Search This Blog

Wednesday, February 29, 2012

Time to upgrade?

February Vol.2 issue of The Wireless E-Newsletter Having trouble viewing email? Click here.
RadioShack The Wireless E-Newsletter. March 2012
Check your phone upgrade eligibility. Find out now >
Upgrade time? Find out.
Samsung Galaxy S II. Find a store > Samsung Galaxy S II Epic 4G Touch. Shop now > Samsung Stratosphere. Shop now
Shop no-contract phones >
Buy a phone in-store get expert support free. Click here for more  info >
TRADE & SAVE LIKE US FOLLOW US FOURSQUARE FIND A STORE SHARE WITH A FRIEND
The Shack Credit Card is Online!  Open a new account today and  discover all the benefits of being a cardholder.  Already a cardholder?   Manage your account online >
Offers good through 3/3/12.

*All carrier/phone availability varies by location. Coverage not available everywhere. 4G in select markets only; defaults to 3G/other network when not available. Price requires credit approval and may require deposit. Subject to carrier agreement Terms & Conditions, including up to $36 activation/upgrade and up to $350 early-termination fees per line. Monthly access, data, overage, taxes and other charges apply. See store or carrier website for coverage maps/details.

**Limit 3 per customer. State and local taxes/fees, international calling and overage costs, prohibited usage rules and other restrictions apply. Subject to carrier Terms & Conditions. Month-to-month agreement required for email, Web and text data plan. Account may be terminated for non-use or non-payment.

‡Applies to your purchase from our in-stock no-contract and activated postpaid mobile phones. Applies to competitors' current advertised prices in newspaper. Competitive offer must be for identical mobile phone, carrier and pricing terms of new phone or upgrade contracts. Excludes: returns; Internet offers; offers with mail-in rebates; bundle offers; prepaid phones with bundled airtime; gift card promotions; trade-in offers; closeout or clearance offers. Participating stores only.

‡‡Service nontransferable. Participating stores only.

©2012 AT&T Intellectual Property. All rights reserved. AT&T, AT&T logo and all other AT&T marks contained herein are the trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.

SPRINT and the logo are trademarks of Sprint.

©2012 Boost Worldwide Inc. All rights reserved. Boost, Boost Mobile and the logo are trademarks of Boost.

To ensure delivery to your inbox, please add radioshack@e.radioshack.com to your address book.

RadioShack has a strict NO SPAM policy.
Unsubscribe | Privacy Policy | Terms and Conditions | Customer Service | 1-800-THE-SHACK®

This is an advertisement from RadioShack. © 2012 RadioShack Corporation. All rights reserved.
RadioShack Riverfront Campus — 300 RadioShack Circle, Fort Worth, TX 76102

Mozilla's 'modest proposal:' Dump the smartphone OS

How to protect your online privacy | iPad 3 concept video: How Apple could really blow us away

Network World Daily News PM

Forward this to a Friend >>>


Mozilla's 'modest proposal:' Dump the smartphone OS
Mozilla has a "modest proposal" about smartphones and it's simply stated. "Dump the operating system. All of them." Read More


RESOURCE COMPLIMENTS OF: Research In Motion

Introducing BlackBerry Mobile Fusion
Now all personal and corporate-owned BlackBerry® smartphone and BlackBerry® PlayBook™ devices can seamlessly access business data and applications on a single, secure management platform. Soon, Apple® iOS and Google® Android™ devices will be able to do the same. Learn how this new approach will end mobile chaos at blackberry.com/mobilefusion

WHITE PAPER: NetIQ

First Industy-Wide BSM Maturity Benchmark Study
This first-of-its-kind benchmark study reporting the IT and Business maturity illustrating the business service management imperative today. The survey offers insight into the current and future state of the Business Service Management imperative across global organizations. Learn More

How to protect your online privacy
Google's new privacy policy can by confusing, so here are clear steps to take to protect yourself online Read More

iPad 3 concept video: How Apple could really blow us away
The window for design firms to spit out flashy iPad 3 concepts is closing now that Apple has announced plans for an iPad event on March 7, but here's one late entry that's fun to ponder. Read More

