Thursday, June 5, 2008

Bluetooth, IE to get critical Microsoft patches - NetworkWorld.com

Microsoft bes after to publish seven sets of security spots next week, including critical holes for DirectX, Internet Explorer
and Bluetooth radio software system for Windows.

The updates are owed Tuesday, the twenty-four hours Microsoft had previously scheduled to let go of its security patches. Fixes are also slated
for Active Directory, the Windows Internet Name Service (WINS) and the Matter-Of-Fact General Multicast (PGM) protocol, used by
Windows to watercourse mass media to many recipients. These updates are all rated "important." Don't Miss!

A 7th update, rated "moderate," is listed as a "Kill Bit" update for Windows. This type of spot will disable codification that
is known to have got a security bug.

"The Kill Spot will more than likely be for a third-party application," said Saint Andrew Storms, manager of security operations
with security seller nCircle. Related Content

Lately, Microsoft's security grouping have got had to pay more than attending to software system that tallies on top of Windows, as aggressors have
increasingly looked to merchandises like QuickTime, Adobe's Flash and other mass media participants when devising their attacks.

Last Friday, Microsoft warned that a widely publicized flaw in Apple's Campaign browser could be combined with another Microsoft
bug to allow aggressors run unauthorised software system on a victim's PC.

It's not clear whether Microsoft bes after to piece that bug. The IE update could include a fix, although it's unlikely that Microsoft
have had enough clip to run this software system through its testing process, Storms said.

It is unusual for Microsoft to piece Bluetooth, a communications protocol used to link devices like headsets to Windows, but added that
"the more than interesting inquiry is will this spot and/or the bug widen into Windows mobile where it will more than likely
have got a greater impact?"

Microsoft announced the planned spots in a posted to its Web land site on Thursday.

The IDG News Service is a Network World affiliate.

Enterprise 2.0 Conference Preview: Sony Gets Wiki With It - InformationWeek




Companies cognize they necessitate to join forces more than effectively. They just don't cognize how to make it. The issue will be discussed in depth at the approaching in Hub Of The Universe June 9 - 12, where a assortment of talkers will turn to how to accommodate the demand to share information with the demand to protect it.


Among those describing how they made Web 2.0 engineerings work in an endeavor scene will be Ned Lerner, manager of tools and engineering for Sony Computer Entertainment's Worldwide Studios. Alan Jay Lerner bes after to share some of that thought at the in back-to-back sessions on the . He'll be participating in "Real Enterprise 2.0 @ Sony Computer Entertainment's World Wide Studios" (10:10 am"10:30 am ) and "Enterprise 2.0 World Check" (10:45 am"11:25 am).

More Internet Insights
White Papers

Enterprise 2.0 Conference Resources


• • • • • •


Of all the companies that demand to work together more than than effectively, perhaps none necessitates to make so more than Sony. Just inquire Sony's boss.


At a recent company meeting in Tokyo, as the states it, Sony chief executive officer Leslie Howard Stringer called for corporate directors to acquire mad, to be bolder, more than than energetic, and more ingenious in how they run the company's assorted businesses.


Stringer is three old age into an attempt to reconstruct Sony's leading as a shaper of high technical school merchandises and to do the company's assorted units of measurement work more efficiently together. His attempts are showing marks of success.


Beyond the close tripling of net income reported in the company's most recent quarter, it's unclutter that some Sony directors are already comfy devising the bold, ingenious moves that Stringer demanded.


Ned Alan Jay Lerner is one of them. He pulls off the technology squads that manage Web 2.0 coaction technologies, coding, and content tools used by the company's game developers.


Lerner have been with the company for about four and one-half years. When he arrived, he said, there wasn't an substructure for cooperation and collaboration. He said that Sony direction wanted to do the procedure more than efficient and more easily able to share software system resources.


So Alan Jay Lerner drove the development of SHIP, which stand ups for Sharing Information Portal. It's not a big endeavor coaction suite. It's a aggregation of mostly unfastened beginning endeavor coaction applications. It includes Atlassian Jira and Confluence, Swing Forms and Swing Wildfire, SourceForge Enterprise Edition, Subversion, and the Perforce Software Configuration Management System.


This is not your father's endeavor software. It's quick, dirty, DIY, Web 2.0 stuff.


Developers, said Alan Jay Lerner "don't desire individual from the IT section involved because by the clip they acquire the IT resources dedicated, they have got the meetings, the IT person figs out what's going on and makes the customization work, who cognizes how long that's going to take? If you have got to convey in the IT expert every clip you seek to do a change, you're going to be given not to do any. So a batch of these [applications] are basically self-service."

