Date: Tue, 11 Jan 2005 13:17:43 -0500 (EST)
From:"NWC Online" <NetworkComputing@update.networkcomputing.com>
Subject: Network Computing Online #2.87
-- Network Computing Online #2.87 --
Your Online IT Resource
http://www.networkcomputing.com/
Tuesday, January 11, 2005

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

Join InformationWeek for a FREE, on-demand TechWebCast on
Service Management Under Pressure:Evolution Is Not Optional.
Register to receive a free personalized IT Service Management
assessment from Peregrine and watch the webcast to learn the
benefits associated with each level of IT Service Management.
Register and view now:
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0CfCH0Ae


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._


Here's what's cooking on NWC Online this week!

1) The Daily Blog
    - Wireless Rumors
    - New 'Tsunami' E-mail Scams Latest Low
2) YackITyYack
    - Top 11: Danke Schoen!
    - Affordable IT Archive
    - Letters
    - Managing Content Newsletter
    - Subscribe Today!
3) Calling All Readers
    - IT Exam: Application Security
    - Call for Entries: 2005 Predictions
    - Call for Votes: Best Top 11 Vote
    - E-poll: E-mail Archiving Solutions for the Enterprise
    - Network Magazine's Innovation Awards
4) Editors' Picks
    - Verity Gets DralaSoft: Simpatico or Strange Bedfellows?
    - Ultrawideband Shows Its Potential at CES
    - Web Services' Minority Report
    - Convergence up Close
    - Intel Strikes up the 'Out-of-Band'
    - Featured White Paper: Building Robust Storage Systems
5) Download Mania
    - Minos Lock 1.62
    - My WinPopup Express 2005
6) Eye on Security
    - Alertcon: Linux Kernel
    - Security Threat Watch: Multiple IBM DB2 Vulnerabilities
7) Coming Events
    - Enterprise Mobility: Strategies for Developing a Wireless
       Workforce
    - Enterprise Infrastructure: Dealing with the Dynamics
    - Deploying Performance Management to Drive Efficiencies & Lower
       Costs
    - Gain Maximum Business Value From Your Outsourcing Relationship

Look for the next Network Computing Online newsletter on Tuesday,
January 18, 2005!


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

1) The Daily Blog

a) Wireless Rumors
The security consolidation rumor-mill is at it again, this time 
renewing
the notion that Airespace is about to be purchased by Cisco. I made 
some
calls, and it seems like this is a rumor that's at the very least ahead
of the facts. While they wrapped everything in standard "We can't
confirm anything" language, I didn't get the impression that a purchase
is happening in the next couple of weeks.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7XP0AM

b) New 'Tsunami' E-mail Scams Latest Low
A sign that there are some truly despicable individuals in the world (I
refrain from using humans). A new e-mail scam reaching inboxes is that
of fake requests for help from "Tsunami victims." The messages ask for
donations through a Web site or an offshore bank account. Of course, 
the
money never reaches the real survivors.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7XQ0AN

Read more entries from The Daily Blog.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0B5MU0AD

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

2) YackITyYack

a) Top 11: Danke Schoen!
This week, we're after your funniest submissions for the "Top 11 
reasons
Wayne Newton would make a great IT professional." Make us burst a
rhinestone button, and we'll publish your entry in print and online.
Here are a couple of ideas to get you going. Good luck!
--When confronted with technical goof, can easily diffuse situation 
with
heartbreaking rendition of "Danke Schoen."
--Highly proficient in twirling microphone cable--it's the same as 
CAT5,
right?
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0CEhF0Ag

b) Affordable IT Archive
We've recently created a new article index for all our Affordable IT
coverage. Help your 2005 IT budget stay in-line with our handy archive
of how-tos, reviews and pointers on the products and practices that 
will
save you money.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Kh0AX

c) Letters
Thanks to all those who submitted letters in response to Rob Preston's
recent "Down to Business: Offshore Outsourcing Prevention Starts at
Home" column. Check out what your fellow readers had to say.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Ki0AY

Got more to say! Send your letters to Rob here:
(mailto:editor@nwc.com)

d) Managing Content Newsletter
Tired of wrangling unstructured data? Let industry veteran Doug
Henschen, in his newly launched Managing Content newsletter, bring you
valuable insights, opinions and pointers on important objectives 
ranging
from content reuse and multichannel publishing to content-enabling
applications and business process management. Subscribe today!
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Kj0AZ

e) Subscribe Today!
Subscribe to the full print edition of Network Computing! Click below 
to
see all the magazines in the Network Computing Enterprise Architecture
Group.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Kk0Aa