Windows 8 offers no management help for ARM devices
Organizations looking to deploy Windows 8 on ARM-based (WOA) devices will have to do so without being able to manage them, according to a Microsoft advisory outlining the business benefits of the new operating system. Read More


WHITE PAPER: HP & Intel

CI for Dummies eBook
This book will help you understand why infrastructure convergence has been widely accepted as the optimal approach for simplifying and accelerating your IT to deliver services at the speed of business while also shifting significantly more IT resources from operations to innovation. Learn more

Microsoft's Azure cloud suffers serious outage
Microsoft's Azure cloud infrastructure and development service experienced a serious outage on Wednesday, with the system's service management component going down worldwide starting at 1:45 a.m. GMT. Read More

Alleged RSA crypto flaw hotly debated
Is the RSA cryptosystem flawed or is the recent sharp criticism of it the result of poor — or even malicious — implementation of key-generation techniques that appear to have rendered some RSA-based encryption keys crackable? Read More

Women Take Social Privacy More Seriously Than Men Do
Social media privacy awareness is increasing among Americans, according to a new study. However in the battle of the sexes, women trump men when it comes to locking down the privacy of profiles. Read More


WHITE PAPER: Tripwire

Protecting Your Data in Today's Threat Landscape
Today's threats to critical systems and valuable data come from more sources than ever—a ticked off employee who seeks revenge, or activists seeking to expose sensitive data. Learn More!

BYOD: There is no stopping employees' devices on your network
It used to be the IT department's answer was always no when an employee asked to use a personal device for work. IT often felt the risk was far too great to the company's network security to allow this. Read More

Riverbed teams with Akamai to boost SaaS performance
Anyone who has endured the painful wait of a slow-loading application is familiar with the frustration and lost productivity that follows. That's the problem that motivated Riverbed and Akamai to join forces for a new SaaS acceleration offering, with the objective of resolving SaaS application performance issues that were previously untouchable. Read More

Who do you blame when IT breaks?
There's always a reason why things break in IT, and the powers-that-be can usually find someone to blame -- be it an data center operations staff member, an OEM, a systems integrator or a third party service provider. Read More

Toolset lets mobile carriers meld core services with the Web
Unlocking the treasure trove of mobile carrier services and data for new mobile apps is getting a lot easier. And now, it's getting easier for the carriers themselves to "mash-up" those internal resources with external Web-accessible services from Facebook and others. Read More

Who needs Dancing with the Stars when we've got Dancing Android Robots?
These dancing Android Robots at Intel's Mobile World Congress booth in Barcelona really make me want to be there. Well, maybe I'm just as happy colleague John Cox took this trip for the team. (Video via AndroidCentral) Catch up on all the MWC news here. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. How to protect your privacy on Google
  2. 25 alleged Anonymous members busted by Interpol
  3. Windows Phone smokes its competition at MWC ... sort of
  4. Cisco bounces back
  5. Mobile World Congress 2012: This year's hottest gadgets
  6. 6 things you need to know about Google's new privacy policy
  7. IBM scientists discuss quantum computing breakthrough
  8. Tech debate: The future of end user computing
  9. Steve Jobs ignored Warren Buffet's advice for a stock buyback
  10. Windows 8 most burning questions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


[SECURITY] [DSA 2422-1] file security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2422-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
February 29, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : file
Vulnerability : missing bounds checks
Problem type : remote
Debian-specific: no

The file type identification tool, file, and its associated library,
libmagic, do not properly process malformed files in the Composite
Document File (CDF) format, leading to crashes.

Note that after this update, file may return different detection
results for CDF files (well-formed or not). The new detections are
believed to be more accurate.

For the stable distribution (squeeze), this problem has been fixed in
version 5.04-5+squeeze1.

