Monday, August 31, 2009

CMOLO Turnstile & RFID Price Lists

Dear Sir/Madam,

Good day! I have seen your company from your website. I hope we have chance to cooperate with each other. Our company CMOLO is professional in security products, such as turnstile, CCTV, RFID etc. for a long time, in which turnstile and CCTV are our most popular product. We have passed the CE certificates of Turnstile and Video Fiber Optic System. Attached please find our latest price list for your information. We've been offering our clients a most competitive price with the most stable quality. Please let me know if I can be of any assistance. Thank you and wish you continuous success.

Best Regards,
Joy. Zhao


--
CMOLO INTERNATIONAL CO., LTD.
ADD: Third Floor, Yajie building, Meilin Road, Futian District, Shenzhen, China
TEL: 86-755-83065161
FAX: 86-755-83065162
MSN: cmolo.joy@hotmail.com    
SKYPE: cmolo.joy
Homepage: www.cmolo.com
Email: contact@cmolo.com

VMworld product blitz: Hot technology for the virtual world; Still trying to crack Nazi Enigma messages

News podcast: Network World 360; Xen.org aims for the cloud with open source initiative
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Actuate
rule

Biz Intel Reporting
Think beyond the current structure of a report and personalize it with Business Intelligence Reporting Tools (BIRT) Interactive Viewer. Meet data visualization requirements faster and with less development by making BIRT web output interactive.

Learn more.

rule

Spotlight Story
VMworld product blitz: Hot technology for the virtual world

VMworld has become one of the key events each year for vendors releasing products related to virtualization and cloud computing. Here we highlight new products targeting storage, server and desktop needs in virtualized data centers. Read full story

Related News:

News podcast: Network World 360
Software designed to beat Chinese censorship may behave in ways that seem suspect, but it is all part of the application's strategy to fool the Great Firewall of China, according to one programmer of the software. Developers of the Xen open source hypervisor are trying to make Xen the industry's cloud-building platform of choice with a new initiative designed to expand upon the hypervisor's ability to create "secure, customizable, multi-tenant cloud services." (5:51)

Xen.org aims for the cloud with open source initiative
Developers of the Xen open source hypervisor are trying to make Xen the industry's cloud-building platform of choice.

VMware unwraps virtualization management tools
VMware has revealed several virtualization management products to be announced at VMworld Monday, but is so far shying away from any big-ticket announcements.

Still trying to crack Nazi Enigma messages
The Enigma@home project uses a distributed volunteer computing network to crack Nazi codes from the 1940s.

Apple: 'Exploding' iPhones 'not our fault'
Apple claims the latest reports of "exploding" iPhones are caused by an "external force" and not by bursting into flames due to overheating batteries.

Is an IPS necessary?
A reader asks: Do we need an IPS? Ron Nutter answers.

Tech Support Chat: Is This the Best We Can Do?
Today I needed a new keyboard for one of my machines, so I thought, I'll try the vendor warranty support chat line to see whether it's any faster than hanging on the phone and speaking with a helpful representative.

Companies put security on back burner in dash to virtualise
Companies are putting security on the back burner in the rush to virtualise their data centres. That's according to applications delivery vendor F5 which conducted a survey of more than 100 decision makers about their virtualisation plans.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Unifying Management Systems for Deep Savings
To deliver the availability and performance the business demands, network management teams need to optimize fault management, unify fault and performance management, automate change and configuration management, implement run-book automation, and deploy a configuration management system based on a federated CMDB. This integrated approach is called automated network lifecycle management and is outlined in this white paper.
Read Now


Virtualization on IBM System Z Advantages
Not all virtualization solutions are created equal. You can achieve up to 80% savings on energy and floor space and up to a 90% reduction on software license fees. Learn about the cost savings, security benefits and unique approach Red Hat provides with open source virtualization integrated into the operating system kernel.
Learn More

 

August 31, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. Developer denies software to beat Chinese censors is malicious
  3. 12 words you can never say in the office
  4. FBI investigating laptops sent to U.S. governors
  5. China game boss sniped rivals, took down Internet
  6. The opposite of Twitter
  7. 12 cool ways to donate your PC's spare processing power
  8. Proposed bill gives Obama power to shut down Internet
  9. Group offers tools to evade China's Web censorship
  10. 5 techs that could reinvent cell phones

Gartner Predicts 2009: Recession Accelerated Shifts in IT Services
Recessions have the powerful effect of accelerating shifts in the market. The need to lower cost, increase efficiency and conserve cash has increased the motivation of companies to turn to outsourcing and increased the appeal of alternative delivery models. The disruptive shifts in new demand and supply patterns will drive changes for how IT services are bought and from whom. Gartner's Strategic Planning Assumptions for the IT services market will help buyers and sellers plan their strategies.
Click here to continue.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



Security Alert: Live Security Panel – Sept. 29

Presented by: CIO, Computerworld, CSO, InfoWorld & Network World

                     Security Alert

Security Directions: A Virtual Conference
Protecting Your Enterprise in a Dynamic Infrastructure

Date: September 29, 2009
Time: 9:30am - 6:30pm

Join us on Sept. 29th for a live virtual event that will provide candid, expert information on top security challenges and issues - all from the comfort of your desktop.  Register today and you may win the grand prize – a flat screen LCD TV.

