Tuesday, August 31, 2010

Fw: Internet free speech protected in the Middle East [ZDNET]

Sabir Abdul-Haqq, Technical Writer/Publisher, Notary Public
PO Box 31022
Jackson, MS 39286
601-543-9600
601-519-0014 fax
www.egentz.com
sabir@egentz.com


From: ZDNet Government Latest Headlines <newsletters@zdnet.online.com>
Date: Tue, 31 Aug 2010 08:26:32 -0700 (PDT)
To: <sabir@egentz.com>
ReplyTo: newsletters@zdnet.online.com
Subject: Internet free speech protected in the Middle East [ZDNET]

Trouble viewing this mail? Read it online | Manage my newsletters | Previous Edition
 
ZDNet Government
ZDNet Member | August 31, 2010
Home | News & Blogs | Videos | White Papers | Downloads | Reviews | Photo Galleries | Podcasts | RSS Feeds

Latest Headlines

Internet free speech protected in the Middle East

There are a number of valuable lessons we Americans can take from this discussion. The most important is that we need to watch our lawmakers very carefully.

READ FULL BLOG

How a mediocre iPad knock-off could foretell Steve Jobs' eventual doom

Is Apple’s biggest threat embodied in a $159 nobody-brand digital reader sold by the Dillards department store?

READ FULL BLOG

Recommended

Free Trial: IBM LotusLive iNotes Email Service

LotusLive iNotes is a business-class messaging solution designed for remote employees, retail workers or anyone who doesn't work behind a desk but needs company e-mail access. Get the free 30-day trial with multiple accounts, now!

Inside look at Pentagon's cyberdefense strategy: The battlefield beyond bad flash drives

Our nation faces risks far greater than a rogue flash drive: Failure to properly safeguard our consumer and industry systems; unwillingness to invest in ongoing security; and ordinary computer users playing with digital weapons of mass destruction.

READ FULL BLOG

What the frak just happened to my Twitter who-I-follow list?

For me, Twitter is an information and awareness channel, a source of valuable worldwide intelligence into the zietgeist of now. Until it stopped.

READ FULL BLOG

FaceTime could be Apple's iTV killer app

I’m betting a FaceTime-equipped iTV device will create entire new legions of rabid, insane, Apple fans. Oh, joy.

READ FULL BLOG

Connect with ZDNet

ZDNet Facebook Fan Page

Follow ZDNet on Twitter

Recommended Downloads
Sponsored White papers

More white papers:
Most popular papers
Recently added papers
Most popular papers by industry

 

Send us your feedback here.

Sign up for more free newsletters from ZDNet! | To manage your account settings or to remove yourself from all ZDNet communications, please visit our Subscription Center.

The e-mail address for your subscription is sabir@egentz.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy (updated)

Copyright CBS Interactive, Inc. All rights reserved.
ZDNet is a registered service mark of CBS Interactive, Inc.

ZDNet
235 Second Street
San Francisco, CA 94105
U.S.A.

Friday, May 21, 2010

Fw: Keep your phone running faster, more efficiently [DOWNLOAD DIGEST]

Makes me wish I had a Windows Mobile phone! Sike. Still good for WM6 users...
------Original Message------
From: newsletters@zdnet.online.com
To: Sabir
ReplyTo: newsletters@zdnet.online.com
Subject: Keep your phone running faster, more efficiently [DOWNLOAD DIGEST]
Sent: May 21, 2010 10:38 AM