Already a print subscriber to Network Computing? Guarantee continued
delivery today by renewing your complimentary subscription.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Kx0An

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

3) Calling All Readers

a) IT Exam: Application Security
Put your application security savvy to the test with our new IT Exam. 
Do
you know how many vulnerabilities lurk within 1,000 lines of code? Do
you know which application attack method is most common and most
effective? Let us rate your current readiness and know-how.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Kl0Ab

b) Call for Entries: 2005 Predictions
Help us ring in the New Year with your most likely and unlikely
networking predictions for 2005. Tell us what will most certainly take
place in IT in 2005 as well as what you'd like to see happen if you had
your druthers.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C3A20AP

c) Call for Votes: Best Top 11 Vote
Now that 2004 has come to a close, we invite you to cast your vote for
the year's best Top 11 list. Was it Steve Balmer's secret iPod music
stash, the many ways a Roomba robotic vacuum could improve your IT
department or the best 'MacGyver Methods' for restoring power to the
server closet? Cast your vote today.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C45x0AO

d) E-poll: E-mail Archiving Solutions for the Enterprise
Network Computing's editorial team needs your help. We are currently
evaluating real-time e-mail archiving solutions for the enterprise to
find out how e-mail archiving systems work in real life and whether you
have taken or plan to take the plunge. Data collected will be used to
support an upcoming article we are planning on enterprise-level e-mail
archiving systems.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C6ge0Av

e) Network Magazine's Innovation Awards
Vendors, now is the time to nominate your best products and
technological innovations from 2004. Our editors will then select the
Most Influential Innovation, Best Value and Most Visionary Innovation
across 10 technology categories. To nominate a product, product
enhancement, or technology demonstrated or released in 2004 for a
Network Innovation award, visit:
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C57G0Ac

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

4) Editors' Picks

a) Verity Gets DralaSoft: Simpatico or Strange Bedfellows?
Verity is fast becoming a one-stop-shop for ECM vendors and other
developers requiring content capture, workflow and search components.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Kp0Af

b) Ultrawideband Shows Its Potential at CES
Manufacturers and developers of silicon for ultrawideband are flocking
to Las Vegas to demonstrate their designs in various prototypes and
products at the Consumer Electronics Show.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C67N0Ak

c) Web Services' Minority Report
With XML and SOAP messaging, developers can streamline business
processes, automate the supply chain--and kill the network.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7XR0AO

d) Convergence up Close
These real-world BPM, text mining and EII deployments demonstrate the
value of uniting data and content. But which technologies are ready for
your enterprise?
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7XS0AP

e) Intel Strikes up the 'Out-of-Band'
Intel is developing technology to provide more ways to leverage
out-of-band system controls.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7XT0AQ

f) Featured White Paper: Building Robust Storage Systems
Storage has come a long way from the simple direct-access storage of
single hosts and disks. Network storage systems offer scalability,
reliability and numerous other advantages. However, these advantages
come with greater system complexity. Read this Sleepycat Software white
paper to learn how to work with the many software and hardware
components.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7XU0AR

See all new white papers, Webcasts, case studies and product 
information
in the Network Computing Tech Library.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0CmRv0Am

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

5) Download Mania: Select Files From IT Pro Downloads

a) Minos Lock 1.62
Minos Lock is file security software that can hide or encrypt any 
number
of files, folders and documents in seconds. Folders and files are
protected with a password when you log into the ABC Lock program.
Protected files are undeletable, hidden and highly secured.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C6o60AI
Size: 2,198k
Platform: Windows
Licensing: Shareware

b) My WinPopup Express 2005
My WinPopup Express is a software package for writing and exchanging
messages within your local network. Secure (not connected to the
Internet), reliable and easily accessible, this software is available
for all versions of Windows and allows you to send and receive short
messages instantaneously to and from all other users of your network.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C6o70AJ
Size: 3,366k
Platform: Windows
Licensing: Shareware

Note: By using IT Pro Downloads you agree to these terms of use.
http://www.nwc.com/itpro/itpro-terms.html

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

6) Eye on Security

a) Alertcon: Linux Kernel
Linux kernel versions 2.4 through 2.4.29-rc2 and 2.6 through 2.6.10
could allow a local attacker to gain elevated privileges on the system
as a result of a vulnerability in the uselib Linux binary format 
loaders
functions. A local attacker could exploit this vulnerability to gain
root privileges on the system.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0Btri0AD

b) Security Threat Watch: Multiple IBM DB2 Vulnerabilities
Last week, we reported two IBM DB2 vulnerabilities. This week, the same
group that discovered and reported last week's DB2 vulnerabilities has
reported nine more DB2 bugs. DB2 administrators should definitely 
ensure
that their local installations are patched.

