Tuesday, July 31, 2007

[Fwd: VLAN]

hi...
I instaled debian sarge's base system with 5 interface that connects to 5
port on switch cisco 2950T that configured sprate VLAN.
I use Iptables for inter vlan routing and firewalling, but i have problem
and my frames have CheckSum error On tcp Header.
why????????
required any patches???
Thanks Alot for attentions

my switch config example)

interface gig 0/1:
switchport mode trunk
*****
interface fast 0/10
switchport mode access
switchport access vlan 3

-------------------------
rahimi{at}eaedu.net
rahimi_m{at}cse.shirazu.ac.ir


--
To UNSUBSCRIBE, email to debian-firewall-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

[SECURITY] [DSA 1343-1] New file packages fix arbitrary code execution

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1343-1 security@debian.org
http://www.debian.org/security/

Moritz Muehlenhoff
July 31th, 2007

http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : file
Vulnerability : integer overflow
Problem-Type : local(remote)
Debian-specific: no
CVE ID : CVE-2007-2799

Colin Percival discovered an integer overflow in file, a file type
classification tool, which may lead to the execution of arbitrary code.

For the oldstable distribution (sarge) this problem has been fixed in
version 4.12-1sarge2.

For the stable distribution (etch) this problem has been fixed in
version 4.17-5etch2.

For the unstable distribution (sid) this problem has been fixed in
version 4.21-1.

We recommend that you upgrade your file package.


Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2.dsc

Size/MD5 checksum: 617 11f144b3820b5b4acf812911b5580d4f

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2.diff.gz

Size/MD5 checksum: 18168 e91491e1066ccaf93a5020bfe36bb3a3

http://security.debian.org/pool/updates/main/f/file/file_4.12.orig.tar.gz

Size/MD5 checksum: 414600 09488a9d62bc6627b48a8c93e12d72f8

Alpha architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2_alpha.deb

Size/MD5 checksum: 30078 98602c556b3753045b761481a6033049

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.12-1sarge2_alpha.deb

Size/MD5 checksum: 59708 aeb92b5c420ee7f25615266fc69d1d7e

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.12-1sarge2_alpha.deb

Size/MD5 checksum: 239252 0c56a742036e6953c2c433e753879381

AMD64 architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2_amd64.deb

Size/MD5 checksum: 29494 e7afdb17afde778a5afc21735b8789c8

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.12-1sarge2_amd64.deb

Size/MD5 checksum: 48846 f611745fd75e2fea9aa5df390341c9a6

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.12-1sarge2_amd64.deb

Size/MD5 checksum: 234496 e08e0a171800afccd116551c77d720c4

ARM architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2_arm.deb

Size/MD5 checksum: 28872 6f64f504fbe22213380ba4278f906539

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.12-1sarge2_arm.deb

Size/MD5 checksum: 48168 d831c555b31d7d925a19fbd7557bc9e9

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.12-1sarge2_arm.deb

Size/MD5 checksum: 231624 47d4280fd1adc3905f9e1e5ebfe74fe6

HP Precision architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2_hppa.deb