We recommend that you upgrade your file packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJPTpUrAAoJEL97/wQC1SS+xjIH/RKCNTX9XDy9RmKnLubx5gME
e3MOWFZHk0ZOaNAuorRmyrxygbRkLPVMNECTKenv2eE1CORYIHBvzFDZXNn0Yl+9
+NS2KkmwpigU33Tu/8NfuG/xsoLl9fS1a3iJU+yVeEC14gdr0Nw5OtLzSP5C6HUS
KcXZRXQZoHs21SrdotBm0Lx86tmoluZ1QtWmlacJcFnGwMLi3sRBwkE57UufEgCj
dd8BD79tdVWm2YlPjnnfpG8Pe+ikq4tIxDHEKHfsFudUxgeSDAZaHjBvF/2xXrxn
nEjOjbCpaQT9hUaaBzAxFh10qPiKKV4oA3ueR1RZt/T8XMbTXJAM54NYutF2b7Q=
=kRH8
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/87aa41e4x7.fsf@mid.deneb.enyo.de

[SECURITY] [DSA 2421-1] moodle security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2421-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
February 29, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : moodle
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-4308 CVE-2011-4584 CVE-2011-4585 CVE-2011-4586
CVE-2011-4587 CVE-2011-4588 CVE-2012-0792 CVE-2012-0793
CVE-2012-0794 CVE-2012-0795 CVE-2012-0796

Several security issues have been fixed in Moodle, a course management
system for online learning:

CVE-2011-4308 / CVE-2012-0792

Rossiani Wijaya discovered an information leak in
mod/forum/user.php

CVE-2011-4584

MNET authentication didn't prevent a user using "Login As" from
jumping to a remove MNET SSO.

CVE-2011-4585

Darragh Enright discovered that the change password form was send in
over plain HTTP even if httpslogin was set to "true".

CVE-2011-4586

David Michael Evans and German Sanchez Gances discovered CRLF
injection/HTTP response splitting vulnerabilities in the Calendar
module.

CVE-2011-4587

Stephen Mc Guiness discovered empty passwords could be entered in
some circumstances.

CVE-2011-4588

Patrick McNeill that IP address restrictions could be bypassed in
MNET.

CVE-2012-0796

Simon Coggins discovered that additional information could be
injected into mail headers.

CVE-2012-0795

John Ehringer discovered that email adresses were insufficiently
validated.

CVE-2012-0794

Rajesh Taneja discovered that cookie encryption used a fixed key.

CVE-2012-0793

Eloy Lafuente discovered that profile images were insufficiently
protected. A new configuration option "forceloginforprofileimages"
was introduced for that.

For the stable distribution (squeeze), this problem has been fixed in
version 1.9.9.dfsg2-2.1+squeeze3.

For the unstable distribution (sid), this problem has been fixed in
version 1.9.9.dfsg2-5.

We recommend that you upgrade your moodle packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk9OiDwACgkQXm3vHE4uylo/hgCeJ3spjXWQ6u8IFGD46zvojo9q
uxwAn2rERp2dJLBEJBEE7ak0bJtONxjZ
=YNgS
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/20120229202234.GA30026@pisco.westfalen.local

GENBAND announces UC solutions at MWC

  3 questions for Microsoft's Windows Phone chief | Cisco brings Hotspot 2.0 carrier-network smarts to its Wi-Fi
 
  Network World Convergence and VoIP

Forward this to a Friend >>>


GENBAND announces UC solutions at MWC
Several news items this time coming from GENBAND from Mobile World Congress underway in Barcelona. GENBAND has unveiled a mobile app providing consumers with single screen management for unified communications, along with enhancements to the company's IP Multimedia Subsystem (IMS) platform. Read More


WEBCAST: VMware

Automating Infrastructure and Operations Management
Attend this webcast to learn how the new VMware vCenter™ Operations Management Suite allows IT to: - Dramatically simplify services - Automate service delivery and management View Now!