For more information.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7XV0AS
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7XW0AT
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7XX0AU
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7XY0AV
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7XZ0AW
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Xa0Ad
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Xb0Ae
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Xc0Af
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Xd0Ag

For more security alerts and information, sign up for our free Security
Threat Watch newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0CCEc0AY

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

7) Coming Events

a) Enterprise Mobility: Strategies for Developing a Wireless Workforce
Wednesday, January 12, 2005
11:00 AM PST / 12:00 PM CST / 1:00 PM EST
Wireless devices and the local-area networks that support them are
potential weak spots in enterprise security infrastructures. And with
the increasing functional density of wireless devices, the risks have
increased. But with new applications and the hopes of achieving 
realized
benefits of a mobile workforce--increased productivity, enhanced
connectivity--many companies are doling out network access without a 
set
plan in place. Join us and learn some of the security steps, including
monitoring, authentication, deployment policies and their enforcement,
that you can take to preempt problems with wireless access.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C4570AJ

b) Enterprise Infrastructure: Dealing with the Dynamics
Thursday, January 13, 2005
9:00 AM PST / 11:00 AM CST / 12:00 Noon EST
The process of standardizing enterprise computing infrastructure has 
the
potential of bringing substantial benefits to businesses and
organizations of all sizes. Depending on the approach chosen,
organizations can reap important cost-saving benefits such as matching
computing resources more closely to changing enterprise requirements,
simplifying and centralizing management, and optimizing resource
utilization rates.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C4580AK

c) Deploying Performance Management to Drive Efficiencies & Lower Costs
Wednesday, January 19, 2005
11:00 AM PST / 1:00 PM CST / 2:00 PM EST
Participants will learn how performance management methodologies and
solutions are helping insurers and other financial institutions improve
their performance and profitability while taking risk into
consideration. You will also gain insight into the power of integrating
the general ledger, account, transaction, customer and statistical
analysis data together to truly understand profitability across the
enterprise. Register now and learn more about how performance 
management
can help your organization improve the bottom line.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Ks0Ai

d) An InformationWeek Vendor Perspectives TechWebCast: Gain Maximum
Business Value From Your Outsourcing Relationship
Thursday, January 20, 2005
11:00 AM PST / 1:00 PM CST / 2:00 PM EST
Whether your company sees IT as a strategic weapon or simply as a
"business enabler" or cost center, the outsourcing model has tremendous
appeal. Yet along with the benefits of outsourcing come added 
complexity
and risk. The cost savings achieved from outsourcing can be more than
offset by the business cost of frustrated customers and end users as a
result of poor-quality applications. Register and receive guidance on
how to establish "strategic sourcing" relationships that deliver 
maximum
business value.
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0C7Kt0Aj

.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._

Join InformationWeek for a FREE, on-demand TechWebCast on
Service Management Under Pressure:Evolution Is Not Optional.
Register to receive a free personalized IT Service Management
assessment from Peregrine and watch the webcast to learn the
benefits associated with each level of IT Service Management.
Register and view now:
http://update.networkcomputing.com/cgi-bin4/DM/y/elWz0GPvuP0G6u0CfCH0Ae


.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._


Put Us On Your White List
Don't let an over-eager e-mail filter bounce the Network Computing
Online newsletter! Our address:

NetworkComputing@update.networkcomputing.com

needs to be in your address book or on your anti-spam white list. Ask
your admin or ISP how to do this, or check your anti-spam utility
documentation.

As always, we welcome your feedback about our newsletter. Please feel
free to message us directly if you have any comments or questions
(mailto:nwconline@cmp.com).

Important subscription contacts:
CMP Media LLC
600 Community Drive
Manhasset, NY 11030

Change your e-mail address.
http://networkcomputingsubscriptions.com/customerservice/

Unsubscribe.
http://networkcomputingsubscriptions.com/customerservice/

Sign up for your own issue of this newsletter.
http://www.submag.com/sub/nc?wp=wpdly2

Subscribe to Network Computing newsletters.
http://www.submag.com/sub/nc?wp=wpdly2

Still not receiving your own FREE subscription to Network Computing
Magazine?
http://networkcomputingsubscriptions.com/customerservice/

Note: This newsletter utilizes dynamic URLs. For more information,
please refer to our privacy policy.
http://www.doubleclick.net/us/corporate/privacy

Copyright (c) 2005 Network Computing, a CMP Media LLC publication
http://www.nwc.com/

This message powered by DARTmail
http://www.doubleclick.net/us/corporate/privacy