Size/MD5 checksum: 29994 0bd0a00c847192bef8ab79a7179d76e3

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.12-1sarge2_hppa.deb

Size/MD5 checksum: 52514 6c5b2a00f97ace048b810e218d4126b9

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.12-1sarge2_hppa.deb

Size/MD5 checksum: 238228 22f8474b775ffd310a650eec2e804bdd

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2_i386.deb

Size/MD5 checksum: 28844 71030e8db8f80b3d68dc82abf4805a60

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.12-1sarge2_i386.deb

Size/MD5 checksum: 45718 d5a668c132b5e24be235b45c6ede4ded

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.12-1sarge2_i386.deb

Size/MD5 checksum: 233008 165c5e5be9eeb736f2e333d4372d92dc

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2_ia64.deb

Size/MD5 checksum: 31028 cd0c4bebce2e8aa5275bf8e842fd7fe8

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.12-1sarge2_ia64.deb

Size/MD5 checksum: 61274 19dd582814f32b06ca4ef1c9139c42b7

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.12-1sarge2_ia64.deb

Size/MD5 checksum: 244084 2051e64e6545e7b808494268a00a96a7

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2_m68k.deb

Size/MD5 checksum: 28804 b59dcf720d9224d7e7b2617bcb7a49f9

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.12-1sarge2_m68k.deb

Size/MD5 checksum: 42664 d58c0b8dda865fc4c0703ca0ab29e895

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.12-1sarge2_m68k.deb

Size/MD5 checksum: 232502 6afbb342a5d7049f44bac7a6fbed4918

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2_mips.deb

Size/MD5 checksum: 29716 7a4cedefff494502e6dd99fabcdb6988

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.12-1sarge2_mips.deb

Size/MD5 checksum: 52560 bfd874db4fc8253413e4e136093e5a2c

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.12-1sarge2_mips.deb

Size/MD5 checksum: 234812 5b5d5869bfb7069f99d96ba8e6acc558

PowerPC architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2_powerpc.deb

Size/MD5 checksum: 30746 8049ddc8f21c3df6f6379581447d7b51

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.12-1sarge2_powerpc.deb

Size/MD5 checksum: 51406 014ddb93abecb57ae7a729ca188471d0

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.12-1sarge2_powerpc.deb

Size/MD5 checksum: 236658 eda285e0f6bcc02c4e5624849dfd8039

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2_s390.deb

Size/MD5 checksum: 29548 ee1a58577a687221cbd5c42cd31272cc

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.12-1sarge2_s390.deb

Size/MD5 checksum: 50426 b05941625e49f1c43dec884c38d824da

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.12-1sarge2_s390.deb

Size/MD5 checksum: 236144 aaf87282783a51ac51c2a40f950d4a7f

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.12-1sarge2_sparc.deb

Size/MD5 checksum: 28956 4be06f484de78c46ef5de9bcb3a4e301

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.12-1sarge2_sparc.deb

Size/MD5 checksum: 48318 55e7eddfe95a8017162d14875a07b3db

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.12-1sarge2_sparc.deb

Size/MD5 checksum: 234036 a4405fef958ed6f1c2622fce1cb8be3c


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2.dsc

Size/MD5 checksum: 693 4cab938fd849548ddf42ec09f8ff69c9

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2.diff.gz

Size/MD5 checksum: 24445 927d0b99deacc5fc98cbb7b8f844be70

http://security.debian.org/pool/updates/main/f/file/file_4.17.orig.tar.gz

Size/MD5 checksum: 556270 50919c65e0181423d66bb25d7fe7b0fd

Alpha architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2_alpha.deb

Size/MD5 checksum: 32856 4cb90eab4b631b70be13dfaa00ec0eb6

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.17-5etch2_alpha.deb

Size/MD5 checksum: 69290 9c15a570f6fa9af0733df0dc2fd05bfd

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.17-5etch2_alpha.deb

Size/MD5 checksum: 281614 17bde82a07b1f6a1da3b02024f95be2b

http://security.debian.org/pool/updates/main/f/file/python-magic_4.17-5etch2_alpha.deb

Size/MD5 checksum: 23716 37ce80b6a9beee26d38f3f33725e9a95

AMD64 architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2_amd64.deb

Size/MD5 checksum: 32188 155268d013154c95385d39a1500b7b9b

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.17-5etch2_amd64.deb

Size/MD5 checksum: 56660 ae239f724037b5b703fb61e27e5ca94d

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.17-5etch2_amd64.deb

Size/MD5 checksum: 276352 356ab79f44e91803b67dd633fae6de3f

http://security.debian.org/pool/updates/main/f/file/python-magic_4.17-5etch2_amd64.deb

Size/MD5 checksum: 23488 b37fbc10b82682fa6f444736a140a9c3

ARM architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2_arm.deb

Size/MD5 checksum: 31840 2b42af63ad6f9f1219e54ad470d62604

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.17-5etch2_arm.deb

Size/MD5 checksum: 53618 29bf99c005e83ff94ea0268bf8b6716f

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.17-5etch2_arm.deb

Size/MD5 checksum: 274176 859929edeb15447ff1877b080481e7b3

http://security.debian.org/pool/updates/main/f/file/python-magic_4.17-5etch2_arm.deb

Size/MD5 checksum: 22902 7dbaec4cf069ea59ac979f64f5369d29

HP Precision architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2_hppa.deb

Size/MD5 checksum: 32682 e60d21fb6920f38f85b3c15c99aee1d1

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.17-5etch2_hppa.deb

Size/MD5 checksum: 62454 29f63c2578c7d205e51f13fb9c39f3bd

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.17-5etch2_hppa.deb

Size/MD5 checksum: 280802 d1d92057d217739658a6f228cfcc7d42

http://security.debian.org/pool/updates/main/f/file/python-magic_4.17-5etch2_hppa.deb

Size/MD5 checksum: 23964 5ffa51ea263b7f8743c1a34285964760

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2_i386.deb

Size/MD5 checksum: 31738 88d2fa490cbe688797453acd951e3b4b

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.17-5etch2_i386.deb

Size/MD5 checksum: 53866 aa29bfdc0fbea41f22cf62f91efe4afe

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.17-5etch2_i386.deb

Size/MD5 checksum: 275108 5deb254486738439e769718af4781719

http://security.debian.org/pool/updates/main/f/file/python-magic_4.17-5etch2_i386.deb