Register Now!

Looking for more resources?  Visit the Network World White Paper Library and Webcast Library today!


You are subscribed to nwwalerts_security as security.world@gmail.com.
To unsubscribe to this alert, please go to: http://online.networkworld.info/u?id=289271763.56c9d8ecaaeeaf441f3051bea83ad6d0&n=T&l=nwwalerts_security&o=4257794

Read Network World's privacy policy  

Copyright 2009 | Network World, Inc. | 492 Old Connecticut Path, Framingham, MA 01701 | www.networkworld.com

 

[SECURITY] [DSA 1875-1] New ikiwiki packages fix information disclosure

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1875-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
August 31, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : ikiwiki
Vulnerability : missing input sanitising
Problem type : remote
Debian-specific: no
CVE Id(s) : CVE-2009-2944

Josh Triplett discovered that the blacklist for potentially harmful TeX
code of the teximg module of the Ikiwiki wiki compiler was incomplete,
resulting in information disclosure.

The old stable distribution (etch) is not affected.

For the stable distribution (lenny), this problem has been fixed in
version 2.53.4.

For the unstable distribution (sid), this problem has been fixed in
version 3.1415926.

We recommend that you upgrade your ikiwiki package.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.4.tar.gz
Size/MD5 checksum: 768022 d2ab889b5aa29ed5c4910aebc5d10c82
http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.4.dsc
Size/MD5 checksum: 1095 d4c29cc8a5c5e57bf73dff92738d2383

Architecture independent packages:

http://security.debian.org/pool/updates/main/i/ikiwiki/ikiwiki_2.53.4_all.deb
Size/MD5 checksum: 911086 6eac3777f3b38bc7e7a4a53571440b6e


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkqcBysACgkQXm3vHE4uylrTEACfXVWcIirFP8onN9L+/lsqFpP8
8osAniQWmqVnSE9TSFqpgZxVV9rXqF0n
=G95e
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Managing storage as part of the virtual strategy

Cast your vote: SysAdmin of the Year 2009 launches; Virtual systems management vendors gear up for VMworld
Network World logo

Network/Systems Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Network Instruments
rule

Managing Application Delivery
On an ever-increasing basis, the primary components of a company's key business processes (e.g., sales, customer relationship management, quote-to-cash) are automated. If the applications supporting those key business process-es are unavailable or underperforming, the company's key business processes are negatively impacted. Learn to avoid these scenarios by taking a top-down approach to application performance management.

Learn More Now

rule

Spotlight Story
Managing storage as part of the virtual strategy

Virtual systems management software maker Veeam updates backup and replication product to enable IT managers to better and more easily backup and restore virtual environments. Read full story

Related News:

Cast your vote: SysAdmin of the Year 2009 launches
BigFix, LOPSA, USENIX and others kick off annual contest that asks companies to nominate an IT professional on staff for SysAdmin of the Year.

Virtual systems management vendors gear up for VMworld
Embotics and Surgient separately upgrade product suites to showcase at VMworld 2009 in San Francisco.

Managing application performance in a virtual environment
Xangati upgrades its AppMonitor suite to help enterprise IT managers better track application performance across a virtual environment down to the end-user desktop.

Have you hugged your SysAdmin today?
When your e-mail works today or the application you depend upon responds quickly, don't forget to thank your company's system administrator – who probably played some part in ensuring you could remain productive and get your job done.

Career advice: High-tech, healthcare best choices for college students
College students should forget about becoming a lawyer and focus their studies on computer science, engineering and healthcare, HR executives say.

Five ways to get affordable certification skills
Training is often among the first items cut from budgets when companies need to trim expenses. Industry watchers and IT professionals share tips on how to get certification-level IT skills with little cash.