ZDNet Downloads Digest Trouble viewing this mail? Read it online | Manage my newsletters   Downloads Digest ZDNet Member | May 21, 2010 Windows | Mac | Mobile | Most Recent | Most Popular | Top Searches This Week's Featured Download
 MemoryUp Personal (Windows Mobile Edition)
MemoryUp Personal is a handy mobile RAM monitoring & boosting tool specially designed for smartphone users. It increases your phone's performance by making more memory available for both your applications and the mobile system.
Recommended
Recovery and Resiliency: Emerging Stronger and Smarter
In the wake of economic turmoil and anticipation of a rebound, every organization must choose its own path. Join this discussion on where the U.S. economy stands today and how companies should develop growth strategies moving forward.
More Popular Resources
 Topperware SMSCleaner (Mobile)
Use SMSCleaner to automatically cleanup messages from as little as 1 day old to 24 months old.
 Ceedo Personal (Windows)
Create and carry your own personal desktop environment with you on a USB flash drive, portable hard drive or iPod device, and run it on any PC without installation.
Recommended
Immediately Boost Productivity with Hosted Exchange 2010
Is your email working as hard as you? Get an evaluation of different types of email services, and learn about the features and benefits of using hosted email - which will help improve your bottom line.
 TackyNotes (Windows)
Create sticky notes on any website in much the same manner as you might put a sticky note on a document.
 Remote Buddy (Mac)
Remotely control more than 100 applications, virtual keyboard and mouse, presentations, media center software and important system settings, right from your iPhone, iPod Touch, your Apple Remote or many other devices.
 REMO Outlook Backup and Migrate (Windows)
Schedule regular Oublook backups on a daily, weekly and monthly basis. Backup your pst files, Signatures, Templates, Stationery, and more.
 Snappy Program Lock (Windows)
Snappy Program Lock is a professional security tool for password protectin
Sabir Abdul-Haqq
601.543.9600 v
601.519.0014 f
www.extraordinarysolutions.biz

Monday, March 22, 2010

Facebook password reset themed malware campaign; MS testing'Twittter for business' [ANNOUNCEMENTS]

------Original Message------
From: newsletters@zdnet.online.com
To: Sabir
ReplyTo: newsletters@zdnet.online.com
Subject: Facebook password reset themed malware campaign; MS testing'Twittter for business' [ANNOUNCEMENTS]
Sent: Mar 22, 2010 2:14 PM

ZDNet Announcements Trouble viewing this mail? Read it online | Manage my newsletters   ZDNet Announcements ZDNet Member | March 22, 2010 Firefox Alerts | Mozilla Alerts | VOIP Alerts | Virus Alerts | Linux Alerts | RFID Alerts | RSS Feeds Featured TalkBack
Why Google should stay in China
It seems inevitable that Google will not only close the doors on its google.cn search engine, but also its Chinese development offices as well. This is a tragic and preventable mistake. by Ed Burnette
READ FULL BLOG
Recommended
Live Webcast: 7 Steps to Windows 7 Migration Success
Make your Windows 7 migration as smooth and painless as possible with this strategic, fast approach that incorporates time-saving migration tools.
Must-Read News
Facebook password reset themed malware campaign in the wild Memory card exposed 3,000 phones to virus Pwn2Own predictions: iPhone will be hacked German goverment to users: Stop using Firefox! Kernel vulnerabilities discovered in Ubuntu ZDNet Blogs
MS testing 'Twittter for business' Apple iPad adopters: Prepare for content punishment Why Apple should buy Adobe Does green tech mean wimpy tech? Dell thinks not
Sent from my BlackBerry® smartphone

Wednesday, March 17, 2010

Fw: Learn How Vrtualization Technology Can Save Your Budget

------Original Message------
From: newsletters@zdnet.online.com
To: Sabir
ReplyTo: newsletters@zdnet.online.com
Subject: Learn How Vrtualization Technology Can Save Your Budget
Sent: Mar 17, 2010 8:24 AM

ZDNet Enterprise Spotlight Enterprise Spotlight Manage my newsletters | Unsubscribe Data and Application Availability Utilizing Virtualization Technology Everyone is buzzing about "virtualization" technology, but do you know how to utilize the latest virtual technologies in your storage environment? Join this Live TechRepublic Webcast to learn how you can leverage virtualization technology to keep costs under control and create stand-by servers to maximize application availability.
Data and Application Availability Utilizing Virtualization Technology Tuesday March 23rd, 2010 12:00 PM ET | 9:00 AM PT | 16:00 GMT Register TODAY to participate on Tuesday March 23rd, 2010! Includes live Q&A!
Sponsored by: Presented by:
Sent from my BlackBerry® smartphone

Tuesday, March 16, 2010

Fw: Who's spying on your iPhone?

Sabir Abdul-Haqq, Technical Writer/Publisher, Notary Public
PO Box 31022
Jackson, MS 39286
601-543-9600
601-519-0014 fax
www.egentz.com
sabir@egentz.com

-----Original Message-----
From: "Network Security Tactics" <SearchSecurity@lists.techtarget.com>
Date: Tue, 16 Mar 2010 17:09:54
To: sabir@egentz.com<sabir@egentz.com>
Subject: Who's spying on your iPhone?

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
SearchSecurity.com: Network Security Tactics
March 16, 2010
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

HOW TO PREVENT iPHONE SPYING: MOBILE PHONE MANAGEMENT TIPS
Michael Cobb, Contributor

A SearchSecurity.com reader recently wrote: I am concerned with
spying on our corporate iPhones. As a policy, we don't encourage
accessing the Web, we wipe the memory, we use PINs to authenticate,
and we make sure our users never let the devices out of their sight.
Is it still possible for a third party to eavesdrop on users'
conversations, and if so, what can be done to prevent this?

Michael Cobb's response: I certainly wish that more of my clients
would take the security of their mobile devices as seriously as you
do. Without locking a phone with a passcode, anyone who gets hold of
one can access all of its email and data.
Read more:
http://go.techtarget.com/r/11102644/8294342
Get this tip via our Network Security Tactics RSS feed:
http://feeds.feedburner.com/techtarget/searchsecurity/networksecurity

:::::::::::::::::::::::::: ADVERTISEMENT :::::::::::::::::::::::::::
Sponsored by: HOUSE

HIPAA compliance manual
http://go.techtarget.com/r/11102645/8294342

Windows IIS server hardening checklist
http://go.techtarget.com/r/11102646/8294342

CISSP Essentials Security School
http://go.techtarget.com/r/11102647/8294342

How to detect rogue DHCP servers, routers and NICs on a network
http://go.techtarget.com/r/11102648/8294342

How a corporate Twitter policy can combat social network threats
http://go.techtarget.com/r/11102649/8294342
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

How secure are iPhone App Store mobile applications?
As most iPhone apps are built by third-party software developers, how
can users be sure that the apps they download are secure? Read this
expert response for advice on choosing only the most secure iPhone
apps.
http://go.techtarget.com/r/11102650/8294342
Read more about the growing threat of mobile malware:
http://go.techtarget.com/r/11102651/8294342

Sign up for more e-newsletters from SearchSecurity.com
Network security is only one of many concerns that infosec pros face
every day. For that reason, SearchSecurity.com offers many free email
newsletters with expert tips and advice. Do you deal with security
threats? Sign up today for our bi-monthly Threat Monitor tip, which
covers everything from botnets and phishing to the latest malware and
malware prevention techniques.
http://searchsecurity.techtarget.com/tieredRegPage/1,294138,sid14,00.html?track=NL-422&ad=755341USCA
Edit your preferences to sign up for all of our newsletters!
http://go.techtarget.com/r/11102652/8294342

::::::::::::::::::::: ABOUT THIS E NEWSLETTER ::::::::::::::::::::::
This e-newsletter is published by SearchSecurity.com, part of the
TechTarget network. TechTarget provides IT professionals with the
resources they need to perform their jobs: Web sites, newsletters,
forums, blogs, white papers, webcasts, events and more. Copyright
2010 TechTarget. All rights reserved. Designated trademarks and
brands are the property of their respective owners.

____________________________________________________________________

To unsubscribe from all TechTarget Security Media Group emails

Go to unsubscribe:
http://SearchSecurity.techtarget.com/u?track=NL-422&em=sabir%40egentz.com&uid=8294342&eid=756023&

A confirmation email will be sent when your request has been
successfully processed. Please note, this will not affect any other
subscriptions you have signed up for.