Wednesday, June 4, 2008

McAfee Names The Most Dangerous Domains - InformationWeek




Web land land sites registered in top-level spheres tied to Hong Kong (.hk), People'S Republic Of China (.cn), and the Republic Of The Philippines (.ph) are the most likely to present a security menace to visitors, according to a released on Wednesday by .


McAfee's distills information from 9.9 million Web sites in 265 top-level Internet domains -- generic 1s and national ones. From that information, a listing of 74 spheres containing at least 2,000 land sites was compiled and rated for hazard based on the prevalence of malware.

More Internet Insights
White Papers


The study happens that 19.2% of all .hk Web land sites present a security menace to Internet users. For .cn Web sites, 11% present a security threat. For .ph, Web sites, 7.7% present a danger. For the .ph domain, it was a 270% addition in overall hazard from 2007, substantially higher than other domains.


The fact that a top degree Internet have a peculiar geographical association makes not intend that the at that or people responsible for the are located in that region.


Last year, spheres associated with the South Pacific Ocean island Tokelau (.tk) ranked as the riskiest Internet existent estate.


Jeff Green, SVP of merchandise development and McAfee Debar Labs, said in A statement that last year's study prompted sphere decision maker for .tk, a Dutch company, to re-examine its policies. This year, .tk is notably safer, commanding 28 out of 74.


The policy re-examined was the determination to offer limitless free anonymous enrollment of .tk domains, according to McAfee's report.


Among generic top degree domains, .info is the riskiest, with 11.73% of land sites flagged by McAfee. For the .com domain, that figure is 5.26%. The safest generic sphere is .gov (0.05%).


The overall prevalence of codification on Web land sites -- one factor of respective used to cipher overall risk-- stays relatively low at 0.07%. Thus, in 10,000 visits, seven land sites on norm would expose the visitant to a possible computing machine infection. Whether or not the visitor's computing machine became infected would depend on the virulency of the and on the security software, settings, and features of the machine in question.


Web land sites in certain domains, however, transport a far higher hazard than average. For example, McAfee establish malware on 1.1% of all Web land sites in the .ro (Romania) domain, a per centum 15 modern times higher than average.


The top five spheres ranked in footing of the prevalence of unsafe downloads are .info (21.95%); .ro (14.18%), .ws (12.5%); .biz (11.64%); .cn (10.75%).


"Vast parts of the Web are quite safe to visit, but many vicinities -- large 1s and little 1s -- set every visitant at hazard of an online mugging," McAfee's study concludes. "Whether that onslaught come ups in the relatively mild word form of a pop-up trap or something extremely serious like an unintentional experience with a keystroke logger, the Web is dangerous."


To extenuate that danger, McAfee, which sells security software, humbly proposes investing in "an up-to-date security suite."

IVT Announces Launch of Its New BlueSoleil Linux Version for Ultra Mobile PCs

TAIPEI, Taiwan, June 2 /Xinhua-PRNewswire/ -- IVT, the human race leading Bluetooth engineering specialist, denotes it have ported its popular Bluetooth application software, BlueSoleil 5.0 on Windows XP/Vista onto the Linux Operating System (kernel 2.6 or above), providing Linux users with the same expression and experience graphical user interface and functionalities. IVT will show it at Capital Of Taiwan Computex, June 3-7 in Bluetooth Pavilion.

Tuesday, June 3, 2008

Yahoo annual meeting to weigh Icahn's bid

sfgate_get_fprefs();

Yahoo Inc. said Tuesday that it bes after to throw its yearly meeting on Aug. 1, starting the countdown to an epic poem conflict with billionaire investor Carl Icahn.

Shareholders will make up one's mind who will command the Sunnyvale Web giant, which is facing intense examination in the aftermath of a failing coup d'etat command by competing Microsoft Corp.

Icahn is hoping to replace Yahoo's board, which he impeaches of bungling the negotiations, and restart amalgamation talks. Yahoo's managers are touting a three-year corporate makeover program in hopes of holding onto their seats.

The result of the fight, known as a placeholder contest, will largely find Yahoo's fate. Although still profitable, the Internet innovator have stumbled lately in the human face of stiff competition from industry leader Google Inc. of Mountain View.

In a taste sensation of the bare-knuckle tactics to come up in the placeholder campaign, Icahn told the Wall Street Diary in an interview published online Tuesday that he bes after to take Yokel chief executive officer Kraut Yang if he is successful in gaining control of the company. Icahn accused Yang and his chap board members of trying to undermine Microsoft's $47.5 billion coup d'etat bid, which he believes Yokel should have got accepted.

Icahn's remarks were spurred in portion by the release of tribunal written documents detailing a Yokel employee rupture program that would have got significantly increased the cost of an acquisition. The package, outlined in an investor suit, was set into topographic point shortly after Microsoft's amalgamation proposal and despite some concerns about the cost from Yokel employees and outside advisers.

Microsoft abruptly withdrew its amalgamation proposal May 3 after a three-month standoff when the two sides couldn't hold on a price.

Yahoo responded to Icahn's onslaught on Tuesday by saying in a statement: "Yahoo's board of directors, including Kraut Yang, have been crystal clear that it would see any proposal by Microsoft that was in the best involvements of its shareholders," while adding that "Mr. Icahn's averments disregard this clear factual record."

Initially, Yokel put its stockholder meeting for July 3, but then postponed it last month, saying regulators needed more than clip to reexamine the paperwork related to the placeholder contest. The hold bought Yokel some time, although it's unclear whether the other calendar month will assist the company addition stockholder support for the meeting, to be held at the Fairmont hotel in San Jose.

Several hedgerow funds, including one controlled by legendary billionaire investor T. Daniel Boone Pickens, have got recently bought billions of Yokel shares and program to vote in support of Icahn's slate of directors. Others on Icahn's slate include Dallas Mavericks proprietor Mark Cuban, former Viacom chief executive officer Frank Biondi and New Line Film co-CEO Henry Martin Robert Shaye.

In regulating filings, Yokel have urged its investors to back up the current nine-member board. In a regulating filing Tuesday, Yokel said two stockholders other than Icahn also had notified the company that they intended to put up themselves to the board. A 3rd stockholder said that he planned to put up a slate of nine directors, not including himself.

But Yahoo, which did not name the shareholders, said that they had failed to follow with the company's bylaws and therefore their campaigners might not be included in the approaching election. The deadline for nominations was May 15.

In related to news, Yokel have restarted negotiation with Microsoft about assorted advertisement partnerships, but not a full takeover.

E-mail Jules Verne Kopytoff at .

Zayed University launches 3 new graduate programs

Dr. Sulaiman Aluminum Jassim Frailty President of Zayed University said:

'Capitalizing on ambitious academic programmes and an exceeding international faculty, the College of Information Technology and its esteemed international spouse Saint George American Capital University in American Capital , District of Columbia offering the Maestro of Science in Information Technology with a specialisation in Cyber Security, the Alumnus Certificate in Information Security, and the Alumnus Certificate in High Technology Crime Investigation.' He added: 'Admissions to the 3 alumnus programmes is unfastened to males and females of all nationalities, and appliers will be evaluated by completion of an undergraduate grade in IT, MIS, Business or any related to field from an accredited university, in improver to have got English proficiency to pull off a challenging, fast-paced program.' On his portion Dr. Leon Jololian Acting Dean of College of Information Technology announced: ' The Maestro of Science (M.S.) inch Information Technology (Specialization in Cyber Security) focuses on the development of concepts, cognition and accomplishments that volition enable successful participants to go experts in the country of information security, cyberspace law-breaking prevention, and digital law-breaking investigation. The end of this programme is to develop highly qualified technical experts to ran into the demands of the national, regional and international workplace for information and web security.' He added: 'The Alumnus Certificate in Information Security takes to set up IT people to develop and pull off the physical and technical substructure necessary to procure critical information assets at all degrees within an organization. In order for the U.A.E. to keep its IT leading in the region, this type of expertness will be indispensable for the enlargement of e-commerce and e-government services in the region. Graduates of the programme will be prepared to detect, forestall and extenuate menaces to systems and information in order to protect the critical information substructure of the U.A.E.' 'While the acquisition results of the 1 twelvemonth portion clip programme of the Alumnus Certificate in High Technology Crime Probe will alumnus pupils with the wide and in-depth knowledge that set ups IT people to execute computing machine forensic investigations.' Dr. Leon explained : 'The addition of high engineering law-breaking have generated an pressing demand for a new type of research worker who can compound the scientific discipline of information engineering and forensic scientific discipline with the fine art of probes and critical thinking. Today, any law-breaking that affects a computing machine as a portion of the crime, as the law-breaking itself or as the storage topographic point for evidence, may be portion of an investigation.' He added: 'This is a critical demand for the U.A.E. and the Gulf region. Graduates of the programme will be prepared to work in local, state, national and international organisations in the public and corporate sectors. They will have got the accomplishments to look into a assortment of lawsuits that include personal identity theft, fraud, kid exploitation, money laundering and violent crimes.'

Monday, June 2, 2008

Google Diplomats Bend Free Expression to Preserve Global Power

When Kingdom Of Thailand blocked 's
YouTube Web land site last year, the company dispatched deputy
general advocate to assist reconstruct access. In Bangkok,
a sea of yellowish shirts stunned her.

It was a Monday, when Thais wear yellowness to honour King. Seeing their reverence, Wong states she
grasped why functionaries reacted so strongly to a mental image blending a
picture of Bhumibol with graffito -- an image that ran afoul of
a law against abusive the 80-year-old monarch. Google agreed
to barricade the cartridge holder in Kingdom Of Thailand while leaving it available
elsewhere, and YouTube returned to Tai computers.

Welcome to the civilization clangs that Google and other U.S.
Internet companies are navigating from Kingdom Of Thailand to Turkey and
China to Pakistan. The proprietor of the world's most popular online
search and picture land sites is learning to dwell with states that
''don't share the same baseline'' about the Web, Wong, 39, says
in an interview at Google's Mountain View, California,
headquarters. These authorities prohibition obnoxious material
because they ''don't cognize how else to command it.''

The Internet superpower's corporate diplomatic negotiations is
establishing far-reaching practices to maintain online content, and
advertising dollars, flowing across borders. 's
ambassadors, a aggregation of lobbyists and lawyers, are
traveling the Earth to estimate what authorities will endure --
and showing a preparedness to flex America's precious belief in
free expression.

'Multinational Environment'

''The impression that companies chartered in the United States
do things in other states they would never daydream of doing in
the United States is discomforting, obviously,'' states John
Palfrey, executive manager director of the at Harvard University University in Cambridge, Massachusetts. ''I think, though, this is the world of doing concern in a
multinational environment, joined by a common technological
network, which is the Internet.''

China, with an estimated 230 million people online, has
been at the centre of the Web freedom controversy, especially
since , Google's rival, turned over e-mails and
other information to the Chinese authorities in 2006, leading to
the imprisonment of journalist Shi Taoist and author Wang
Xiaoning.

''While technologically and financially you are giants,
morally you are pygmies,'' then-House Foreign Personal Business Committee
Chairman told Yokel executives, including founder
and main executive director military officer , during a 2007 hearing.

Financial Support

Yahoo, based in Sunnyvale, California, apologized,
provided fiscal support to the prisoners' households and asked
the U.S. to discourse their predicament with China.

In response to the Yokel fiasco, Google decided not to
offer Gmail, its popular e-mail service, in People'S Republic Of China to avoid
government demands for messages. To forestall breaks to its
Chinese operations, the company keeps regular contact with
officials through its business office in Beijing.

Those neckties are too cosy for some. Two old age ago Google
created a version of its hunt engine -- -- that
produces Chinese government-sanctioned stuff when people
inside People'S Republic Of China seek anything on Tibet, China or Tiananmen
Square.

''Even though Google and other companies now supply a
disclaimer to advise users that censoring occurs, they still
decide what to ban and whether they will even dispute the
government's actions,'' of New York-based Human
Rights Watch told a U.S. Senate panel on May 20.

Communication Scheme

Robert Boorstin, A former New House Of York Times newsman who
shapes communicating scheme for Google from Washington, says
the company was ''given a pick to open up a public library in
the word form of Google.cn'' Oregon be close out of the country.

''We knew that users of the Google Chinese service would
not be able to see a small, of import portion of the library,'' he
says. ''But the option was no library card game for anyone.''

Customers in People'S Republic Of China and other states are increasingly
important for U.S. Internet companies: 48 percentage of Google's
came from outside the U.S. last year, up from 39
percent in 2005.

''Our end is to maximise free expression,'' Boorstin
says. ''But you confront these states of affairs where authorities come up to
you and say, 'you are violating our laws.'''

Google have blocked pictures in Turkey that depicted the
founding father of the republic, , arsenic gay. Republic Of Indonesia briefly close down entree to YouTube because of a
short movie by a Dutch lawmaker that provoked Moslem protests.

Endorsement

David Gross, the U.S. government's coordinator for
international communication theory and information policy, endorses
Google's approach.

''We believe, of course, that companies necessitate to respect
domestic laws,'' Gross states in his State Department office. ''Having said that, finding technical solutions that don't
disadvantage those who dwell outside those states is very
important.''

Some say Google is in a alone place to take a tougher
line in its Web diplomacy.

''Google May be the first physical thing world have ever known
with the planetary economical powerfulness and societal influence to take the
ethical high route and to handle free and unfastened look like a
moral absolute,'' states , a Brooklyn Law School
professor and lawyer for Internet and telecommunications
clients.

''If Google doesn't have got got the wherewithal to exercise its
influence for the good of humanity, I don't cognize who will have
the courageousness going forward,'' he says.

To reach the newsman on this story:
in Mountain View, California, at