Size/MD5 checksum: 23002 2de00094cbb49dcbc9d2e377ed255f58

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2_ia64.deb

Size/MD5 checksum: 34332 8e621a86debb04f20124ac50d3cb0c80

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.17-5etch2_ia64.deb

Size/MD5 checksum: 74466 cf6a99bd620e92b4bf225625a6720430

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.17-5etch2_ia64.deb

Size/MD5 checksum: 291374 50116811a30651cdc388f5801afab546

http://security.debian.org/pool/updates/main/f/file/python-magic_4.17-5etch2_ia64.deb

Size/MD5 checksum: 24670 a097ded99e046b8e08b06aa942620942

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2_mips.deb

Size/MD5 checksum: 32394 5b667489143574a13311cad5ee70ff3a

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.17-5etch2_mips.deb

Size/MD5 checksum: 61674 61f7c44b2086d2d69806d36b350f5057

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.17-5etch2_mips.deb

Size/MD5 checksum: 275828 deb70107c2a708cfc6ee58a8577c8e4c

http://security.debian.org/pool/updates/main/f/file/python-magic_4.17-5etch2_mips.deb

Size/MD5 checksum: 23140 c3bdd08de2efeaf383dbb0ddff41f279

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2_mipsel.deb

Size/MD5 checksum: 32400 e01d3ffb9606506c33f013574dcc366c

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.17-5etch2_mipsel.deb

Size/MD5 checksum: 61466 5f04ea6d1277a6a71e0955b7e03d4e14

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.17-5etch2_mipsel.deb

Size/MD5 checksum: 275718 74d3840585278bf2b21a41210f4f8db0

http://security.debian.org/pool/updates/main/f/file/python-magic_4.17-5etch2_mipsel.deb

Size/MD5 checksum: 23146 48f01350a641e34ac4c382a07407a647

PowerPC architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2_powerpc.deb

Size/MD5 checksum: 33814 ac510b4aa19e9892cdd742dbc19f5602

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.17-5etch2_powerpc.deb

Size/MD5 checksum: 59868 506921ee61d4503a8474ea419e184aeb

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.17-5etch2_powerpc.deb

Size/MD5 checksum: 278400 738a0032c1e91252d85c3b82cc538851

http://security.debian.org/pool/updates/main/f/file/python-magic_4.17-5etch2_powerpc.deb

Size/MD5 checksum: 24694 083253dca4291e7ccd819ed909d37095

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2_s390.deb

Size/MD5 checksum: 32356 5cf55ead2de57e48ebe21f02847a5229

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.17-5etch2_s390.deb

Size/MD5 checksum: 58470 22a707bf5f9cf5592a41f99666f329dc

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.17-5etch2_s390.deb

Size/MD5 checksum: 278410 dbf6c54275c251f341692f86df0254bd

http://security.debian.org/pool/updates/main/f/file/python-magic_4.17-5etch2_s390.deb

Size/MD5 checksum: 23656 5cd56031a63458788258c2aa3ff177c0

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/f/file/file_4.17-5etch2_sparc.deb

Size/MD5 checksum: 31956 d1cfc83efd7becf9cd470f57f1616509

http://security.debian.org/pool/updates/main/f/file/libmagic-dev_4.17-5etch2_sparc.deb

Size/MD5 checksum: 55780 e12a7fd21c338b7060633b510f25b878

http://security.debian.org/pool/updates/main/f/file/libmagic1_4.17-5etch2_sparc.deb

Size/MD5 checksum: 275390 795654f0eb5f09d1346c97692b90a30b

http://security.debian.org/pool/updates/main/f/file/python-magic_4.17-5etch2_sparc.deb

Size/MD5 checksum: 22956 f2598d3437437aec4905f29d399ac6b2

These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGr6szXm3vHE4uyloRAnY+AJwLtVc3PFe6p6dIv+d3kAJNWV6f4QCcDG5p
DE9zThGACQda5SNcBto7aD8=
=bQRd
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Fighting back against software-agent overload; Mozilla rushes out second Firefox patch

Network World

Daily News: PM




Network World Daily News: PM, 07/31/07

Fighting back against software-agent overload
Software agents — long seen as a necessary evil by those securing and managing servers, desktops and other endpoint devices — have proliferated to the point of polluting enterprise environments.

EU to name carriers not offering cheap roaming
The deadline for European cell phone carriers to offer a new mobile phone roaming tariff passed on Monday evening with the European Commission saying it plans to name carriers not offering customers the rates.

Mozilla rushes out second Firefox patch this month
Mozilla has patched a pair of nasty flaws in its Firefox browser, two weeks after security researchers first started posting code that showed how the flaws could be exploited in attacks.

Get Up to Speed on the Latest in WLANs

Easily stay on top of the latest developments and issues in WLAN technology, standards, security, telephony, management and more with Network World's latest Executive Guide, "Keeping Up With the Wireless Whirlwind."

Click here to download!

Verizon Wireless to acquire Rural Cellular
Verizon Wireless has agreed to acquire Rural Cellular, a mobile telephone service provider focused on rural areas in the United States, the companies announced Monday.

ICANN seeks to better protect domain-name registrants
The Internet regulation body, the Internet Corporation for Assigned Names and Numbers (ICANN), is asking for the public's input as it revises its accreditation process for registrars, the companies that register and sell domain names.

Utility evades Vista kernel defenses
A security feature in the 64-bit version of Windows Vista can be easily circumvented with a free utility that loads unsigned drivers into the kernel, according to researchers at Symantec.

Nortel and partners jump start U.K. mobile WiMAX
Nortel Networks and two U.K. companies will test mobile WiMAX, a wireless data transfer technology that will compete with Wi-Fi and 3G networks.

Symantec's 'Dark Vision' mines carder sites
Researchers at Symantec have developed a system that mines underground Web sites and chat rooms for sensitive information that is being sold.

TODAY'S MOST-READ STORIES:

1. NAC alternatives hit the mark
2. Online gamers’ dirty little secrets exposed
3. The Simpsons Movie sparks spam blast
4. Cisco muffles Linksys death knell
5. IBM tells employees to behave in Second Life
6. Hogwarts IT director quits
7. E-mail etiquette question: Thanks or no thanks?
8. Tool tests for phishing-attack gullibility
9. Top 15 'networkiest' moments of The Simpsons
10. Industry giants get 'Simpsonized'

MOST E-MAILED STORY:
Hogwarts IT director quits


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

New Security Log Resource: post your questions and additions to the Security Log Encyclopedia

I’m excited to announce a new, free resource for helping understand the ever cryptic and mysterious Windows Security Log!  We’ve added a new discussion/Q&A feature to the Security Log Encyclopedia.   
http://www.ultimatewindowssecurity.com/encyclopedia.aspx

As fellow log grokkers you have much to offer based on your unique experience and network characteristics.  We’d all like to have your contribution to the security log encyclopedia.

 

Are you PCI DSS compliant?
Introducing the GFI PCI Suite for event log management, network vulnerability scanning, patch management and network auditing!
Achieving compliance with the Payment Card Industry Standard (PCI DSS) should be high on the agenda of companies which store, transmit or process credit card data!
The GFI PCI Suite helps organizations become compliant with the majority of the automated processes required by the PCI DSS. This package includes GFI EventsManager for event log management and GFI LANguard Network Security Scanner for network vulnerability scanning, patch management and network auditing.
Learn how GFI can help you become PCI DSS compliant today!

Each event ID in the Security Log Encyclopedia now allows you to post comments or ask and answer questions.  We’ve created RSS feeds for each event ID and one for the entire encyclopedia.  That way, whether you are interested in just one specific event ID or the entire list, you can be notified when new messages are posted by just subscribing to the appropriate RSS fee.  Just look for the usual orange and white RSS symbol to subscribe.
http://www.ultimatewindowssecurity.com/encyclopedia.aspx

 

 Logging in Depth – Secure, Comply, Save – with EventTracker Complete Event Management
EventTracker software improves network security with centralized event log monitoring, security events correlation, host based intrusion detection and security beyond firewall. It provides unattended enterprise-wide event log management for millions of events a day.
 For more information and to download a free trial
 

This is a moderated discussion feature to prevent bogus posting, spam, etc.  That means it may take a little while for your posting to be reviewed and posted.  At some point, I may add a “CAPTCHA” and allow real time postings.  Let me know what you think.  Also, let me know if you’d like to have email notifications as an option in addition to RSS and if you’d like a more permanent identity so that we could track and reward active helpers.  We can also add a rating system if things really take off.

 Give it a whirl and send me your feedback. 

Keep grokking those logs!

Comply. Secure. Optimize. – LogRhythm - Click Here! 