Watch this site: Freestyle software
"The best things in life are free." For IT professionals, that saying applies to free tools available by way of open source communities, freeware developers or vendors looking to draw customers in with a no-cost version of their commercial software.20 free software favorites

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Managing Application Delivery
On an ever-increasing basis, the primary components of a company's key business processes (e.g., sales, customer relationship management, quote-to-cash) are automated. If the applications supporting those key business process-es are unavailable or underperforming, the company's key business processes are negatively impacted. Learn to avoid these scenarios by taking a top-down approach to application performance management.
Learn More Now


How to Improve NOC Efficiencies
Network managers are grappling with data center consolidation, expanding networks and shrinking change windows, network compliance and security issues, VoIP, and flat headcounts. Managing the network is getting more and more challenging. What's needed is a lifecycle approach based on an integrated tool set. This video shows a solution to those complexity challenges.
View Now

 

August 31, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. 12 words you can never say in the office
  3. Robocalls outlawed as of Sept. 1
  4. 5 techs that could reinvent cell phones
  5. The opposite of Twitter
  6. High-tech blimps earning their wings
  7. Obsolete technology: 40 losers
  8. Worst co-workers ever
  9. Free tool brings analysis to Cisco ASA
  10. 2,200 broadband stimulus applications

ESG: Why SharePoint Needs WAN Optimization
According to recent research from the Enterprise Strategy Group (ESG), implementing SharePoint is a Top 5 initiative for CIOs. But a hidden challenge in SharePoint is to ensure that end users are able to quickly access and edit files when connected via the WAN. Learn about the key benefits organizations have realized as a result of Wide Area File Services Technology.
Click here to continue.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



BMC's CTO gives advice on cloud management

Six steps to optimize IT governance; How to Manage Layoff Survivor Syndrome
Network World logo

IT Best Practices

NetworkWorld.com | Update Your Profile


Sponsored by Sybase
rule

Gaining the Performance Edge Using a Column-Oriented Database Management System
Many organizations are increasingly recognizing the potential benefits of how analytic databases can support reporting, strategic analysis, and other business intelligence activities. Explore the data explosion phenomenon and why column-oriented database systems are able to provide the boost that is needed to gain the performance edge.

Learn More

rule

Spotlight Story
BMC's CTO gives advice on cloud management

Everyone's talking about putting their application "in the cloud" these days. Cloud computing might be the next evolution for enterprise applications, but BMC Software's CTO advises IT organizations to consider how their application can be managed once in the cloud. Read full story

Related News:

Six steps to optimize IT governance
When it comes to IT governance, the benefits are obvious: IT is aligned with the business and everyone is happier. But good governance is harder than herding cats. These six steps for success are written by a guest blogger from ISACA, the organization that offers COBIT. But they'll work no matter what governance framework you choose.

How to Manage Layoff Survivor Syndrome
Chances are, if you've survived a round of layoffs in your career, you've probably experienced a pang of longing for lost colleagues, a lack of motivation and a decrease in productivity. According to a report by The Conference Board, an independent membership organization, such reactions can be described as "survivor's syndrome."

How to minimize the risk of illicit credit card capturing
Illegally capturing customer payment card numbers, or skimming, is a huge threat to merchants, according to an upcoming report on the criminal activity.

How to run your IT department into the ground
There seems to be some nasty goings-on in the IT department of the Veterans Administration.  The VA's inspector general is charging high-ranking officials in the agency's information technology office abused their authority, influenced the hiring of a contractor, engaged in nepotism,  oh, and engaged some unadvised hanky-panky.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

ESG: Why SharePoint Needs WAN Optimization
According to recent research from the Enterprise Strategy Group (ESG), implementing SharePoint is a Top 5 initiative for CIOs. But a hidden challenge in SharePoint is to ensure that end users are able to quickly access and edit files when connected via the WAN. Learn about the key benefits organizations have realized as a result of Wide Area File Services Technology.
Click here to continue.


How to Improve NOC Efficiencies
Network managers are grappling with data center consolidation, expanding networks and shrinking change windows, network compliance and security issues, VoIP, and flat headcounts. Managing the network is getting more and more challenging. What's needed is a lifecycle approach based on an integrated tool set. This video shows a solution to those complexity challenges.
View Now

 

August 31, 2009

TOP STORIES | MOST DUGG STORIES

  1. High-tech blimps earning their wings
  2. The opposite of Twitter
  3. 5 techs that could reinvent cell phones
  4. 12 words you can never say in the office
  5. Wi-Fi encryption cracked in 60 seconds
  6. Cisco's fastest router just got faster
  7. Marines want lots of robots to throw
  8. Group attacks Windows 7's 'sins'
  9. Microsoft, Citrix no longer sponsoring VMworld
  10. Judge overturns 2007 Unix copyright decision

The New Security Reality
Gain the required knowledge to successfully fight social engineering attacks, comply with federal regulations, and discover the latest trends in data protection in this Executive Guide. Hear directly from your peers who have been through serious data breaches and have come out the other side stronger and more secure.
Click here.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com