TechTarget Security Media Group,
275 Grove Street, Newton, MA 02466
Contact: Webmaster@techtarget.com

Tuesday, March 9, 2010

Fw: PC makers drool over SMBs; Conficker on HTC Magic; 8,000 smartphonebotnet [TECH UPDATE]

------Original Message------
From: newsletters@zdnet.online.com
To: Sabir
ReplyTo: newsletters@zdnet.online.com
Subject: PC makers drool over SMBs; Conficker on HTC Magic; 8,000 smartphonebotnet [TECH UPDATE]
Sent: Mar 9, 2010 10:33 AM

ZDNet Tech Update Today Trouble viewing this mail? Read it online | Manage my newsletters | Previous Edition   ZDNet Tech Update Today ZDNet Member | March 09, 2010 Home | News & Blogs | Videos | White Papers | Downloads | Reviews | Photo Galleries | Podcasts | RSS Feeds Top Editors Picks
  PC makers drool over SMBs; What will win over the accidental entrepreneur?
Dell is the latest PC vendor to update its small business lineup and it's clear that there will be a real battle between HP, Lenovo and others to target that market.
READ FULL STORY
Dell's new Vostro 3000 laptops pack Core i3, i5, i7
HP debuts new sleek, refined ProBook Standard series
Lenovo debuts ThinkPad Edge series; makes play for SMBs
Recommended
The advantages of row and rack-oriented cooling architectures
This white paper contrasts room, row, and rack architectures and shows why row-oriented cooling will emerge as the preferred solution for most next-generation data centers. (Sponsored by APC)
Researchers build 8,000-strong smartphone botnet
Security researchers used the lure of an innocuous weather application to commandeer about 8,000 iPhones and Android devices in a mobile botnet. by Ryan Naraine
READ FULL STORY
MSi X-Slim X360 laptop measures 1" thick, powered by Intel Core i5
The MSi news continues with the introduction of the ultra-portable X-Slim X360 laptop, which certainly lives up to its name at only an inch thick. by Rachel King
READ FULL STORY
Cisco plans to 'forever change the Internet'
Cisco Systems plans detail an announcement Tuesday that will "forever change the Internet."
READ FULL STORY
Recommended
Free Report: Selecting an Industry-Standard Metric for Data Center Efficiency
Take a closer look at the many metrics used to describe data center efficiency, including which one stands out for its ease of use and intuitiveness.
Vodafone HTC Magic shipped with Conficker, Mariposa malware
Researchers from PandaSecurity have detected Conficker and Mariposa malware samples shipped on a recently purchased Vodafone HTC Magic smartphone. by Dancho Danchev

Sabir Abdul-Haqq
601.543.9600 v
601.519.0014 f
www.extraordinarysolutions.biz

Friday, March 5, 2010

Fw: WAN video conferencing network design planning

------Original Message------
From: SearchEnterpriseWAN.com
To: onesence@aol.com
ReplyTo: no_reply@lists.techtarget.com
Subject: WAN video conferencing network design planning
Sent: Mar 5, 2010 8:07 AM

Sabir,

Video conferencing is a real-time communications technology, like
VoIP, which requires special treatment on the IP network. The wide
area network (WAN) is a critical component of the infrastructure
supporting video conferencing and must be properly configured in
order to ensure high-quality video conferencing service delivery.
Check out these WAN video conferencing network design configuration
requirements before you embark on your deployment now.
http://go.techtarget.com/r/11023799/5641409

Access this SearchEnterpriseWAN.com tip to learn how to ensure
high-quality video conferencing over your enterprise wide area
network (WAN). Topics include:

- Determining adequate bandwidth for WAN video conferencing
- WAN traffic classification
- WAN video conferencing network design takeaways
- And more!

Learn more about the WAN video conferencing network design
requirements for QoS now!
http://go.techtarget.com/r/11023800/5641409






____________________________________________________________________

To unsubscribe from all TechTarget Networking Media Group emails
Go to unsubscribe:
http://SearchTechTarget.techtarget.com/u?track=NL-1210&em=onesence%40aol.com&uid=5641409&eid=753751&

A confirmation email will be sent when your request has been
successfully processed. Please note, this will not affect any other
subscriptions you have signed up for.

TechTarget Networking Media Group,
275 Grove Street, Newton, MA 02466
Contact: Webmaster@techtarget.com



Sent from my BlackBerry® smartphone

Thursday, March 4, 2010

How vulnerable is your clientless SSL VPN?

A good read
Sabir Abdul-Haqq, Technical Writer/Publisher, Notary Public
PO Box 31022
Jackson, MS 39286
601-543-9600
601-519-0014 fax
www.egentz.com
sabir@egentz.com

-----Original Message-----
From: "Threat Monitor" <SearchSecurity@lists.techtarget.com>
Date: Thu, 04 Mar 2010 18:10:34
To: sabir@egentz.com<sabir@egentz.com>
Subject: How vulnerable is your clientless SSL VPN?

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
SearchSecurity.com: Threat Monitor
March 04, 2010
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CLIENTLESS SSL VPN VULNERABILITY AND WEB BROWSER PROTECTION
Randall Gamby, Contributor

In a recent vulnerability note, VU#261869, updated in mid-January
2010, The U.S. Computer Emergency Readiness Team (US-CERT) warned of
a clientless SSL VPN vulnerability found in many products. This SSL
VPN vulnerability could allow an attacker to bypass authentication
mechanisms or conduct other Web-based attacks.

So what's wrong with clientless SSL VPNs? First, it's important to
understand how these applications retrieve information. Many
clientless SSL VPN products -- a list of vulnerable products is
included in US-CERT's vulnerability note -- retrieve content from
different intranet sites and then present a consolidated view of the
content, as if it were coming from a single source: in this case,
from the SSL VPN service. This conjoined content circumvents the Same
Origin Policy, which is an important security concept for a number of
browser-side programming languages, such as JavaScript.
Read more:
http://go.techtarget.com/r/11009934/8294342
Get this tip via our RSS feed:
http://go.techtarget.com/r/11009935/8294342
Listen to this tip as an MP3:
http://go.techtarget.com/r/11009936/8294342

ALSO ON SEARCHSECURITY.COM

How to set up a remote access security policy
When writing a remote access security policy, it's important to keep
data secure without interfering with employees' ability to work, but
what's the best way to achieve that balance? In this expert response,
David Mortman expalins what to include in such a policy.
http://go.techtarget.com/r/11009937/8294342
Read more about firewall controls that should be placed on a VPN:
http://go.techtarget.com/r/11009938/8294342

Sign up for more e-newsletters from SearchSecurity.com
SearchSecurity.com offers many timely and informative
newsletters.Sign up today for our weekly Network Security Tactics
tip, covering everything from network device management to intrusion
detection and NAC.
http://searchsecurity.techtarget.com/tieredRegPage/1,294138,sid14,00.html?track=NL-427&ad=752296
Edit your preferences to sign up for all our newsletters!
http://go.techtarget.com/r/11009939/8294342

:::::::::::::::::::::::::: ADVERTISEMENT :::::::::::::::::::::::::::
Sponsored by: HOUSE

How to make the most of authentication tools
http://go.techtarget.com/r/11009940/8294342

How to prevent phishing attacks with social engineering tests
http://go.techtarget.com/r/11009941/8294342

How to prepare for an information security job interview
http://go.techtarget.com/r/11009942/8294342

How to align network security with business priorities
http://go.techtarget.com/r/11009943/8294342

Follow us on Twitter!
http://go.techtarget.com/r/11009944/8294342
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

::::::::::::::::::::: ABOUT THIS E NEWSLETTER ::::::::::::::::::::::
This e-newsletter is published by SearchSecurity.com, part of the
TechTarget network. TechTarget provides IT professionals with the
resources they need to perform their jobs: Web sites, newsletters,
forums, blogs, white papers, webcasts, events and more. Copyright
2010 TechTarget. All rights reserved. Designated trademarks and
brands are the property of their respective owners.

UNSUBSCRIBE

If you no longer wish to receive Threat Monitor from SearchSecurity
go to unsubscribe:

http://SearchSecurity.com/u?em=sabir%40egentz.com&uid=8294342&eid=752296&

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.


CONTACT US
SearchSecurity
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494