RESOURCE COMPLIMENTS OF: ShoreTel

ShoreTel Mobility ends the chaos of BYOD
Unlike most IP phone systems, ShoreTel was actually made just for IP. So where others offer built-in complexity & cost, ShoreTel builds in ease, scalability, and the industry's lowest total cost of ownership – guaranteed. See the difference.

3 questions for Microsoft's Windows Phone chief
Terry Myerson, head of Microsoft's Windows Phone division, made a cameo appearance at Nokia's Mobile World Congress 2012 press conference Monday, where Nokia announced a mid-priced Windows Phone, the Lumia 610. Myerson briefly talked about the new beta release of Skype for Windows Phone, about the fact that there are now 65,000 apps for the platform, and that handsets with the OS are now available in China and 27 other markets. He also discussed how Microsoft has lowered the system requirements for handsets, to create a broader range of lower prices. Read More


WHITE PAPER: Internap

New eBook: Enterprise IP Buyer's Guide
We are all aware of the impact performance can have on the bottom line. Organizations are increasingly choosing Website Performance Optimization (WPO) technologies to boost reliability, availability and their bottom line. Learn More

Cisco brings Hotspot 2.0 carrier-network smarts to its Wi-Fi
Cisco Systems announced its take on the reshaping of mobile networks that is emerging at this week's Mobile World Congress on Tuesday, saying it can build a Wi-Fi infrastructure spanning all the way from the access point to the core network. Read More


WHITE PAPER: APC

How Data Center Management Software Improves Planning
Business executives are challenging their IT staffs to convert data centers from cost centers into producers of business value. Data centers can make a significant impact to the bottom line by enabling the business to respond more quickly to market demands. Learn More

The astronomy and math behind leap day
Most of us have a general idea as to why today is Feb. 29 instead of March 1, but until this morning, I, at least, had not been well steeped in the nitty-gritty details (or had forgotten them from school). Writes Phil Plait, author of the Bad Astronomy blog: Read More

What's hot at RSA 2012
Read More

 
 
 

SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. How to protect your privacy on Google
  2. 25 alleged Anonymous members busted by Interpol
  3. Windows Phone smokes its competition at MWC ... sort of
  4. Cisco bounces back
  5. Mobile World Congress 2012: This year's hottest gadgets
  6. 6 things you need to know about Google's new privacy policy
  7. IBM scientists discuss quantum computing breakthrough
  8. Tech debate: The future of end user computing
  9. Steve Jobs ignored Warren Buffet's advice for a stock buyback
  10. Windows 8 most burning questions
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

WindowsNetworking.com - Introduction to System Center Operations Manager 2012 (Part 6) - Monitors

WindowsNetworking.com - RealTime Article Update

Hi Security World,

Title: Introduction to System Center Operations Manager 2012 (Part 6) - Monitors
Author: Scott D. Lowe
Link: http://www.WindowsNetworking.com/articles_tutorials/Introduction-System-Center-Operations-Manager-2012-Part6.html
Summary: In this, part 6, you will continue to investigate the OpsMgr interface and discover how monitors work.

Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowsNetworking.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsnetworking.com
Copyright © WindowsNetworking.com 2012. All rights reserved.

ISAserver.org - Publishing Microsoft SharePoint 2010 with Forefront TMG and different authentication options (Part 2)

ISAserver.org - RealTime Article Update

Hi Security World,

Title: Publishing Microsoft SharePoint 2010 with Forefront TMG and different authentication options (Part 2)
Author: Marc Grote
Link: http://www.ISAserver.org/tutorials/Publishing-Microsoft-SharePoint-2010-Forefront-TMG-different-authentication-options-Part2.html
Summary: This two part article series will explain how to use Microsoft SharePoint Server 2010 and Forefront TMG different authentication options to securely publish SharePoint to the Internet.

Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
ISAserver.org is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@isaserver.org

Copyright © ISAserver.org 2012. All rights reserved.