Finally... Concurrent logon control and reliable logon/logoff auditing in one tool! – Engagent - Click Here

Click Here to Opt Out

InfoWorld Daily: 11 weirdest tech uses

========================================================================
INFOWORLD DAILY: INFOWORLD STAFF

http://www.infoworld.com/
========================================================================
Tuesday, July 31, 2007

* 11 weirdest tech uses
* InfoWorld Daily Podcast
* How to kill an SOA

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

JOIN INFOWORLD EDITORS AT APPCON 2007 - SEPT. 13 -14, SAN JOSE, CA

Don't miss AppCon 2007, The Application Continuity Conference.
This interactive, face-to-face conference on business operations
and application continuity covers real-world experiences from
industry pioneers including InfoWorld Editors Eric Knorr and
Doug Dineley - topics surrounding disaster recovery and solutions
they found to ensure applications operate 24/7. Save $250 with
InfoWorld discount code: MNEWSAPP07

http://newsletter.infoworld.com/t?ctl=1851A91:20920CD98AAF82DD84F30AF80574807AEFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -

========================================================================

11 WEIRDEST TECH USES

From the feature well: Sometimes technologies show up where you least
expect them. "When your business is to cure the body of ailments, or to
turn back the clock on a culture's waning heritage, or to keep a herd of
cattle happily milked -- where does all this enterprise technology get
you? In some cases, surprisingly far." Your esophagus is one. The
battlefield is a bit more obvious, but IT-enabled self-service cow
milking most certainly is not. High-tech in the weirdest places. The
news beat: The blackout of Google's Analytics service continues and the
data has not been updated since... ...

More of this blog:
http://newsletter.infoworld.com/t?ctl=1851A8C:20920CD98AAF82DD84F30AF80574807AEFF29049075316B4

========================================================================

INFOWORLD DAILY PODCAST

Mozilla patches Firefox for second time this month, EC imposes deadline
for reduced roaming charges, Symantec prototypes Dark Vision, and more
LISTEN!... ...

More of this blog:
http://newsletter.infoworld.com/t?ctl=1851A8B:20920CD98AAF82DD84F30AF80574807AEFF29049075316B4

========================================================================

HOW TO KILL AN SOA

Best of the blogs: So-called 'candidate services' hold the potential to
become core services, but typically require a bit more analysis before
they do. "Part of the process of building a successful SOA is figuring
out what should be a service, and what should not. A common amateur
mistake is to service enable everything," David Linthicum explains in
Looking for candidate services. "That typically proves unproductive, and
could be an 'SOA killer' at the end of the day." There are no hard and
fast guidelines on what constitutes a well-defined service, but
Linthicum has three suggestions that ought to help.... ...

More of this blog:
http://newsletter.infoworld.com/t?ctl=1851A8D:20920CD98AAF82DD84F30AF80574807AEFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
ADVERTISEMENT

JOIN INFOWORLD EDITORS AT APPCON 2007 - SEPT. 13 -14, SAN JOSE, CA

Don't miss AppCon 2007, The Application Continuity Conference.
This interactive, face-to-face conference on business operations
and application continuity covers real-world experiences from
industry pioneers including InfoWorld Editors Eric Knorr and
Doug Dineley - topics surrounding disaster recovery and solutions
they found to ensure applications operate 24/7. Save $250 with
InfoWorld discount code: MNEWSAPP07

http://newsletter.infoworld.com/t?ctl=1851A91:20920CD98AAF82DD84F30AF80574807AEFF29049075316B4

-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -

DAILY NEWS, DELIVERED TO YOUR COMPUTER, MP3 PLAYER OR CELL PHONE

The InfoWorld Daily podcast provides readers with
up-to-the-minute news and features that shape the world
of enterprise IT. Tom Sullivan reports on the leading news
and events that shape the today's IT community.

http://newsletter.infoworld.com/t?ctl=1851A8E:20920CD98AAF82DD84F30AF80574807AEFF29049075316B4

======================================================================

ADVERTISE

To advertise, contact Kate_Hobbie@infoworld.com.

======================================================================

UNSUBSCRIBE/MANAGE NEWSLETTERS

To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=1851A8F:20920CD98AAF82DD84F30AF80574807AEFF29049075316B4

Contact Customer Service at: customerservice@infoworld.com

To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=1851A90:20920CD98AAF82DD84F30AF80574807AEFF29049075316B4

Copyright (C) 2007 InfoWorld Media Group.
501 Second St., San Francisco, CA 94107


This message was sent to: security.world@gmail.com

Change management trips over skills gap; Emerging management challengers

Network World

Network/Systems Management News Alert




Network World's Network/Systems Management News Alert, 07/31/07

Change management trips over skills gap, 07/25/07: CIOs and IT managers in the U.K. believe skills gaps in the IT department are hampering businesses' change management programs, research has revealed.

Emerging management challengers: What do you think?, 07/25/07: For many years now, I have been writing about the big four management software makers and how every move they make could impact the overall network and systems management market - redefining how IT executives manage, automate and optimize their environments.

Opalis keeps eye on New Century's systems: New Century Title Insurance company relies on data from multiple sources to keep its customers and agents informed. To make sure critical systems and feeds stay up, the company uses monitoring and remediation tools from Opalis. Marvin Stone, vice president and CIO at New Century, explains what Opalis' tools does and how the company uses them on this edition of Voices from IT Roadmap. (6:59)

Network World's Network Infrastructure Buyer's Guide

Find the right infrastructure products for your enterprise - fast. Our extensive database of detailed product information in over 20 specific network gear market segments will help you quickly pinpoint what you need. With the side-by-side comparison tool you can evaluate product features and make the best decision for your enterprise.

Click here to go the Buyer's Guide now.

Podcast: Baseball Hall of Fame slow to induct digital video, 07/26/07: Baseball Hall of FameThe National Baseball Hall of Fame in Cooperstown, N.Y., has over 10,000 hours of audio recordings and video footage in many different native formats, but has not yet jumped on the digital video merry-go-ground. Benjamin Harry, media archivist and recording manager for the Hall of Fame, talks with Network World's Jason Meserve about the hesitation to go digital and the challenges of preserving analog media for future generations of baseball fans. (16:04)

Video: A dirty job for IT: Keith test-drives a USB device with file detection software that aims to find objectionable content stored on a PC notebook.

TODAY'S MOST-READ STORIES:

1. Online gamers’ dirty little secrets exposed
2. IBM tells employees to behave in Second Life
3. Video games televised as a sport?
4. NAC alternatives hit the mark
5. Hogwarts IT director quits
6. Akonix: IM attacks up nearly 80%
7. Cisco Networkers extravaganza highlights
8. Top 15 'networkiest' moments of The Simpsons
9. Industry giants get 'Simpsonized'
10. Nacchio sentenced to 6 years, $52M fine

MOST-READ REVIEW:
NAC alternatives hit the mark


Contact the author:

Senior Editor Denise Dubie covers network and systems management for Network World.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

ISAserver.org - Publishing Exchange 2007 OWA, Exchange ActiveSync and RPC/HTTP using the 2006 ISA Firewall (Part 3)

ISAserver.org - RealTime Article Update

Hi Security World,

Title: Publishing Exchange 2007 OWA, Exchange ActiveSync and RPC/HTTP using the 2006 ISA Firewall (Part 3)
Author: Thomas Shinder
Link: http://www.ISAserver.org/tutorials/Publishing-Exchange-2007-OWA-Exchange-ActiveSync-RPCHTTP-using-2006-ISA-Firewall-Part3.html
Summary: Configuring the SMTP "service" on the Hub Transport Server.

Visit the Subscription Management (http://newsletter.isoftmarketing.com/) section to unsubscribe.
ISAserver.org is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@isaserver.org

Copyright © ISAserver.org 2007. All rights reserved.

Tool tests for phishing-attack gullibility; Botnets identified and blocked with new hosted service

Network World

Security News Alert




Network World's Security News Alert, 07/31/07

Tool tests for phishing-attack gullibility, 07/30/07: Do your company’s employees seem like easy dupes for e-mail phishing attacks and other scams? A vulnerability-assessment tool from Core Security Technologies lets you set up automated tests to find out.

Botnets identified and blocked with new hosted service, 07/30/07: A security tool that identifies botnets and blocks attacks from these zombie networks is being made available by Trend Micro online in the software-as-a-service model.

Nevis NAC gear introduces cloaking, 07/30/07: Nevis Networks has new software that makes it easier for its NAC hardware to block any user on a network from seeing another device, making it possible to prevent rogue equipment or malicious users from accessing resources they shouldn’t or from probing the network for vulnerabilities.

Network World Security Buyer's Guide

Find the right security products for your enterprise - fast. From anti-spam to wireless LAN security, our Buyer's Guides have detailed information on hundreds of products in more than 20 categories. With the side-by-side comparison tool you can evaluate product features to make the best decision for your enterprise.

Click here to go to the Security Buyer's Guide now.

Single group behind ransomware Trojans, 07/30/07: The two most prominent ransomware Trojans of recent times could be the work of the same people, or a related group of criminals, an analysis has suggested.

E-mail scams target deep-pocketed victims, 07/27/07: A wave of sophisticated, ongoing attacks disguised as bills from supposed business partners, complaints from the Better Business Bureau, and investigations by the U.S. Internal Revenue Service is snaring high-value business victims with malware-carrying e-mail messages that don't bear the usual telltale signs of phishing.

California report slams e-voting system security, 07/27/07: Researchers commissioned by the State of California have found security issues in every electronic voting system they tested, California Secretary of State Debra Bowen said Friday.

Microsoft Subnet blogger, Tyson Kopczynski, delves into the mysteries of Microsoft’s Certificate Lifecycle Manager. “Overall, I like CLM,” he reports, though he also has misgivings.

TODAY'S MOST-READ STORIES:

1. Online gamers’ dirty little secrets exposed
2. IBM tells employees to behave in Second Life
3. Video games televised as a sport?
4. NAC alternatives hit the mark
5. Hogwarts IT director quits
6. Akonix: IM attacks up nearly 80%
7. Cisco Networkers extravaganza highlights
8. Top 15 'networkiest' moments of The Simpsons
9. Industry giants get 'Simpsonized'
10. Nacchio sentenced to 6 years, $52M fine

MOST-READ REVIEW:
NAC alternatives hit the mark


Contact the author:

Senior Editor Ellen Messmer covers security for Network World. E-mail Ellen.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

WindowsNetworking.com - Working with Network Monitor (Part 2)

WindowsNetworking.com - RealTime Article Update

Hi Security World,

Title: Working with Network Monitor (Part 2)
Author: Brien M. Posey
Link: http://www.WindowsNetworking.com/articles_tutorials/Working-With-Network-Monitor-Part2.html
Summary: How to use Network Monitor.

Visit the Subscription Management (http://newsletter.isoftmarketing.com/) section to unsubscribe.
WindowsNetworking.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsnetworking.com
Copyright © WindowsNetworking.com 2007. All rights reserved.

NAC alternatives hit the mark

Network World

Product Test and Buyer's Guide




Product Test and Buyer's Guide, 07/31/07

NAC alternatives hit the mark

By Mandy Andress

Network-access control is a buzzword of epic proportion. And as is the case with much of larger-than-life industry vernacular, products with even the slightest aspect of access control are being pitched by their makers as integral components of the NAC fray.

Network World VoIP and Convergence Buyer's Guide

Find the right products for your enterprise - fast. Our extensive database of detailed product information will quickly help you pinpoint the hardware or software you need to build out a converged voice and data network. With the side-by-side comparison tool you can evaluate product features and make the best decision for your enterprise.

Click here to go to the Buyer's Guide now.

In April, we assessed the role that more than 30 NAC products play in the larger NAC schemes defined by Cisco's Network Access Control (CNAC) initiative or the Trusted Network Connect (TNC) working group of the Trusted Computing Group (see "What can NAC do for you now?").

We found that the basic functions of NAC can be carried out within CNAC or TNC, but not all IT shops have the time, inclination, network infrastructure or resources to deploy a full-blown NAC framework.

Enter the all-in-one approach to NAC -- single products that provide authentication and authorization, endpoint-security assessment, NAC policy enforcement and overall management.

We tested 13 products from Bradford Networks, Check Point Softwaer, Cisco, ConSentry Networks, ForeScout Technologies, InfoExpress, Juniper Networks, Lockdown Networks, McAfee, StillSecure, Symantec, Trend Micro and Vernier Networks.

For more on this test, please click here.

TODAY'S MOST-READ STORIES:

1. Online gamers’ dirty little secrets exposed
2. IBM tells employees to behave in Second Life
3. Video games televised as a sport?
4. NAC alternatives hit the mark
5. Hogwarts IT director quits
6. Akonix: IM attacks up nearly 80%
7. Cisco Networkers extravaganza highlights
8. Top 15 'networkiest' moments of The Simpsons
9. Industry giants get 'Simpsonized'
10. Nacchio sentenced to 6 years, $52M fine

MOST-READ REVIEW:
NAC alternatives hit the mark


Contact the author:
Andress is a member of the Network World Lab Alliance, a cooperative of the premier testers in the network industry, each bringing to bear years of practical experience on every test. For more Lab Alliance information, including what it takes to become a partner, go to www.networkworld.com/alliance.

BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

Trends in mobile messaging

Network World

Unified Communications




Network World's Unified Communications Newsletter, 07/31/07

Trends in mobile messaging

By Michael Osterman

We have just completed a major survey of mobile messaging in midsized and large organizations. Here’s some of what we found:

* 15% of the corporate workforce in midsized and large organizations in North America uses employer-supplied mobile devices. However, decision-makers anticipate that they’ll see in excess of 40% growth in the number of employees using these devices in 2008 and more than 30% growth in 2009.

* In terms of the devices supported by IT, BlackBerry devices clearly dominate, although Windows Mobile device support will be increasing over the next 12 months. Symbian support is also increasing, while Palm support will drop very slightly.

Network World Security Buyer's Guide

Find the right security products for your enterprise - fast. From anti-spam to wireless LAN security, our Buyer's Guides have detailed information on hundreds of products in more than 20 categories. With the side-by-side comparison tool you can evaluate product features to make the best decision for your enterprise.

Click here to go to the Security Buyer's Guide now.

* The integration of presence into mobile devices will increase significantly over the next 12 months: while only 19% of organizations today report that presence integration with mobile devices is a priority or very high priority today, that figure will more than double a year from now.

