploits Flaws
W32/Rbot-AGP is a worm with backdoor functionality for the Windows platform that spreads
to other network computers by exploiting a number of known vulnerabilities and by copying
itself to network shares protected by weak passwords.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,bjdr,d2bd,co7e,jjlo
------------------------------------------------------------

*********************************************************************

/-------------------------------------------------------------------\

Wi-Fi Planet Conference & Expo 2005 - The World's Largest
Wi-Fi Business Event - coming to a city near you! These are the
definitive events of the Wi-Fi industry, where business users
gain the knowledge they need to make strategic buying decisions
and where the industry charts it future direction. Don't miss these
must attend events that are held in San Jose, Tokyo, and Baltimore.
Register today! www.jupiterevents.com

\--------------------------------------------------------------adv.-/

*********************************************************************
PRODUCTS AND SERVICES
*********************************************************************

*********************************************************************
VIEWS
*********************************************************************

1. Updating our Thinking on Software Updates
eSecurityPlanet columnist Ken van Wyk looks at the issue of software updates --
particularly the lack there of for mobile devices.
http://nl.internet.com/ct.html?rtr=on&s=1,1q5v,1,ll7n,mfcu,co7e,jjlo
------------------------------------------------------------

*********************************************************************
Earthweb.com's Family of Online Services for IT Insiders
*********************************************************************

IT MANAGEMENT
http://itmanagement.earthweb.com/
HARDWARE & SYSTEMS
http://hardware.earthweb.com/
NETWORKING & COMMUNICATIONS
http://networking.earthweb.com/
WEB DEVELOPMENT
http://webdeveloper.earthweb.com/
SOFTWARE DEVELOPMENT
http://softwaredev.earthweb.com/

Get the latest technical tips, tools, and resources via Earthweb's
extensive collection of free e-mail newsletters!

*********************************************************************

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Advertising: If you are interested in advertising in our newsletters, call
Claudia at 1-203-662-2863 or send email to mailto:nsladsales@internet.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information about advertising opportunities, visit
http://www.jupiterweb.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For details on becoming a Commerce Partner, contact David Arganbright
on 1-203-662-2858 or go to www.jupitermedia.com/corporate/licensingform.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To learn about other free newsletters offered by internet.com or
to change your subscription visit http://e-newsletters.internet.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
internet.com's network of more than 160 Web sites is organized into 12
channels:
Developer http://internet.com/webdev/
Download http://internet.com/downloads/
International http://internet.com/international/
Internet Lists http://internet.com/lists/
Internet News http://internet.com/news/
Internet Resources http://internet.com/resources/
IT http://internet.com/it/
Small Business http://internet.com/sb/
Linux/Open Source http://internet.com/linux/
Windows Technology http://internet.com/win/
Wireless Internet http://internet.com/wireless/
xSP Resources http://internet.com/xsp/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To find an answer - http://search.internet.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Looking for a job? Filling an opening? - http://jobs.internet.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This newsletter is published by Jupitermedia Corporation
Copyright (c) 2005 Jupitermedia Corporation. All rights reserved.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on reprinting or linking to Jupitermedia content:
http://www.jupitermedia.com/corporate/permissionform.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

You are subscribed to the eSecurity Planet newsletter as security.world@gmail.com. To unsubscribe from eSecurity Planet please send an email to: u-13ab3-9058ade9fc-1768@nl.internet.com

To manage your newsletter subscription preferences, visit this location: http://nl.internet.com/profilepage.html?uid=9058ade9fc&eid=13028466

To unsubscribe via postal mail, please contact us at:

Jupitermedia Corp.
Attn: Newsletter Subscription Dept.
475 Park Avenue South
New York, NY 10016

Please include the email address which you have been contacted with.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This email is powered by EmailLabs (http://www.emaillabs.com)
Contact us for a FREE demo account

Portland Plans for Metro-Scale Wi-Fi

All newsletters are sent from the domain "internet.com." Please use this domain name (not the entire "from" address, which varies) when configuring e-mail or spam filter rules, if you use them.