Miami Dolphins dive into cloud analytics

10 most powerful PaaS companies | Cisco takes first step in delivering on SecureX vision

Network World Network/Systems Management

Forward this to a Friend >>>


Miami Dolphins dive into cloud analytics
The Miami Dolphins teamed with IBM to deploy a cloud-based analytics system that helps stadium staff to be proactive about potentially disruptive events, such as parking bottlenecks, concession stand inventory shortages, and inclement weather. Read More


RESOURCE COMPLIMENTS OF: Ipswitch WhatsUp Gold

WhatsUp Gold - IT Management Made Simple
Wish you had a powerful, proactive monitoring and management solution to easily manage your network? WhatsUp Gold is at work on over 100,00 networks and is the most intuitive, comprehensive, and cost-effective network management solution available today. WhatsUp Gold is IT Management Made Simple. Try it free for 30 days!

WHITE PAPER: PC Mall

Networking and Cloud: An Era of Change
As you deploy cloud infrastructure and operating models in your organization, the role that networking plays and the impact of these models on your networks may not always be clear. This document discusses the importance of the network to cloud computing, why the network must change, and what Cisco is doing to lead these changes. Learn More!

10 most powerful PaaS companies
Platform-as-a-service is the least mature of the major cloud services categories. There are multiple types of PaaS, and vendors are playing in more than one sub-category, so it's not easy to tell the players without a scorecard. Here are 10 companies that have emerged as leaders in the PaaS market. Read More

Cisco takes first step in delivering on SecureX vision
A year Cisco put forward its vision called SecureX about how it would devise ways that its network products, first its firewalls, would be able to capture information related to user devices, especially tablets and smartphones, to exert context-based security control. Today, Cisco took the first step to deliver on that vision while acknowledging more needs to be done. Read More

Microsoft, Hortonworks to link Excel and Hadoop
Microsoft is developing a connector that will allow Excel users to download and analyze output from Hadoop, potentially opening the open-source data processing platform to a much wider audience. Read More


WHITE PAPER: BMC

Looking Ahead: A Cloud Report from 2015
BMC CIO, Mark Settle, looks to the future and describes how he envisions cloud computing will evolve by 2015. The world of underutilized servers, security concerns, long provisioning cycles and spending 60% of the IT budget on application maintenance, data center operations, and facility expenses are history. Read More

Kansas City businesses dream big with Google Fiber, despite uncertain availability
Businesses in Kansas City have some big ideas for Google's new fiber network, although they still don't know if they'll be able to use it once it goes online. Read More

What's hot at RSA 2012
See the cool new products being unveiled at RSA 2012. Read More

Wireless network demands push carriers to innovate
Executives from three wireless carriers offered testimony Tuesday showing how an explosion of wireless users and devices are forcing them to expand their networks without necessarily the promise of revenue growth to keep up. Read More


WEBCAST: NetIQ

Disaster Recovery Planning and the Cloud
Find out how virtualization is the stepping stone to the cloud and how to leverage virtualization technologies today to reduce the cost and improve the performance of your disaster recovery plan. Learn More!

Quick look: Silicon Valley's wicked young CEOs
Silicon Valley youngsters get lots of money for new, innovative Internet companies. Read More

IT execs must shift security approaches
IT security executives must secure what they cannot directly control to properly protect enterprise data in the coming years. Read More

Using forensics to deeply understand the security impact of iOS and Android in the enterprise
When smartphones first emerged many IT organizations didn't recognize the risk they posed. That changed rapidly, of course, and today these devices are changing the risk profile for organizations because they introduce threats to sensitive company information. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Steve Jobs ignored Warren Buffet's advice for a stock buyback
  2. Windows 8 most burning questions
  3. Cisco bounces back
  4. 6 things you need to know about Google's new privacy policy
  5. IBM scientists discuss quantum computing breakthrough
  6. Make way for iPad 3: Best Buy slashes iPad 2 prices
  7. What's hot at RSA 2012
  8. Windows 8 quiz
  9. IBM's molecular images may help nanoscale circuits
  10. Cisco: "We've never been more relevant"

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **