Monday, July 4, 2011

McAfee releases Android end point security solution

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
McAfee have announced McAfee Mobile Security software, available for both smartphones and tablets, which according to a recent press release provides a comprehensive mobile security solution by combining three leading McAfee mobile security products: WaveSecure, VirusScan Mobile and SiteAdvisor® for Android.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

With McAfee Mobile Security, consumers can now access the following features and functionality in a single download:
Backup and restore data to help protect sensitive information and irreplaceable photos. Even if the device is missing, it can be backed up before it is wiped clean of information.Protection against misuse (such as excessive phone charges) as well as safeguarding personal data with remote locking capabilitiesAn audible alarm to help users find the device or disrupt a thief, and send a pop-up notification with instructions for returning the deviceRemotely remove data from a lost or stolen device via the McAfee Web portal, mobile Web portal or via a SMS message from a buddy device24/7 real-time anti-malware protection against viruses, worms and spyware, Trojan horses and battery-sapping malwareProtection from malicious Web sites, phishing, identity theft, and credit card fraud when shopping online. SiteAdvisor software for Android provides color-coded site ratings right next to the search results, allowing Android users to confidently browse and search the mobile Web.Management of mobile device protection allows consumers to quickly execute needed security tasks, backup, locate, wipe, etc. via the McAfee Web portal and simple device interfaceAll backed by McAfee Labs with its 24/7 global presence and dedicated team of threat researchers
android mobile securityThe WaveSecure Tablet Edition offers Android users with WiFi the ability to find their missing device with alarm and location tracking, prevent misuse with remote lock and wipe and preserve important memories and personal data with remote backup, even from a lost or misplaced device.
Not unlike the Apple ‘Find My iPhone’ app, Android users can also trigger an audible alarm to help them find the device or disrupt a thief, and send a brief SMS message with instructions for returning it.
“With device growth eclipsing PCs, consumers need tools to not only protect their personal information, but also to provide safeguards for business data should they decide to use that device for work,” said Todd Gebhart, executive vice president and general manager of consumer, small business and mobile, McAfee.
“It’s far too easy to leave a mobile device in a cab or at the airport, which can mean lost photos, contacts and other important content. Also, the threats to mobile devices are in many ways the same as in the online world. Beyond device loss or theft, users can be hacked, infected or phished on a mobile device just as easily as they can online.”
Both applications offer a trial period, McAfee Mobile Security is then available for an annual subscription fee of $29.95.

View the original article here

Mobile Security Update - AnyConnect released to the Android market

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
Cisco has followed up its release of the AnyConnect VPN client for Apple iOS devices with the launch of Cisco AnyConnect for Samsung. Available from June 27 2011 AnyConnect is supported on the following devices:(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

Galaxy S model GT-I9000 (Gingerbread Maintenance Release)Galaxy S model SC-02B (Gingerbread Maintenance Release)Galaxy S II model GT-I9100Galaxy S II model SC-02C
AnyConnect is also supported on Tab 7 running Android 2.3.3+ or Galaxy Tab 8.9 running Android 3.0+.
Android images must be official carrier or Samsung provided versions, and not home-brew or third-party builds of Android.
Cisco AnyConnect provides reliable and easy-to-deploy encrypted network connectivity from Samsung Android devices by delivering persistent corporate access for users on the go. This includes native application access to business email, a virtual desktop session, or most other Android applications.
Through the use of Datagram Transport Layer Security (DTLS), TCP-based applications and latency-sensitive traffic (such as voice over IP [VoIP]) are provided an optimised communication path to corporate resources.
Further details from the Android marketplace as below
FEATURES:
Automatically adapts its tunnelling to the most efficient method based on network constraints, using TLS and DTLSDTLS provides an optimised connection for TCP-based application access and latency-sensitive traffic, such as VoIP trafficNetwork roaming capability allows connectivity to resume seamlessly after IP address change, loss of connectivity, or device standbyWide Range of Authentication Options: RADIUS, RSA SecurID, Active Directory/Kerberos, Digital Certificates, LDAP, or multifactor authenticationSupports certificate deployment using AnyConnect integrated SCEP and the certificate import URI handlerPolicies can be configured locally, and automatically updated from the security gatewayAccess to internal IPv4 network resourcesAdministrator-controlled split / full tunnelling network access policy
Feedback has been mixed, with a number of Android users unhappy that only a small number of Android devices are compatible with the software. Users who have devices which are not specifically listed above will need to wait until the next release of AnyConnect in the Android market place. Further information is available at the Cisco website


View the original article here

Winners at the AusCERT 2011 awards night

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
Each year at the AusCERT conference a number of awards are given to individuals and companies who have significantly contributed to the information security industry in areas such as community service, innovation, education, liaison, law enforcement, governance or leadership. Nominations are not invited - the AusCERT team, working at the cold face, identifies and submits candidates to the AusCERT judging panel.
searchSecurity.com.au congratulates the winners who were as follows:(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

The Individual Excellence in Information Security award
Wade Alcorn from NGS Secure received this award for the way he engages with the technology community about security topics and his promotion of Information Security in the security industry. Wade has experience in numerous aspects of offensive information security assessments and has provided leadership to large teams of security professionals. He has presented at conferences including BlackHat and previous AusCERT conferences.
NGS Secure is an independent provider of penetration testing and security services. NGS Secure also provides a number of Internet and database security software solutions which assist security professionals scan, audit, secure and report on the security of web applications and the supporting databases.
AusCERT’s award for Organisational Excellence in Information Security
Australian Taxation Office picked up this award for its proactive work against fraudulent activity targeting Australians. Working with a number of government agencies the ATO identifies scams aimed at Australians and analyses the many new ways phishing techniques are used in the Australian environment.
AusCERT’s award for best security initiative
Google for its Safe Browsing alerts for Network Administrators programme, which allows autonomous system (AS) administrators to register to receive Google Safe Browsing notifications. The goal is to provide network administrators with information of malicious content that is being hosted on their networks and is targets Internet Service Providers, telecommunications companies and large enterprise.
To sign up, visit http://safebrowsingalerts.googlelabs.com/ and log in using a google account. Network Administrators can then add a number of ASNs to the interface. Google verifies ASN ownership using the APNIC database for contact details.
The Gala Dinner event, which attracted both delegates and sponsors, was hosted by Corinne Grant and featured Australian musical comedy group Tripod and ‘Australia’s Got Talent’ finalists Soul Mystique. Receiving somewhat random ‘trophies’ from Corine Grant in lieu of the real awards which were “forgotten” by the AusCERT team, Wade received a lamp (from Corinne’s hotel room), the ATO were awarded a heavy candelabra (with candles) and Google were given a ‘Caution Wet Floor’ sign from the hotel lobby.
Luckily the Queensland police saw the humour in the event and we understand that all the items were returned to the hotel without arrests being made.

Corinne Grant congratulates the ATO
Len Kleinman from the Australian Taxation Office accepts his `prize' from Corinne Grant. (photo courtesy of Computerworld)


View the original article here

Sunday, July 3, 2011

searchSecurity.com.au chats with TeamViewer

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
In late April searchSecurity.com.au mentioned a number of remote control applications which allow the remote control of Windows environments over the Internet. While some software allows for the identified and authenticated control of the Windows dekstop (LogMeIn, WebEx) others allow for the anonymous remote control of a user desktop via a browser plugin which any user can install.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

Several scams use this technology to trick home users into allowing the remote control of their Windows desktops, only to be infected with malware. Users are then asked to pay for software to remove the malware, or blackmailed into paying for a anti-virus subscription service.
TeamViewer, a provider of remote control software, responded to a number of questions about their remote control software which allows for the anonymous remote control of a users desktop in a recent chat with searchSecurity.com.au
searchSecurity (SS): TeamViewer provide two ways of connecting to remote desktops, an application which needs to be installed by the user and a ‘join a session’ browser based application from the TeamViewer website home page which doesn’t require any special installation; why did you choose two environments?
TeamViewer: The full version can be installed and offers the complete functionality of TeamViewer. The 'join a session' directs you to the QuickSupport which is the customer module of TeamViewer. This module doesn't require any installation or administrator rights and can be directly started. It only accepts incoming connections and is lacking some functionality (e.g. VPN). The QuickSupport is meant for the fast and spontaneous access of a remote PC on which you do not have necessarily an IT pro.
SS: Once remotely connected to host computer using either the full version or the ‘join a session’ version of the TeamViewer software, the remote user can disable local input. This effectively removes all control of the host machine from the local user. The only way to then cancel the session is for the host machine user to turn off their PC. What is the thinking behind this functionality and considering the possibility of abuse by scammers, why aren't these options either disabled by default or not available on the 'join a session' version of the application?
TeamViewer: Disable remote input and the additional option 'show black screen' are options for home office users. If you work on your PC in the office from at home you want to assure that nobody in your office has the possibility to control the PC while you are working on it and out of privacy reasons also not to see what you are doing on your computer.
SS: Can you help me understand the security features Teamviewer have implemented in the product? What features ensure that the connection is secure? Also, it appears that once a computer runs the teamviewer application for the first time either using the full version or the ‘join a session’ version, an ID is assigned to that computer which doesn’t change for future connections. Is this by design?
Teamviewer: TeamViewer works with a complete encryption based on RSA public/private key exchange and AES (256 Bit) session encoding. This technology is used in a comparable form for https/SSL and can be considered completely safe by today's standards. As the private key never leaves the client computer, it is ensured by this procedure that interconnected computers - including the TeamViewer routing servers - cannot decipher the data stream.
Each TeamViewer client has already implemented the public key of the master cluster and can thus encrypt messages for the master server and check the signature of the master, respectively. The PKI (Public Key Infrastructure) effectively prevents "Man-in-the-middle-attacks". Despite the encryption the password is never sent directly but only through a challenge-response procedure and is only saved on the local computer.
The ID number is generated on each machine (computer or mobile device) once. It is [then] easy to connect to a partner and to store his/her number permanently for repeated access.
SS: In Australia there is quite a problem with scammers calling non-technical users, connecting to their machines remotely and installing malware. In many cases this results in credit card charges for anti-virus software the user doesn’t need, existing anti-virus software removed and the users PC infected with many different kinds of malware. Your software clearly makes it exceptionally easy to remotely connect to a PC over the Internet, what features are included in the software to stop scammers making use of your software?
TeamViewer: TeamViewer is a secure tool for remote support, where the side which is accessed through the software has to provide the access password. If the secure password is provided we at TeamViewer can't know this is for the reason to scam someone or for a remote support session. We work together with authorities of course and try to help as much as possible to prevent those activities by blocking those users out of the network.
SS: Thanks for your time
searchSecurity.com.au also spoke to TeamViewer technical support who recommended that any abuse of their software by scammers should be immediately reported to the customer service line, which offers a local Australian number.

View the original article here

Surveys reveal common Malware and Spyware are of most concern

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
eEye Digital Security, a provider of IT security and unified vulnerability management solutions, has announced results from its “2011 Headlines vs. Reality” survey.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

Through the polling of 1,677 IT security professionals and executives, over 50% responded that it was the common malware and spyware attacks which threatened their organisations most significantly, and not sophisticated, high-profile attacks that garnered media attention, such as Stuxnet, Operation Aurora or Night Dragon.
The survey included responses from IT administrators, managers and C-level executives from organisations of various sizes and from multiple industries in the private and public sectors. Thirty percent of respondents came from organisations with 4,000 employees or more.
“These facts demonstrate that while it is important to remain vigilant against attacks that wreak havoc and damage reputations, we must also remain focused on attacks that fly in under the radar, happen every day and chip away at defences and compliance,” said Marc Maiffret, CTO, eEye Digital Security.
Meanwhile McAfee’s whitepaper ‘The New Reality of Stealth Crimeware’ warned that sophisticated malware techniques which employed “Ninja” stealth tactics and combination vulnerabilities, rootkit and stolen certificate techniques were on the rise.
“Powerful toolkits, like what is available in the Zeus Crimeware Toolkit, make stealth malware development a point- and-click endeavour, no longer restricted to the most knowledgeable programmers.”
McAfee Labs estimates that about 15 percent of malware uses sophisticated stealth techniques to hide and spread malicious threats that can cause significant damage.
“One of the most important things to understand about stealthy malware like Stuxnet and Zeus is that it truly owns the computers it takes over. Through rootkits that operate at the user, kernel, and firmware levels, malware can hide, replicate, protect itself against being overwritten, and deactivate anti-virus protection and other defences.”
Unfortunately, getting accurate figures on the impact of both common malware and the ‘other stealthy kind’ is difficult. Most companies only reveal breaches when regulations require disclosure (typically losses of personally identifiable information) and in Australia, unlike in the US, there is no mandatory disclosure of cybercrime within companies or Government.
Calling for mandatory reporting of cybercrime legislation from Governments, Yuval Ben-Itzhak the chief technology officer of security vendor AVG explained to ZDNet yesterday that “It's not interesting for the media if Mr X from down the street was compromised."
"No-one knows about that person. But suddenly, if there are five thousand people in the city being compromised, well, that's a story that will get the headlines. And I think it's for the lawmakers to start to step forward and request reports for these cases."
Tangible verifiable costs can be difficult to gauge. However, McAfee suggestions that the malware of 2011 is
Fast spreading—McAfee Labs has detected up to 6 million new botnet infections in a month Increasing data loss rates—Malicious attacks were the root cause of 31 percent of the data breaches studied in the 2011 Ponemon Cost of a Data Breach Survey, the highest percentage in the study’s five year historyIncreasing data breach costs—The average compromised record costs $214, and the average data breach costs $7.2 millionCompliance is in jeopardy—About three-quarters of the companies surveyed by Evalueserve in 2011 said that discovering threats and discovering vulnerabilities were their biggest challenges in risk managementTax on productivity—Costs average five hours for each IT administrator and user per system reimaged (10 hours total), for an approximate cost per endpoint of $585; at a 5,000 node company, a 1 percent infection rate would equate to $30,000 in cleanup costs)
In addition to demonstrating top-level concerns, the EyeDigital survey also provided insight into how and where security professionals would bolster their resources if they were to receive a 20 percent increase in their security budgets.
65 percent said they would invest it in security reporting and dashboard technologies63 percent said they would invest in patch management60 percent said they would invest in configuration compliance52 percent said they would invest additional personnel39 percent said they would invest regulatory compliance reporting
Unfortunately, although respondents were decisive when it came to knowing how to invest, many have their hands tied. Despite perceived economic recovery, 57 percent of those polled said their IT security budgets saw no increase in 2011, with only 21 percent receiving an increase and 22 percent actually experiencing a decline.

View the original article here

AusCERT2011 - Overexposed

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
The Australian Computer Emergency Response Team is hosting AusCERT2011, the AusCERT Information Security Conference, from 15th - 20th May 2011 at the RACV Royal Pines Resort on Queensland's Gold Coast.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

With a theme of “Overexposed” and a warning from a recent delegate update email that the social events “are not suitable for children” this year promises to be one of the most interesting in the 10 year history of the conference.
There are a number of strong presentations and keynotes on the schedule, available at http://conference.auscert.org.au/conf2011/program_main.html. Professor Ross Anderson from Cambridge University, and Amit Klein, CTO of Trusteer are joined by British writer and Comedian Bennett Arron to deliver the conference keynotes, and each day is separated into four programme streams.
Day one, Monday 16th May
SCADA Stream, Technology, 2 Vendor Stream
Highlights will include Rob Lamb (IBM) discussing the current threat landscape, walking the audience through highlights from the latest IBM X-Force Trend and Risk Report. The report gathers facts from numerous intelligence sources, including the real-time monitoring of 13 billion security events every day across more than 130 countries.
Later in the day John Harrison and Trent Prasser from Brisbane City Council will discuss the impact of recent natural disasters on disaster recovery capabilities and business continuity plans. They plan to cover some of the topics which need to be considered in disaster planning and response, learnt through recent natural disaster events.
Day two, Tuesday 17th May
Internet Infrastructure Stream, Cybercrime Stream, 2 Vendor Streams
Kicking off with Amit Klein (Trusteer) talking about the risks and threats of Mobile Banking, day two continues after morning tea with presentations which include Eugene Kaspersky, founder of Kaspersky Labs and an overview of PCI attack trends from computer forensics expert Nick Klein and Mike Ryan (Vectra Corporation).
Geoff Huston’s (APNIC) talk on the role of addresses and routing, which includes an update on the progress of a project to establish a secure framework for addresses and their use in the Internet, is followed by Mark Newton’s (Internode) thoughts on securing IPv6.
The Gala Dinner incorporating the Australian SC Information Security Awards and AusCERT Awards will be hosted by Corinne Grant from 7pm. And, back by popular demand from AusCERT2008, Australian Music Comedy Sensations Tripod with Yon, Scod and Gatesy contrast quick change artists and magicians Soul Mystique.
Day three, Wednesday 18th May
2 Managing Technology Streams, 2 Vendor Streams
Microsoft, infoblox, Lockstep and Statsec follow Ross Anderson’s keynote address on the Dependability of Complex Socio-Technical Infrastructure. An early thinker around Peer to Peer networks Ross will talk discuss frauds against payment networks, investing in smart grids and draw on a recent major study Ross was involved in for European Network and Information Security Agency (ENISA) about the resilience of the Internet interconnect.
Days four and five include the Executive Program (hosted by Ross Anderson, Karl Hanmore, Gail Holt, and Marcus Sachs) and a number of full day and two day tutorials. These include:
VOIP Security Testing presented by Chris Gatford and Peter WesleyWeb Application Security Testing and Practical Secure Application Development presented by Jason Edelstein, Kaan Kivilcim and Phil Taylor, Sense of SecuritySecure Coding with OWASP Application Security Verification Standard presented by Andrew Van Der Stock, Pure HackingBehaviors and Patterns: Introduction to Practical Malware Analysis presented by Aaron Hackworth and Ross KinderCEHv7 Advanced – Hands on Workshop presented by Haja Mohideen, Technical Director of EC-Council and the creator of CEH certification
AusCERT2011 has attracted around 70 sponsors and top level sponsorship from IBM, Kaspersky Lab, NetWitness and Symantec. The conference programme concludes just before 4pm on Wednesday afternoon.
searchSecurity.com.au is attending the conference with the support of AusCERT.

View the original article here

Security vendors step up IPv6 certifications

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
Vendors have known for some years that IPv6 certification would be a market requirement for their products and a number of governments have published transitional strategies for their agencies and suppliers.
As early as 2007 the Australian government released ‘A Strategy for the Implementation of IPv6 in Australian Government Agencies’ outlining a timeline for IPv6 adoption which was subsequently updated in 2009.
The current requirement states agencies must have their IPv6 ready hardware and software in place by end 2011, and have all systems IPv6-enabled by end of 2012.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

However, the document is less specific about exactly what IPv6 certification requires, or even what ‘IPv6-enabled’ might actually mean to Australian Federal Government networks and agencies. Is being able to ping6 key router infrastructure enough? What does “agencies will be ready to securely send and receive IPv6 packets of information” mean in a practical sense? From where to where?
Do all applications need to be tested on an IPv6 network or is it enough to implement dual-stack IPv4/IPv6 networks leaving all applications on IPv4?
Security is even muddier.
“Agencies should ensure that that IPv6 related security threats and risks are considered as part of the regular Threat and Risk Assessments of their networks. Elements of many of these tasks are ongoing, but their planning and commencement should be undertaken by end-December 2009.” Some may assume this requires the implementation of RA Guard software and a significant investment in end point dual-stack monitoring.
What about any security implications of running a dual-stack network? Should the default IPv6 state of most modern operating systems be altered from on to off?
The good news is that testing vendors are attempting to help companies test and monitor IPv6 networks and applications, even when those applications are in the cloud.
California based company Mu Dynamics offers a comprehensive suite of automated testing solutions and test content aimed at testing and validating IPv4 and IPv6 products and services for conformance, security and resiliency. Essentially the Mu Dynamics’ offering is a testing solution which enables network equipment manufacturers, service providers and government agencies to automate their pre-certification testing and leverage the same tests as government-sanctioned certification labs in IPv4 and IPv6 environments.
Compuware Corporation have also released the industry’s first free IPv6 Website Performance Comparison testing tool which allows organisations to compare the speed of their IPv4 and IPv6 enabled web applications. Enterprises who move applications into the cloud to take advantage of an IPv6 cloud enabled service can now test any impact of an IPv6 environment on their applications.
In the US, the National Institute of Standards and Technology (NIST) have been more specific on what IPv6-compliance means. Released as a draft 2007, Version 1 of the USGv6 Profile was published in July 2008 following industry and government consultation. Shortly afterwards the USGv6 Testing Program was developed and, following a number of drafts, became operational in November 2009.
The USGv6 Profile is lengthy and technical document, making self certification for vendors and customers very time consuming. It lists 12 functional categories for IPv6 capability and defines a number of profiles which include Host, Router (both internal and external facing) and Network Protection Device (which include IPS and firewalls). Functional categories are broken into multiple requirements.
Testing labs to the rescue.
ICSA Labs, an independent division of Verizon Business with offices in Pennsylvania, provides independent 3rd party product assurance for end users and enterprises. ICSA Labs has provided vendor-neutral testing and certification for hundreds of security products and solutions for many of the world's top security product developers and service providers.
ICSA Labs provides services in three areas:
• Consortium Operations, Security Product Testing, and Certification Programs
• Custom Testing Services
• Accredited Government Testing Services
One of the initial companies to provide security products for ICSA Labs testing was IPS vendor Sourcefire. A bold move which has proven successful, Sourcefire has recently announced the completion of testing with ICSA Labs of the Sourcefire 3D® System, successfully satisfying U.S. federal government IPv6 test requirements (USGv6).
“ICSA Labs’ validation that we meet the USGv6 requirements ahead of the federal government’s move to IPv6 in 2012 demonstrates Sourcefire’s commitment to our customers and to meeting their changing security needs,” said Marc Solomon, Senior Vice President of Marketing at Sourcefire. “This independent confirmation of our IPv6 support is especially important now that the pool of available IPv4 addresses is fully allocated and nearly depleted.”
The Sourcefire 3D® System is one of the first IT security solutions verified by ICSA Labs to meet the US federal government’s requirements for hosts on an IPv6 network.
“The goal of the federal government’s IPv6 test program is to ensure interoperability among all IT and networking components used to build, maintain and secure the IT infrastructure of federal agencies,” said Brian Monkman, Perimeter Security Programs Manager at ICSA Labs. “As one of the first IT security vendors to participate in our testing, Sourcefire customers will benefit from the company’s ongoing commitment to security IPv6.”

View the original article here

Phone call scammers on the rise- software to blame?

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
SCAMwatch, an Australian federal government funded initiative to provide information about how to avoid scams to consumers and small business, has reported phone call scams continue to plague Australians.
With new tactics and tricks, including follow-up calls to people who initially fell victim to a previous scam in an attempt to scam the same people again, calls occur mostly during the day and target people unfamiliar with their Microsoft Windows operating systems.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

SCAMwatch provides a number of warning signs that someone calling you is a scammer:
You receive a scam call out of the blue claiming there is a problem with your computer.The caller claims to be from a large computer company/brand, bank, financial institution, or legitimate technical service provider.They will request remote access to your computer and if you say yes will run a ‘scan’ that shows up a fake virus.The scammer will pressure you into buying unnecessary software or a service to ‘fix’ the computer.The scammer may be very persistent and use abusive or inappropriate language.The scammers may sound professional and knowledgeable.
During calls received by TechTarget staff the scammer stepped through a number of scripted instructions to ‘prove’ the computer was infected by opening Windows Task Manager and looking for “red and yellow circles” which, according to the caller, “are infected files”. The scammer then attempts to use free remote control software to connect to the victims PC over the Internet.
 
Once connected the scammer uploads an application which finds a ‘virus’ and either ‘removes’ it upon payment (at the same time clearing the Windows Task Manager of all events to prove the infected files have been cleaned) or attempts to charge a software maintenance fee for the anti-virus software.
Calls are made from a difficult to trace VoIP connection with no caller ID. Callers appear to be mostly women working in a call centre environment, who then pass the intended victim to a “senior support” engineer if the intended victim asks questions which fall outside the scripted procedure. Upon reporting the scam call to Optus residential home phone customer support, Optus recommended contacting the SCAMwatch website and were happy to help complete the web based SCAMwatch complaint form correctly.
According to the SCAMwatch website, “Many scams originate overseas or take place over the internet, making them very difficult to track down and prosecute. If you lose money to a scam, it is unlikely that you will be able to recover your loss.”
Governments around the world have been trying to raise awareness in the community about Internet and telephone based scams for decades. This year during Privacy Awareness Week (1 to 7 May 2011), privacy commissioners and regulators from across the Asia Pacific region released an animation and e-survey to find out more about privacy and social networking. The animation and survey are available on the Privacy Awareness Week website: http://www.privacyawarenessweek.org/.
Last year’s National Cyber Security Awareness Week was held from 6 to 11 June 2010, and launched a number of new initiatives including the spam reporting tool ‘Spam SMS’. The tool provides Australians with a quick and easy way to report spam SMS by forwarding messages to 0429 999 888. Programs to help teachers manage cybersafety education and increase awareness in schools were also launched.
So how do scammers connect so easily to PCs behind firewalls and protected by anti-virus applications?
The number of remote control software options has grown significantly in the last few years. While Windows Remote Desktop and VNC technologies with their specific TCP port requirements are used by system administrators to manage servers and enterprise PCs, a market in over-the-Internet support has seen the development of web based tools which allow users to share their computers across a tunnelled http or https connection.
downloads.com reports over 160 free remote control software options, with the most popular including TeamViewer (28m downloads) and LogMeIn Free (1.3m downloads). Skype and Cisco WebEx also offer screen sharing however remote control is more carefully controlled.
Teamviewer offers the most disturbing environment from a security point of view by far.
Driven entirely from the homepage of the Teamviewer website Teamviewer allows a remote user to connect to a PC and control that PC as if they were the local user. The remote user can even control whether the local user of the PC may interact with the session via a feature called ‘Disable Remote Input’. The controlling remote user may also transfer files, blank the screen, reboot the PC and establish an encrypted VPN between two machines, blinding local anti-malware and anti-virus gateway infrastructure and effectively jumping the firewall.


It is difficult to think of any extra features a scammer would need to completely compromise a PC in a more efficient way. Even the IP address of the remote host is hidden as each PC makes a connection to the teamview servers, which broker the connection between the two end points.
Teamviewer technical support team in Germany advised that once a remote control session between the scammer and victim had been established, Teamviewer engineers could “trace the scammer and block IP addresses”, effectively blocking the scammer from using the software. The Teamviewer press representative was not responsive to further questions asked via email. Teamviewer have local phone numbers in Australia however customer support is serviced from sites in the USA and Europe.
SCAMwatch recommends a number of ways to protect yourself.
If you receive a phone call out of the blue about your computer system’s security status and requesting remote access - hang up – even if they mention a well-known company or product.NEVER give an unsolicited caller remote access to your computer.If you have given remote access to your computer, or you fear that your computer has been hacked, seek out help or advice from a qualified and reputable computer technician.Do not give out your personal, credit card or online account details over the phone unless you made the call and the phone number came from a trusted source.Make sure your computer is protected with regularly updated anti-virus and anti-spyware software, and a good firewall - but research first and only purchase the software from a source that you know and trust.If you have fallen victim to a scam or you receive a lot of unsolicited emails and phone calls consider changing your email address and phone numbers.If you are considering providing your details to a company, read their privacy policy/terms and conditions first. If you do not agree with how they will use your details, do not provide them.If you think you have provided your account details to a scammer, contact your bank or financial institution immediately.
Scams can be reported to the ACCC via the report a scam page on SCAMwatch or by calling 1300 795 995.

View the original article here

Golden retriever rescue gets musical boost

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)


« UF vets save dog who swallowed horse meds | Main | Animal-hoarding woes »
Golden retriever rescue gets musical boost
Dogs ? posted by mary anna gentleman on June, 27 2011 11:45 PM Discuss This: Comments(3) | Add to del.icio.us| Digg it In a 2004 photo, golden retriever Surfer is being trained using a clicker. (Orlando Sentinel file photo)(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

Colleague Richard Burnett, who is musically talented, mentioned the other day that he has written and performed a song as a fundraiser for the Golden Retriever Emergency Assistance Team  in Jacksonville, the rescue group from whom he adopted his golden retrievers. GREAT Rescue of Northeast Florida, a nonprofit group, has been around since 2000, matching goldens with loving families.
Richard is so pleased with the work they do that he thought he’d try to help them out. The proceeds he gets from sales of his song, “What Best Friends Do,” go to GREAT Rescue. You can get a video preview of the song and buy a copy at his music website. While you’re there, be sure to click on his discography page.

Add a comment Comments

Awesome! [url=http://www.youtube.com/watch?v=shZ8plQYsdI]resort hotel photographer[/url/]
Reply Posted by: Amber |Tuesday, June 28, 2011 at 5:32 AM
Nice! [url=http://www.youtube.com/watch?v=sXSyw5_hvaQ]architectural photographer[/url/]
Reply Posted by: Brianna |Tuesday, June 28, 2011 at 5:33 AM
Very nice! [url=http://www.youtube.com/watch?v=sXSyw5_hvaQ]architectural photographer[/url/]
Reply Posted by: Mark Spears |Tuesday, June 28, 2011 at 5:34 AM
Post a comment Comments are moderated. By posting a comment, you affirm that you are 13 years of age or older and you agree to our copyright and terms of service.

Name: (required)

Email: (required) - Will not be published.

URL:

Comments:

SearchSearch for:
AboutFrom pets to wild animals, from the strange to the amazing, Animal Crazy has the animal world covered.
E-mail Animal Crazy
OrlandoSentinel.com RSS Feed Subscribe to this blog's feed
Subscribe to our blog via emailEnter your email address



Delivered by FeedBurner
Photo Galleries
Latest from OrlandoSentinel.com blogs

Recent PostsSPCA of Central Florida warns of fake fundraising Chaining opponents will be in the doghouse July 4 Popeye cool with new home Condo to use DNA tests to track dog-doo culprits Your pets: Newfound Buddy eases loss of their Princess
Recent CommentsLO on Popeye cool with new homeAmber on Popeye cool with new homeAmber on SPCA of Central Florida warns of fake fundraisingEllen Cox on Orlando arson dog retiring after 11 yearsElle on Dog wash benefits 2 animal programs
Category Archives60 MinutesAkitaAlexalligatorsanimal crueltyAnimal loversAnimal Planetanimal sheltersBarbarobatsBearsbeaverBeesBest Friends Animal SocietyBigfootBird fluBirdsBisonblogsbobcatBooBooksBuddy Dyer and pit bullbugsBULLDOGSBullsBusch GardensBUTTERFLIESCalifornia firesCamelscat and dogsCatsCheetahsChickensChimpanzeesChristmascircuscloningcockfightingcondorCongressCougarscowcoyotescraneCrocodile HuntercrocodilesDeerdinosaursDisneyDisney's Animal KingdomDNA Testingdog parksdog furdog showdog training tipsDog whispererdogfightingDoggy diningDogsDollyDolphinsdonkeysdrugsDuckEaglesElephantselksEndangered speciesEnglandequine horse fluEventsExotic animalsFamily FundfawnfirefightersFISHFlorida panthersforeclosure petsFoxfrogsGatorlandGeeseGeorgia AquariumGiraffeGoatsgopher tortoisesGorillasgreyhoundsGROUNDHOGHalloweenhamsterHipposHorsesHumane Society of the United StateshuntingHurricanesiguanaInsectsIraqJaguarsK-9kangaroosKatrinaKoalasLabrador RescueLassieLeona HelmsleyLeopardsLionslivestocklizardsllamasLoggerhead sea turtlemammothsManateesMarley & MemedicinesmeerkatsMiceMISSING DOGSMISSING PETSMonkeysmount doraNigerian puppy scamobituariesOctopusesOprahOrange County Animal ServicesorangutanOrlando Sanford AirportOttersOur cat, Boo, MoggieOwlsPandaspanthersparakeetsParis HiltonParrotspeacockPedigreepelicansPenguinspet burialsPet Foodpet food recallPet giftspet healthPet hotelspet insurancePet PeevesPet photosPet Rescue by Judypet sittingPet storesPETAPetsPetSmartPigspit bullspolar bearsPoniesPoochinipoodlesPossumPuerto RicopugPumaPuppy MillsPythonsqueen ElizabethRabbitsraccoonsRatsRavensReptilesrhinosripleyrodentsSandringhamscorpionScrub JaysSea Lionsea turtleSealSeaWorldSeminole County Animal ServicesSharksSheepSkoutSkunksSnakesSPCASPCA of Central Floridaspiderssquirrelsstray catSwansTigersTiny DancerTobytop 10 Animal MoviesTop 10 dogstornadoestortoiseTravelturkeysTurtlesTwitterUncategorizedUniversity of Central FloridaUniversity of FloridaValentines DayVeterinaryvideoswallabywalrusWednesday Pet ClubWestminster Kennel ClubWhalesWhippetWhite HouseWhooping craneswildlifeWilmaWolveswoodpeckerWorld Wildlife FundYappy hourZimbabweZoosZorse
ArchivesJuly 2011June 2011May 2011April 2011March 2011February 2011January 2011December 2010November 2010October 2010September 2010August 2010July 2010June 2010May 2010April 2010March 2010February 2010January 2010December 2009November 2009October 2009September 2009August 2009July 2009June 2009May 2009April 2009March 2009February 2009January 2009December 2008November 2008October 2008September 2008August 2008July 2008June 2008May 2008April 2008March 2008February 2008January 2008December 2007November 2007October 2007September 2007August 2007July 2007June 2007May 2007April 2007March 2007February 2007January 2007December 2006November 2006October 2006September 2006August 2006July 2006June 2006May 2006April 2006March 2006February 2006January 2006December 2005November 2005October 2005

Switch to our mobile site
  Footer Graphic Baltimore Sun Chicago Tribune Daily Press Hartford Courant LA Times Orlando Sentinel Sun Sentinel The Morning Call The Virginia Gazette Privacy Policy Work For Us Contact Us Terms of Service
Orlando Sentinel, 633 N. Orange Avenue, Orlando, FL 32801
DM_addEncToLoc("Site", (s.server));DM_addEncToLoc("channel", (s.channel));DM_addEncToLoc("keyword", (s.prop3));DM_cat(s.hier1);DM_tag();
View the original article here

SPCA of Central Florida warns of fake fundraising

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)


Main | Chaining opponents will be in the doghouse July 4 »
SPCA of Central Florida warns of fake fundraising
SPCA of Central Florida ? posted by mary anna gentleman on July, 1 2011 12:55 AM Discuss This: Comments(1) | Add to del.icio.us| Digg it
From Jake White, executive vice president and general manager of the SPCA of Central Florida, comes this warning:
“If you receive a phone call from ‘Donor Services Group at the Humane Society’ (323-330-1460 or another number), it is NOT from the SPCA of Central Florida.
“The SPCA of Central Florida is not a part of any national organization or other local humane society group.  We are a private nonprofit animal-welfare agency offering services to Orange, Seminole, Osceola and other Central Florida counties. We are not  a department of any governmental agency.
“Most important, we will never sell our donors’ information to any outside professional fundraising group.”

Add a comment Comments(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)


Thanks for posting this! [url=http://www.seoblogpress.com]seo blog press[/url/]
Reply Posted by: Amber |Saturday, July 2, 2011 at 5:00 PM
Post a comment Comments are moderated. By posting a comment, you affirm that you are 13 years of age or older and you agree to our copyright and terms of service.

View the original article here

Your pets: Newfound Buddy eases loss of their Princess

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
to del.icio.us| Digg it Buddy, an energetic Australian shepherd, seems to have a kinship with Suzette and Charles DeGaetano's deceased Maltese, Princess. (Photo courtesy of Suzette and Charles DeGaetano)
Each pet we have is special in his or her own way, so when a beloved pet dies, we can’t look for a “replacement.” But sometimes another loving animal comes along who helps fill the hole in the heart and ease the pain of loss. Suzette DeGaetano of Leesburg shares just such a story in her “I Remember When …” essay:
After we lost our beloved 6.5-pound, 17-year-old Maltese, Princess, on June 4, 2010, my husband, Charles, and I volunteered at the Lake County Animal Services shelter and the Humane Society of Lake County to help us in our sorrow.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

About a month after we began volunteering, an Australian shepherd who had one more day to live at the Animal Services shelter came right over to us, looking at us very sadly, with eyes just like Princess’. He was a year and a half old, with no name, no history, but I called him Buddy right away — and we took Buddy home.
When he exited the car, Buddy went over to our outside memorial for Princess and lay down, looking at the pictures as if to say, “Thank you, Princess, for saving me.” This brought tears to our eyes and a rush of love for this new kid named Buddy.
Our 35.5-pound Aussie is polite, housebroken and very smart. Buddy has opened the refrigerator when we’re not at home and eaten a Tupperware dish of spare ribs and sauerkraut.
On another occasion, he took out a large pan of turkey thighs and wings, ate what he wanted and hid the leftovers under pillows and two piles of Charles’ shirts. He also hid a bowl of blueberries.
Charles has placed a very heavy Velcro band around the refrigerator and on the closet doors because Buddy likes to get his food out of the closet and hide the bones and cans all over the house.
It’s hard to believe, but with all of these activities, Buddy has never left our home a mess.
Buddy just graduated from puppy school and gave us another surprise: He is now flushing the toilet.
We’re learning who Buddy really is while he is thanking us and giving us new joys. He can’t replace Princess, but he’s making his own mark.

Add a comment Comments

Post a comment Comments are moderated. By posting a comment, you affirm that you are 13 years of age or older and you agree to our copyright and terms of service.

Name: (required)

Email: (required) - Will not be published.

URL:

Comments:

SearchSearch for:
AboutFrom pets to wild animals, from the strange to the amazing, Animal Crazy has the animal world covered.
E-mail Animal Crazy
OrlandoSentinel.com RSS Feed Subscribe to this blog's feed
Subscribe to our blog via emailEnter your email address



Delivered by FeedBurner
Photo Galleries
Latest from OrlandoSentinel.com blogs

Recent PostsSPCA of Central Florida warns of fake fundraising Chaining opponents will be in the doghouse July 4 Popeye cool with new home Condo to use DNA tests to track dog-doo culprits Your pets: Newfound Buddy eases loss of their Princess
Recent CommentsLO on Popeye cool with new homeAmber on Popeye cool with new homeAmber on SPCA of Central Florida warns of fake fundraisingEllen Cox on Orlando arson dog retiring after 11 yearsElle on Dog wash benefits 2 animal programs
Category Archives60 MinutesAkitaAlexalligatorsanimal crueltyAnimal loversAnimal Planetanimal sheltersBarbarobatsBearsbeaverBeesBest Friends Animal SocietyBigfootBird fluBirdsBisonblogsbobcatBooBooksBuddy Dyer and pit bullbugsBULLDOGSBullsBusch GardensBUTTERFLIESCalifornia firesCamelscat and dogsCatsCheetahsChickensChimpanzeesChristmascircuscloningcockfightingcondorCongressCougarscowcoyotescraneCrocodile HuntercrocodilesDeerdinosaursDisneyDisney's Animal KingdomDNA Testingdog parksdog furdog showdog training tipsDog whispererdogfightingDoggy diningDogsDollyDolphinsdonkeysdrugsDuckEaglesElephantselksEndangered speciesEnglandequine horse fluEventsExotic animalsFamily FundfawnfirefightersFISHFlorida panthersforeclosure petsFoxfrogsGatorlandGeeseGeorgia AquariumGiraffeGoatsgopher tortoisesGorillasgreyhoundsGROUNDHOGHalloweenhamsterHipposHorsesHumane Society of the United StateshuntingHurricanesiguanaInsectsIraqJaguarsK-9kangaroosKatrinaKoalasLabrador RescueLassieLeona HelmsleyLeopardsLionslivestocklizardsllamasLoggerhead sea turtlemammothsManateesMarley & MemedicinesmeerkatsMiceMISSING DOGSMISSING PETSMonkeysmount doraNigerian puppy scamobituariesOctopusesOprahOrange County Animal ServicesorangutanOrlando Sanford AirportOttersOur cat, Boo, MoggieOwlsPandaspanthersparakeetsParis HiltonParrotspeacockPedigreepelicansPenguinspet burialsPet Foodpet food recallPet giftspet healthPet hotelspet insurancePet PeevesPet photosPet Rescue by Judypet sittingPet storesPETAPetsPetSmartPigspit bullspolar bearsPoniesPoochinipoodlesPossumPuerto RicopugPumaPuppy MillsPythonsqueen ElizabethRabbitsraccoonsRatsRavensReptilesrhinosripleyrodentsSandringhamscorpionScrub JaysSea Lionsea turtleSealSeaWorldSeminole County Animal ServicesSharksSheepSkoutSkunksSnakesSPCASPCA of Central Floridaspiderssquirrelsstray catSwansTigersTiny DancerTobytop 10 Animal MoviesTop 10 dogstornadoestortoiseTravelturkeysTurtlesTwitterUncategorizedUniversity of Central FloridaUniversity of FloridaValentines DayVeterinaryvideoswallabywalrusWednesday Pet ClubWestminster Kennel ClubWhalesWhippetWhite HouseWhooping craneswildlifeWilmaWolveswoodpeckerWorld Wildlife FundYappy hourZimbabweZoosZorse
ArchivesJuly 2011June 2011May 2011April 2011March 2011February 2011January 2011December 2010November 2010October 2010September 2010August 2010July 2010June 2010May 2010April 2010March 2010February 2010January 2010December 2009November 2009October 2009September 2009August 2009July 2009June 2009May 2009April 2009March 2009February 2009January 2009December 2008November 2008October 2008September 2008August 2008July 2008June 2008May 2008April 2008March 2008February 2008January 2008December 2007November 2007October 2007September 2007August 2007July 2007June 2007May 2007April 2007March 2007February 2007January 2007December 2006November 2006October 2006September 2006August 2006July 2006June 2006May 2006April 2006March 2006February 2006January 2006December 2005November 2005October 2005

Switch to our mobile site
  Footer Graphic Baltimore Sun Chicago Tribune Daily Press Hartford Courant LA Times Orlando Sentinel Sun Sentinel The Morning Call The Virginia Gazette Privacy Policy Work For Us Contact Us Terms of Service
Orlando Sentinel, 633 N. Orange Avenue, Orlando, FL 32801
DM_addEncToLoc("Site", (s.server));DM_addEncToLoc("channel", (s.channel));DM_addEncToLoc("keyword", (s.prop3));DM_cat(s.hier1);DM_tag();
View the original article here

Top five themes from Gartner Security Summit 2011

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
Eric B. Parizo, Senior Site Editor
I had the opportunity once again this year to attend the Gartner Security & Risk Management Summit, and it always serves as a fascinating barometer of what’s top of mind for information security professionals. I wanted to briefly highlight my list of the top five issues that seemed to resonate during keynotes, sessions and while informally chatting with attendees.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

5. Dodd-Frank Act compliance: As I wrote about this week, the Dodd-Frank regulations could be a major new compliance headache for many organizations, especially those that haven’t been paying close attention. A number of the law’s mandates, interestingly enough, may in some cases discourage employees from coming forward to report fraud. What may be more disconcerting is that the government is still in the process of writing the rules that will govern Dodd-Frank corporate compliance, meaning nobody really knows how onerous it will be.
4. Mobile devices & consumerizaton: Ignored for far too long, employee-owned mobile devices have always been a security problem waiting to happen. These smartphones – and now tablets too – have been rife with sensitive corporate data for a long time, but they were either overlooked as a security risk, or seen as too challenging to rein in. Now enterprises are beginning to understand the risk these devices pose, but it remains to be seen whether emerging device management technology, data-access restrictions, user security policy, or all of the above will be the answer. It’s a topic that seemed to leave more than a few infosec pros scratching their heads (if you’re one of them, be sure to check out Marcia Savage’s great feature, IT consumerization drives new security thinking, from the June 2011 edition of Information Security magazine).
3. Cloud computing reality check: The cloud computing hype has been off the charts for a couple years, but for the first time I started to sense more confidence among information security pros. Why? They now understand the vast majority of today’s enterprise cloud computing is Software as a Service, and not the more complex platform or infrastructure variations that surrender a lot more control to third-party providers. That realization buys security teams some time to not only reassess the cloud computing services in use today and ensure they’re secure, but also to develop a more comprehensive cloud computing security policy so when organizations want to double down on more advanced cloud computing technologies, security teams can be willing partners, not obstructionists.
2. APT & wave of attacks: It started with news of the RSA SecurID breach earlier this year, but since then it seems there’s been a surge in high-profile and advanced attacks unlike anything we’ve ever seen, including Sony, Lockheed Martin, Citigroup, Sega, the UK NHS and the U.S. Senate. It’s a who’s who of the most prominent organizations in the world, and yet they’ve been seemingly powerless to protect their most important data. The two most common reactions I heard this week were, “Yeah, that’s scary stuff,” and, “I’m glad it didn’t happen to my organization.” But this is the age of the advanced persistent threat (APT), which means it’s increasingly likely your data is being stolen right now and you have no idea it’s happening. I heard a lot about APT this week, much of it off the record unfortunately, but what can safely be said is that criminal networks are now commonly penetrating organizational defenses and exfiltrating large amounts of data over a long period of time using complex techniques that even veteran infosec experts find stunning. Marketing hype aside, the APT threat is real, and until the U.S. decides to point the finger squarely at the Chinese government as the driving force behind many of these attacks, you’re pretty much on your own.
1. Risk management: What’s the common theme tying all these issues together? For most enterprise security groups, it’s simply not possible to muster the technology, time and resources to fully mitigate each of these risks. I was struck this week at how the compilation of all these issues has reignited interest in the often-ignored, yet crucially important discipline of enterprise risk management, namely figuring out how to determine which specific threats pose the greatest risk to an organization and then using that information to create an organizational risk profile. The difficult reality of being an information security pro is that not all problems can be solved, especially not all at once, and with security budgets unlikely to get a significant boost anytime soon, investing precious resources in the right place has become a make-or-break proposition.
I know many security pros have focused on risk management for a long time, but to hear a number of attendees verbally acknowledge the importance of formalizing their risk management strategies was fascinating and inspiring. It’s been a tough year so far for security, with one big breach, vulnerability or attack after the next, but seeing so many optimistic security pros at Gartner Security Summit 2011 ready to tackle what’s next made me feel very good about the small role we play in helping you do your best.
About the author:
Eric B. Parizo is senior site editor of TechTarget's Security Media Group. His rants can be heard each month on SearchSecurity.com's Security Squad podcast.

View the original article here

Saturday, July 2, 2011

Cisco introduces AnyConnect to mobile devices

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
The benefits of enabling your workforce with mobile access to enterprise applications, regardless of whether those applications are in the cloud or in the corporate data centre, are clearly recognised. The ease of providing secure remote access to employees, and the ability to maintain corporate data security policies is, however, not simple.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

Both networking and security vendors are actively working to provide solutions to the mobile workforce challenge. So it's no surprise the latest VPN end point client from Cisco is built for today's applications on some of today's most popular mobile devices.
Cisco's new AnyConnect client for iOS, Windows and Mac OSX provides an always on SSL based network aware VPN which provides secure connectivity between a user end point and a Cisco ASA firewall.
Cisco has been in the VPN end point game for many years. In 2010 Cisco claimed to have the most widely deployed VPN client base through the inclusion of Cisco VPN code in all Windows desktop environments but was limited in an IPSEC connectivity environment. So why the move to SSL VPNs?
The Internet has evolved from an environment where applications and ports required network to network encrypted tunnels to a world of applications inside web browsers and data tunnelled over http and https.
A further reason for the move away from IPSEC VPNs is the requirement to install an IPsec client on your endpoints, and to maintain the IPsec configuration files for each IPsec gateway. For clients of large multi-national companies this could mean ten or more xml configuration files which need to be updated when gateway details change.
Vivian Ganitsky, management director of Juniper Networks’ SSL VPN product line, said plenty of Juniper's customers have been moving to SSL VPN for many years. As a result, she said Juniper's Pulse is designed to make it easier for companies to use both IPsec and SSL which allows for a migration path between the VPN technologies.
"The great benefit with IPsec is that it's a fast mode of transport," she said. "It is optimized for quick access to VoIP and screaming media, and fast access to items at the network layer."
Forrester Research analyst Rob Whiteley believes most companies will eventually push IPsec to the sidelines and go full-on with SSL.
"We are in a transition phase," he said in an interview with Information Security magazine, a sister publication to SearchSecurity.com. "We are going to see more SSL deployments until IPSec becomes the niche technology, which is the reverse of today."
As mobile workers roam to different locations, with always-on and intelligent VPN, the Cisco AnyConnect client can:
Automatically select the optimal network access pointAdapt its tunneling protocol to the most efficient methodDirect web requests to the ScanSafe web filtering cloud serviceSplit tunnel between a corporate VPN network and the Internet
Cisco AnyConnect also takes advantage of the Datagram Transport Layer Security (DTLS) protocol which helps provide an optimized connection for latency-sensitive traffic, such as voice over IP (VoIP) and TCP-based application access. AnyConnect was the first VPN client to use DTLS on the market.
Cisco anyconnect on iOS
RFC4347 explains “The basic design philosophy of DTLS is to construct ‘TLS over datagram’. The reason that TLS cannot be used directly in datagram environments is simply that packets may be lost or reordered. TLS has no internal facilities to handle this kind of unreliability, and therefore TLS implementations break when rehosted on datagram transport."
"The purpose of DTLS is to make only the minimal changes to TLS required to fix this problem. To the greatest extent possible, DTLS is identical to TLS. Whenever we need to invent new mechanisms, we attempt to do so in such a way that preserves the style of TLS.”
Support for DTLS first arrived in ASA release 8.0(2) some three years ago; however for the IOS this has just recently been added in IOS® 15.1(2)T. To enable DTLS support network administrators need to enable the dtls service (svc dtls) in the WebVPN group policy. The command has no arguments or keywords.
DTLS is enabled by default on the Cisco ISR G2 series routers (3900, 2900, 1900, 890, and 880) and is disabled by default on other routers. The command config-webvpn-group is used to configure WebVPN group policy.
The Apple AppStore provides the following directive:
AnyConnect for iOS requires a Cisco Adaptive Security Appliance (ASA) running software image 8.0(3).1 or later. The ASA requires an AnyConnect Mobile licence (L-ASA-AC-M-55XX=), as well as either an AnyConnect Essentials (L-ASA-AC-E-55XX=) or AnyConnect Premium Clientless SSL VPN Edition (L-ASA-AC-SSL-YYYY=) license, where XX is the last two digits of your ASA model number and YYYY is the number of simultaneous users. AnyConnect Mobile and Essentials licences are enabled per ASA, there is no per user charge for either of these licences.
Gartner provides other compelling use cases for SSL VPNs.
Protecting access connections used by contractors, providing selective access to systems on a need-to-know basis.Providing secure and private ad hoc connections in the event of business continuity disruptions, such as natural disasters and disease outbreaks.Integration with emergency notification systems (ENSs) to facilitate emergency VPN access.Increasing opportunities for traditional VPN vendors to compete with vendors in adjacent markets, such as Web application delivery, multichannel access gateways for mobile devices and Web application firewalls.Convergence with trusted portable personality devices to develop more-secure portable desktops by use of on-demand security tools originating with SSL VPNs.Improvements in WAN optimization via acceleration, load balancing, traffic shaping and caching.Increasing uses for on-demand security, for example, malware scans, device and software version checks, user geolocation checks on wider ranges of endpoint devices, and operating systems (OSs), especially user-owned workstations and smartphones.

View the original article here

Australian company M5 develop hardware for secure networks

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
As enterprise networks go 'borderless' some networks need to remain secure, and separated into levels of classification from Top Secret to Unclassified. One Australian company is working to bring the benefits of anywhere/anytime/anydevice networking to Government Secure and Classified environments while maintaining network security compliance.
M5 Network Security (M5NetSec) is a division of M5 Networks Australia, a fully Australian-owned company established in 2003. Head quartered in Canberra, M5NetSec provide cyber security services to Defence departments and ministries, corporate entities, and governments. Beginning with a focus on IT consulting within some of most secure Australian government networks, M5NetSec has now embarked on an aggressive programme of Network Security product design which is already turning heads within the security industry.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

In May 2011 M5 Networks attended the AusCERT2011 conference on the Gold Coast with a number of their new hardware devices, including the SCS-200 and SCS-400. These devices allow the connection of remote users to highly classified networks over unsecured ADSL, 3G, Wi-Fi and Ethernet connections. Utilising multi-bearer and multi-path redundancy, the hardware devices can be deployed in minutes and provide touch screen configuration for non-technical users.
The benefits of a simple to configure but highly secure remotely manageable device should not be underestimated. Whether it's the deployment of military personnel in a remote location with satellite upkink, access to classified networks from a Government minister via Australian residential ADSL2+ or a police site office for catastrophe management in the city, the ability to provide secure communications with multiple concurrent self-healing IP uplink paths in a ruggardised unit is impressive.
csc deployment
Built specifically for mobile users the SCS-200 allow one to four users access to highly secure, classified and unclassified networks simultaneously from anywhere in the world using multiple concurrent uplink networks via Wi-Fi, 3G, Satellite, Ethernet and ADSL.
Suitable for military, governmental and commercial use (the device is especially useful within utilities networks) the device is lightweight and rugged, has in-built suspicious and malicious activity detection capabilities, is crypto-agnostic, and can be powered by AC, DC or an inbuilt battery.
Two intuitive touch screen interfaces allow the end user to easily configure the system on-site without the need for expensive technical specialists, and the unit features an inbuilt GPS which allows for the physical tracking of the device itself.
SCS-200 and SCS-400 hardware
By comparison the SCS-400 is a headquarters 'first-in' device with support for up to 150 directed connected users with a self-healing, self-forming IP meshed network utilising two embedded Cisco ESR-5940 routers, up to two security domains per case and concurrent connectivity options of Ethernet, BGAN Satellite, 3G (4G upgradeable), Wi-Fi (client and hotspot), ADSL, HSS and Cellular radio.
Catering for a large number of deployment scenarios, the SCS-400 provides optional capacity to run virtual systems such as email, file, WAN optimisation and other software on board via a dual core Intel i7 powered VMWare ESX environment. SSD disk arrays are also available in the platform, providing onboard storage capabilities within the ruggardised IP65-rated enclosure.
A number of hardware components make this device stand out, including the M5 developed mini-pci ADSL module and the LED port identifiers on the SCS-400. A consistent focus on simplicity in the software design and a professional robust feel to the products reflect the quality of these devices.
Further hardware development is in progress with the team prototyping both a smaller unit for single user deployments (SCS-100) as well as an innovative SCADA protection and intrusion detection device called ‘SPIDA’.
The SPIDA provides high-grade network security and encrypted VPN to often harsh SCADA environments with an array of in-built security features which includes an integrated Sourcefire Snort IDS. At only 600 grams the SPIDA includes an ADSL port, internal 3G/4G and Wi-Fi with optional external antenna. Three multi-role Ethernet ports provide both internal and external communications.
Clearly utilities environments would benefit from such a device, which also supports common SCADA protocols such as MODBUS (TCP) and OPC.

View the original article here

The System Administrators Guild announces 19th annual conference

(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)
The SAGE-AU 19th Annual National Conference is being held at Hilton on the Park in Melbourne 19-23 September 2011. The theme this year, aligning with the amount of interest in the market around ‘Cloud’, is “The Cloud: Silver Lining of Storm?”
SAGE-AU is a not-for-profit professional organisation which was formed to advance the profession of System Administration by raising awareness of the need for System Administrators, and educating System Administrators in technical as well as professional issues.(galaxy s,samsung galaxy s,samsung tab,galaxy tab,samsung galaxy tab,samsung android,android,samsung galaxy s2,galaxy s2,samsung galaxy 2,nokia,nokia mobiles,samsung mobiles,mobiles in india,sony mobiles,nokia mobile,sony ericsson,sony ericsson mobiles,nokia india,samsung mobile)

SAGE-AU activities include very active online communication forums and mailing lists, regional monthly meetings, regional symposiums and an annual national technical conference. SAGE-AU currently has just over 1,000 financial members.
The Technical Program (22-23 September) offers five keynotes including Simone Brunozzi from Amazon Web Services, Simon Hackett from Internode, Guy Harrison from Quest Software and Dr Raj Buyya from Melbourne University.
The conference will provide two streams of concurrent sessions presented by a wealth of speakers including Lee Damon, University of Washington; Jeff Alexander, Microsoft; two speakers from IBM – Doug Tidwell and Snehal Antani; Lawrence Lim, Red Hat; and many more. For full details are available from the SAGE-AU conference website.
The Training Program (19-21 September) provides three concurrent tutorial streams of six units per day for three days. The program includes a number of full day tutorials from Lee Damon, Geoff Halprin and Shane Hoey and a number of half-day tutorials.
A Vendor Exhibition will be on display from 22-23 September. It commences on the Wednesday evening (21 September for one hour) in readiness for the Welcome Reception at 5.00pm). A trivia night is held with proceeds raised during the night donated to a local charity.