Search
Search internet.com
News Reviews Insights Tutorials WiMax VoIP HotSpots Forums Events Research Products Glossary About




Subscribe Now!
Wi-Fi Planet.com's Daily Newsletter
html * text
More Free Newsletters


Wi-Fi Glossary
Find a Wi-Fi Term


Find a Hotspot
by city
by State

Wi-Fi® is a registered certification mark of the Wi-Fi Alliance

internet.com
wireless channel
internet.com wireless channel
Wi-Fi Planet
HotSpotList.com
Palm Boulevard
PDAStreet
PocketPCcity
PocketPCWire
PracticallyNetworked.com
Psion Place
RIM Road
Ultrawideband Planet
Visor Village
WirelessAdWatch
Events
Research


internet.com
Developer
Downloads
International
Internet Lists
Internet News
Internet Resources
IT
Linux/Open Source
Personal Technology
Small Business
Windows Technology
xSP Resources

Search internet.com
Advertise
Corporate Info
Newsletters
Tech Jobs
E-mail Offers




Wi-FiPlanet News
NEW!   Portland Plans for Metro-Scale Wi-Fi
[June 30, 2005]   The city council of Oregon's tech hub—already No. 4 in the Most Unwired Cities survey—has unanimously decided to get wireless city-wide.

NEW!   Wi-Fi Product Watch
[June 30, 2005]   The latest updates and new products in wireless networking: Broadcom sells a whole lotta chips; Buffalo's new equipment is high in power; Wireless Valley accounts for applications; and more.

NEW!   Samsung i730 Generally Available
[June 29, 2005]  Verizon starts selling the smallish smartphone with the retractable keyboard, Wi-Fi, Bluetooth, and high-speed cellular earlier than expected.

NEW!   Hotspot Hits
[June 29, 2005]   The latest in public access Wi-Fi: Iowa Corridor's free net to open; TowerStream adds more NYC presence; HarborLink passes 100 free hotspots; and more.

More News >>

Wi-FiPlanet Insights
NEW!   The Wi-Fi Hall Monitor
[June 28, 2005]   DefyWire's wireless mobility solution in one Washington D.C school sets the stage for on-the-spot counseling and discipline for students.

NEW!   Muni Wi-Fi Aims to Close Digital Divide
[June 24, 2005]   Despite good intentions, critics say cities heading down potentially dangerous and expensive road.

NEW!   Line-busting Wi-Fi Solution for Restaurants
[June 24, 2005]   Whether full-service or fast food, wireless systems like the new Reach POS could mean better customer service, which means more customers, and more tips.

More Insights >>

Featuring the world's largest collection of wholly-owned stock photos, stock footage, photo objects, clipart, illustrations, fonts, animations and flash components, this comprehensive library contains over 4 million digital images from world renowned photographers and brands such as Comstock Images, ThinkStock Images, ThinkStock Footage, photos.com, Clipart.com & Hemera Images. With top-notch customer service and Web site search capabilities, the images you need are just clicks away: www.jupiterimages.com

Interested in placing your TEXT AD HERE? Click Here

Wi-FiPlanet Reviews
Lenovo ThinkPad X41 Laptop
[June 15, 2005]  Renown for its quality, design and support, ThinkPad continues its track record with the X41. But with its hefty price, you'll have to part with some gold of your own.

PalmOne LifeDrive Mobile Manager
[June 8, 2005]  This new wireless PDA marries the calendar and contact utility of a PDA with the massive storage of a media player.

SecureMyWiFi
[June 2, 2005]   As long as you have the right hardware, you can get extra security for your small office with this service for only a few cents a day.

More Reviews >>

Wi-FiPlanet Tutorials
NEW!   WEP, WPA and Wireless Security
[June 30, 2005]  Wireless networking is relatively easy to setup, but it's also easy to forget the importance of protecting yourself. PracticallyNetworked dissect WEP and WPA and offers some commonsense advice.

WISPs: Pricing to Survive
[June 14, 2005]  If you have only one price for your service, you're not offering enough. Premium pricing and services are essential to WISP survival.

More Tutorials >>



JupiterWeb networks:

internet.comearthweb.comDevx.comClickZGraphics.com

Search JupiterWeb:

Jupitermedia Corporation has four divisions:
JupiterWeb, JupiterResearch, JupiterEvents and JupiterImages

Copyright 2005 Jupitermedia Corporation All Rights Reserved.
Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Jupitermedia Corporate Info | Newsletters | Tech Jobs | E-mail Offers

Business Resources From Business.com
» Computer Networking

» Fixed Wireless Network Equipment

» Access Points

» Wireless Telecommunications Equipment and Supplies

» Bluetooth Wireless Telecommunications