* What devices are users asking for? We asked messaging decision makers “On a scale of 1 to 5, how much demand is there among your mobile users for the following devices, where 1 is ‘no demand at all’ and 5 is ‘users are clamoring for this device’”? We found that BlackBerry devices are being sought significantly more than any other device, although significant proportions of users are also asking for Windows Mobile devices. Interestingly, of the four mobile devices we asked about (BlackBerry, Windows Mobile, Palm Treo and Apple iPhone), the iPhone was last on the list.

Clearly, mobile messaging will have a major impact on corporate decision-making over the next 24 months, particularly in the context of archiving content, the security of the devices and the data they contain and the use of external services employed to manage mobile devices.


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. Online gamers’ dirty little secrets exposed
2. IBM tells employees to behave in Second Life
3. Video games televised as a sport?
4. NAC alternatives hit the mark
5. Hogwarts IT director quits
6. Akonix: IM attacks up nearly 80%
7. Cisco Networkers extravaganza highlights
8. Top 15 'networkiest' moments of The Simpsons
9. Industry giants get 'Simpsonized'
10. Nacchio sentenced to 6 years, $52M fine

MOST-READ REVIEW:
NAC alternatives hit the mark


Contact the author:

For webinars or research on messaging, or to join the Osterman Research market research survey panel, go here. Osterman Research helps organizations understand the markets for messaging and directory related offerings. To e-mail Michael, click here.



ARCHIVE

Archive of the Unified Communications Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

The appeal of managed WAN optimization services

Network World

Network Optimization




Network World's Network Optimization Newsletter, 07/31/07

The appeal of managed WAN optimization services

By Ann Bednarz

Deciding whether to deploy and manage a new technology in-house using internal IT resources or go with an outsourcer is a common dilemma in the IT world, and the WAN optimization market is no exception.

As the WAN optimization market matures, more enterprises are opting to go with a managed service instead of running their own gear, according to Robert Whiteley, a senior analyst at Forrester Research who said he talks frequently with folks “struggling to get applications to deploy and perform well across a global footprint.”

Whiteley spoke about the future of managed WAN optimization services in a recent Webcast put on by Ipanema Technologies.

Manage Skyrocketing Storage

The data on your network is growing at a rapid pace that's only going to increase. Download Network World's latest Executive Guide and get the practical, real-world advice and insider information you need to best manage and meet your storage demands and industry regulations.

Click here to download.

To set the stage, Whitely talked about how companies are taxing their WANs as they deploy more distributed applications, perform remote backup procedures, and pursue server and data-center consolidation efforts, for example. “What that means is that you’re asked to increase your application footprint while decreasing your infrastructure footprint, all while making it more secure and more able to recover from disasters,” Whiteley said. “It’s quite difficult and puts a big tax on the [WAN].”

It takes only a couple of demanding applications to create a fairly low-bandwidth or high latency network, and poorly performing applications can hinder employees’ ability to complete key business processes and effect customer care, Whiteley said.

When it comes to solving the problem of bottlenecks in the application environment, Whiteley said that a WAN optimization service can be more cost-effective than deploying in-house technology.

For one, a managed service eliminates a lot of upfront configuration pains. To get appropriate application visibility and control across a network takes a lot of setup work if you do it yourself, he said. In addition, a managed service lets a company quickly scale applications, decrease its network integration costs and mitigate ongoing costs associated with optimizing application delivery.

As the market for managed WAN optimization services gets off the ground, Whiteley expects they initially will be most appealing to small and midsize businesses, which in the past have been priced out of costly WAN optimization gear. As options mature, more large enterprises will consider the model, he said.

Meanwhile, options are increasing. AT&T launched a managed application acceleration service in early June, followed by network and security services provider Virtela Communications, which announced its own suite of managed services for improving application and protocol performance over the WAN about a month ago.

In the next newsletter I’ll share Whiteley’s recommendations for selecting the right provider.


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. Online gamers’ dirty little secrets exposed
2. IBM tells employees to behave in Second Life
3. Video games televised as a sport?
4. NAC alternatives hit the mark
5. Hogwarts IT director quits
6. Akonix: IM attacks up nearly 80%
7. Cisco Networkers extravaganza highlights
8. Top 15 'networkiest' moments of The Simpsons
9. Industry giants get 'Simpsonized'
10. Nacchio sentenced to 6 years, $52M fine

MOST-READ REVIEW:
NAC alternatives hit the mark


Contact the author:

Ann Bednarz is an associate news editor at Network World responsible for editing daily news content. She previously covered enterprise applications, e-commerce and telework trends for Network World. E-mail Ann.



ARCHIVE

Archive of the Network Optimization Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007