Date: Wed, 18 May 2005 14:24:39 -0400 (EDT)
From:"NWC Online" <NetworkComputing@update.networkcomputing.com>
Subject: Network Computing Online #3.05 -- We're No. 1--In Identity Theft
-- Network Computing Online #3.05 --
Your Online IT Resource
http://www.networkcomputing.com/
Wednesday, May 18, 2005

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

SUPERCOMM 2005
June 6-9 McCormick Place, Chicago
SUPERCOMM is the only event where you can explore the whole world
of communications: Broadband. Infrastructure. IP. Converged Wireless.
Enterprise Networks. Everywhere you look, you'll be surrounded with
solutions: VoIP. WiMAX. Triple-Play. Wireless Data. OSS. WiFi. 
IP Video. Register free today! 
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPbE0Eg

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._


Here's what's cooking on NWC Online this week!

1) The Daily Blog
     - Intelligent Switches, et al
     - We're No. 1--In Identity Theft
     - Another Cheap PC?
2) YackITyYack
     - Top 11: Weird World of Wireless
3) Calling All Readers
     - Gartner PlanetStorage Summit: The Changing Face of Recovery
     - TechQuiz: Message Archiving
     - Tech Support Haiku Winner
     - A Ventana Research Webinar: Business Intelligence and Microsoft
        Office Results Unveiled
4) Editors' Picks
     - SIP Goes Peer-to-Peer
     - Performance Management Imperatives for 2005
     - New Sober Trojan Spewing Hate Spam
     - Intel's New CEO Faces Broad Challenges
     - Review: Google Web Accelerator
     - Featured White Paper: Comparing Secure Remote Access Options:
        IPSec VPNs vs. SSL VPNs
5) Download Mania
     - Easy File Backup 1.0.2
     - RoyalFTP
6) Eye on Security
     - Alertcon: Mozilla Firefox Vulnerabilities
     - Security Threat Watch: Intel Pentium Processor Vulnerability
7) Coming Events
     - IP Communications: Strategies for Accelerating Your Success
     - Neohapsis NeoCast: Trends in Regulation, Compliance and
        Enforcement
     - Weathering a Perfect Storm: Protecting Your E-mail Network with 
a
        Layered Security Architecture
     - Mobilizing Enterprise Applications to Improve Business
        Performance

Look for the next Network Computing Online newsletter on Wednesday,
May 25, 2005!


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

1) The Daily Blog

a) Intelligent Switches, et al
By Don MacVittie
Here we are, a few days from the start of testing for the Storage
Pipeline "Intelligent Switch" review. Interestingly enough, after
wending my way through the learning curve of intelligent
switching--there is a LOT that you have to know beyond basic FC 
stuff--I
feel I'm ready to begin testing.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPa20EM

b) We're No. 1--In Identity Theft
By Tim Wilson
First in war, first in peace and first in--identity theft? That's the
verdict on the United States, according to a report issued earlier this
week by Aite Group, a Boston research firm. In fact, the report says,
identity theft occurs seven times more often in the United States than
in other industrialized regions, including the United Kingdom.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPa30EN

c) Another Cheap PC?
By Tim Wilson
A couple of our online news competitors this week are running a big
story about Via Technologies, a Taiwanese PC manufacturer that is
preparing to launch a new range of low-cost PCs that will be offered 
for
as little as $250. I don't see this as a big story, and I'll give you
two reasons why.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPa40EO

Read more entries from The Daily Blog.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0B5MU0E7


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

2) YackITyYack

Top 11: Weird World of Wireless
There's still time to submit your entries for the "Top 11 worst places
to have wireless access." Make us chuckle--or even cringe--and we may
put your entry in the magazine and/or online. Here are a couple ideas 
to
get you going.
* In your home office, while you're doing your taxes.
* In the room where you're having an extramarital affair.
* In the bathtub, while you're shaving your back.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0CEhF0Eb


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

3) Calling All Readers

a) Gartner PlanetStorage Summit: The Changing Face of Recovery
June 13-16, 2005
Hyatt Regency Grand Cypress, Orlando, FL
Gartner PlanetStorage Summit is the one conference where you can get 
the
hard, statistical and market data, case studies and end-user-focused
educational sessions that will shorten your decision-making cycle and
help you implement the best new solutions faster.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPE60Ew

b) TechQuiz: Message Archiving
There's still time to take our latest quiz and test your knowledge of
today's enterprise-level e-mail archiving systems. If you can outsmart
our editors, we'll throw your name into the hat for a free NWC
collectible.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0TNs0E3

c) Tech Support Haiku Winner
Thanks to those of you who submitted IT technical support haikus. Check
out this week's best entry and submit your poem today for a chance at
our editors' honors.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DHRZ0Ed

d) A Ventana Research Webinar: Business Intelligence and Microsoft
Office Results Unveiled, Presented by Eric Rogge
Wednesday, May 25, 2005
9:00 AM PST / 12:00 PM EST
Efficient integration of centralized business intelligence systems with
Microsoft Office desktop applications is a key issue for IT and 
business
organizations today. This survey examined the priorities, actions and
needs of organizations faced with integrating Microsoft Office and
business intelligence systems into a seamless information dissemination
environment.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPa50EP


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

4) Editors' Picks

a) SIP Goes Peer-to-Peer
A new Internet draft brings the power of Skype and peer-to-peer
networking to SIP, plus a whole lot more.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPCZ0EW

b) Performance Management Imperatives for 2005
Mark Smith outlines six cross-functional business imperatives to help
finance, operations and IT organizations focus their resources and
investments effectively.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPMK0ER

c) New Sober Trojan Spewing Hate Spam
A Sober-style Trojan piggybacking on May's massive Sober.p worm started
spewing spam this weekend, some of it directing users to Web sites with
right-wing German nationalistic content.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPJe0Eo

d) Intel's New CEO Faces Broad Challenges
Intel's incoming CEO, Paul Otellini, is intent on maintaining
double-digit growth by changing the way semiconductor giants market its
processors, by expanding in communications and medical IT, and by
driving deeper into emerging markets.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPJY0Ec

e) Review: Google Web Accelerator
Google's latest beta offers to speed up your surfing--or it will, once
Google makes it available again.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPa60EQ

f) Featured White Paper: Comparing Secure Remote Access Options:
IPSec VPNs vs. SSL VPNs
By Aventail Corp.
This paper provides an overview of the differences between SSL VPNs and
IPSec VPNs and explains why SSL VPNs are ultimately a better choice for
secure remote access and extranets.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPa70ER

See more white papers, research abstracts, case studies and product
information in the Network Computing Tech Library.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DHRd0En

For additional research, check out our online encyclopedia providing
Web-based definitions of IT terms.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0XQ0EG

You can find links to these and other breaking news stories organized 
by
technology via our handy NetNews Service.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0CJp80Ea


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

5) Download Mania: Select Files From IT Pro Downloads

a) Easy File Backup 1.0.2
Easy File Backup is an easy-to-use file and folder backup utility. This
backup software program runs unobtrusively in the system tray and will
allow you to back up your data at a specified interval and/or on a
routine basis.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DOpE0Et
Size: 518k
Platform: Windows
Licensing: Freeware

b) RoyalFTP
Transfer files with ease using this intuitive FTP client. RoyalFTP is a
multithreaded FTP client for Windows that's easy for beginners to use
and has enough features to be useful to power users as well. Using its
intuitive, drag-and-drop Explorer-like interface, RoyalFTP lets you
update a Web site with a single click and resume interrupted downloads
or uploads.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DOpC0Er
Size: 5,027k
Platform: Windows
Licensing: Freeware

Note: By using IT Pro Downloads you agree to these terms of use.
http://www.itprodownloads.com/terms.jhtml


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

6) Eye on Security

a) Alertcon: Mozilla Firefox Vulnerabilities
Mozilla Firefox version 0.10.1 for Windows could allow a remote 
attacker
to spoof file types in the file download dialog. This is caused by
improper validation of the file name and content-type header.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0Btri0E7

b) Security Threat Watch: Intel Pentium Processor Vulnerability
Last week brought an interesting vulnerability disclosure involving an
Intel Pentium processor nuance found in the Hyper-Threading feature. 
The
bug allows one processor thread to potentially determine data used by
another processor thread via the use of timing attacks against the
processor's cache memory. Practical exploitation scenarios involve the
recovery of restricted encryption keys. However, we were left wondering
if PC virtualization software (VMWare, Microsoft Virtual Server, etc.)
would suffer any leakage of data between the host and guest systems.

For more information:
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPa80ES
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPbA0Ec
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPbB0Ed

For more security alerts and information, sign up for our free Security
Threat Watch newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0CCEc0ET


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

7) Coming Events

a) IP Communications: Strategies for Accelerating Your Success
--A Network Computing Expert Series TechWebCast
Thursday, May 19, 2005
11:00 AM PST / 2:00 PM EST
The benefits of IP communications are proven: improved employee
productivity, increased customer service levels and cost savings.
Advanced telephony capabilities such as unified messaging, voicemail,
intercom and auto-attendant are creating a clear competitive advantage.
Tune in to hear leading experts discuss the business benefits and best
practices of IP communications.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPFK0EK

b) Neohapsis NeoCast: Trends in Regulation, Compliance and Enforcement
Thursday, May 26, 2005
9:00 AM PST / 12:00 PM EST
In this event led by Dave Stampley, compliance specialist and general
counsel at Neohapsis, Dave will walk participants through ways to avoid
common compliance pitfalls as well as highlight emerging regulatory
developments.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DIH40Eq

c) Weathering a Perfect Storm: Protecting Your E-mail Network with a
Layered Security Architecture
--An InformationWeek Vendor Perspectives TechWebCast
Thursday, May 26, 2005
9:00 AM PST / 12:00 PM EST
Sendmail will describe the fundamental elements of e-mail security
architecture, based on its experience implementing e-mail systems for
the world's largest enterprises. Learn how to establish a secure
foundation for your e-mail infrastructure as well as the best practices
to improve e-mail security in a multi-vendor environment.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPbC0Ee

d) Mobilizing Enterprise Applications to Improve Business Performance
--A Network Computing Vendor Perspectives TechWebCast
Tuesday, May 31, 2005
11:00 AM PST / 2:00 PM EST
Join Good Technology, along with palmOne, to discover how 50 of the
Fortune 100 enterprises are able to deliver business-critical
applications to their mobile professionals. Learn how to securely 
deploy
and manage information for your mobile professionals where they need it
most--at the point of business. Plus, find out the latest technologies
for integrating today's handheld devices into your organization.
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPbD0Ef


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

SUPERCOMM 2005
June 6-9 McCormick Place, Chicago
SUPERCOMM is the only event where you can explore the whole world
of communications: Broadband. Infrastructure. IP. Converged Wireless.
Enterprise Networks. Everywhere you look, you'll be surrounded with
solutions: VoIP. WiMAX. Triple-Play. Wireless Data. OSS. WiFi. 
IP Video. Register free today! 
http://update.networkcomputing.com/cgi-bin4/DM/y/enzL0GPvuP0G6u0DPbE0Eg

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

Put Us On Your White List
Don't let an over-eager e-mail filter bounce the Network Computing
Online newsletter! Our address:
NetworkComputing@update.networkcomputing.com

needs to be in your address book or on your anti-spam white list. Ask
your admin or ISP how to do this, or check your anti-spam utility
documentation.

As always, we welcome your feedback about our newsletter. Please feel
free to message us directly if you have any comments or questions
(mailto:nwconline@cmp.com).

Important subscription contacts:
CMP Media LLC
600 Community Drive
Manhasset, NY 11030

Change your e-mail address.
http://networkcomputingsubscriptions.com/customerservice/

Sign up for your own issue of this newsletter.
http://www.networkcomputing.com/newsletters/subscriptions.html

Subscribe to Network Computing's newsletters.
http://www.networkcomputing.com/newsletters/subscriptions.html

Still not receiving your own FREE subscription to Network Computing
magazine?
http://networkcomputingsubscriptions.com/customerservice/

ADDITIONAL SUBSCRIPTION CONTACT
Please send an e-mail message to mailto:newsletters@cmp.com if you need
assistance changing your e-mail address, unsubscribing from this
newsletter, or require additional assistance with your subscription.
Please be sure to include the name of this newsletter in your message.

Note: This newsletter utilizes dynamic URLs. For more information,
please refer to our privacy policy.
http://www.doubleclick.net/us/corporate/privacy

Copyright (c) 2005 Network Computing, a CMP Media LLC publication
http://www.nwc.com/