(Stephen Gillies has been a member of SAGE-AU for a number of years)

View the original article here

Deer in the Forest

Upload WallpapersDownloads: 250,862,932
Animal Walls: 53,156
All Wallpapers: 582,491
Tag Count: 3,376,043
Comments: 587,106
Members: 244,521
Votes: 7,361,493

4,228 Users Online
211 members, 4017 guests
25fabian, 300SDude, 69ED4, AOZORA, AmarilloByMorning1956, AmyA, Anarka, AndCate, AngelMagic, Apollymi28, BasmaEissa, Bones_1, Caravansarai, CleansingFlame, Cybermannetje, DarkDragon324, Daxe09, DeadlyMoves, Desktopjunkie71, Doomtriger, Dosmac, Drambliukas, DreadyK, Elvin, Evelena, FLCosmin, Fr33man, GMAN_57, GNMilasi, GoalFather, Hellion69, ILikeYou, Itachidoll, JJBOND, JackBauer, Jerome1989, Joni121981, Laming, Lauemek, Lil_Kidd, Lionheart01, Littlefrog, MUHKUHisAlive, Manilook, Marti100, MrBigFeet84, Nannouk, NayotaN, NeroPulsaR, NocturnalX, OMAMAR51, Pergab, Pretender, QK292, Reflect, Robotic, SDK, SFFantasy, Samipie, Silvercowboy, SisterCecilia, SkyPhoenixX1, Stump86, Stunson, Taine, The.Rock, WAX, abccba123, abhijit.panda.89, adidragon, akstar28, alchemist.edo, alexniste, aly_hall, amirkhokhar, ancasimona, andrew__dragon, animevenky, antoniodroland, artxp, asdf1, babylovesme, basharat, beemp3, benspartan3000, bixwax, boredascrap, brightstar, carlisledavid, ccc008, celticsfan1, chosenpackman, cjwgp28, clark1414, conb65, cougar4, craig68, creepo99, cwilcox6, daredaviltwins, darkgrave, davey743, davwilli, dawnbright, deathadder, densisono, dittyrock, djezar, donds99, dreadon, ejlarosa, ela002, emnm56, eriol75, fairytale, fallout2312, fardoche, finner, florlewin, forestrecon, foxyroxster, franknsign, fuktup96, geaktoni, gl2aview, gobbish, gunnakin, gwegiel61, henriiv, hot_girls_only, imransajan6, irfan2290, israel9161, ivisek333, iwoos, jaimeboddien, jandkk, janhall_us, jazz2009, jeff_ong, jessiedarko, jimi12, jimmynoons, johjoh, jonsmith28, kamakazi_y2k, kartikathunder, killopoli, krasystoev, lakoakos, lane12, lyananis72, marimbondo, mikereggie, miragejz, mithrai, nahamaral, nerobojan, nicolemaschke, obito, oskhrs, parth281291, patou01, pluh, ppoiii, prankter, princesspixie12, raden, ramaske, rambleach, rattlhead, ricardoodracir, rocketero, roronoa, rosarina, sailormoonndragonball, sandrose, sedmic, shady3002, shazatora, shecougar, shivers, silverwings58, spel, splizzle, srishti1402, ssaim3100, stochita, stoyan200, tggersen, themetamonster, tora, trv, tyumed, ucsdm9, uncle_pain, valren, veselin, vipi, vishal9, warlokk, wetwellie1, xristos666, yanthia, youngmillz, zekeielt, zero_phoenix009, zizimaus, zjimmy, zontor, zxczxc

Most users ever online was 12,942 on 3/10/11.

Leave us feedback!Support This Site

View the original article here

feeding the deers

Upload WallpapersDownloads: 250,862,932
Animal Walls: 53,156
All Wallpapers: 582,491
Tag Count: 3,376,043
Comments: 587,106
Members: 244,521
Votes: 7,361,493

4,039 Users Online
199 members, 3840 guests
25fabian, 300SDude, AOZORA, AmarilloByMorning1956, AmyA, Anarka, AndCate, AngelMagic, Apollymi28, BasmaEissa, Bones_1, Caravansarai, CleansingFlame, Cybermannetje, DarkDragon324, Daxe09, DeadlyMoves, Desktopjunkie71, Doomtriger, Dosmac, Drambliukas, DreadyK, FLCosmin, Fr33man, GMAN_57, GNMilasi, GoalFather, Hellion69, ILikeYou, Itachidoll, JJBOND, JackBauer, Jerome1989, Joni121981, Laming, Lauemek, Lil_Kidd, Lionheart01, Littlefrog, MUHKUHisAlive, Manilook, Marti100, MrBigFeet84, Nannouk, NayotaN, NeroPulsaR, NocturnalX, OMAMAR51, Pergab, QK292, Reflect, Robotic, SDK, SFFantasy, Samipie, Silvercowboy, SisterCecilia, SkyPhoenixX1, Stump86, Stunson, Taine, The.Rock, WAX, abccba123, abhijit.panda.89, adidragon, akstar28, alchemist.edo, alexniste, aly_hall, amirkhokhar, ancasimona, andrew__dragon, animevenky, antoniodroland, artxp, asdf1, basharat, batdrum34, beemp3, benspartan3000, bixwax, brightstar, carlisledavid, ccc008, celticsfan1, chosenpackman, cjwgp28, clark1414, conb65, cougar4, craig68, creepo99, cwilcox6, daredaviltwins, darkgrave, davey743, davwilli, dawnbright, deathadder, densisono, dittyrock, djezar, donds99, dreadon, ejlarosa, ela002, emnm56, eriol75, fairytale, fallout2312, fardoche, finner, florlewin, forestrecon, foxyroxster, franknsign, fuktup96, geaktoni, gl2aview, gobbish, gwegiel61, henriiv, hot_girls_only, imransajan6, irfan2290, israel9161, ivisek333, jaimeboddien, jandkk, janhall_us, jazz2009, jeff_ong, jessiedarko, jimi12, jimmynoons, johjoh, jonsmith28, kartikathunder, killopoli, krasystoev, lakoakos, lane12, lyananis72, marimbondo, mikereggie, miragejz, mithrai, nahamaral, nerobojan, nicolemaschke, obito, oskhrs, parth281291, patou01, pluh, ppoiii, prankter, princesspixie12, raden, ramaske, rambleach, rattlhead, ricardoodracir, rocketero, roronoa, rosarina, sandrose, sedmic, shady3002, shazatora, shecougar, silverwings58, spel, splizzle, srishti1402, ssaim3100, stochita, stoyan200, tggersen, themetamonster, tora, trv, tyumed, ucsdm9, valren, veselin, vipi, warlokk, wetwellie1, xristos666, yanthia, youngmillz, zekeielt, zero_phoenix009, zizimaus, zjimmy, zontor, zxczxc

Most users ever online was 12,942 on 3/10/11.

Leave us feedback!Support This Site

View the original article here

A-herd-of-deer

Upload WallpapersDownloads: 250,862,932
Animal Walls: 53,156
All Wallpapers: 582,491
Tag Count: 3,376,043
Comments: 587,106
Members: 244,521
Votes: 7,361,493

3,966 Users Online
197 members, 3769 guests
25fabian, 300SDude, AOZORA, AmarilloByMorning1956, AmyA, Anarka, AndCate, AngelMagic, Apollymi28, BasmaEissa, Bones_1, Caravansarai, CleansingFlame, Cybermannetje, DarkDragon324, Daxe09, DeadlyMoves, Desktopjunkie71, Doomtriger, Dosmac, Drambliukas, DreadyK, FLCosmin, Fr33man, GMAN_57, GNMilasi, GoalFather, Hellion69, ILikeYou, Itachidoll, JJBOND, JackBauer, Jerome1989, Joni121981, Laming, Lauemek, Lil_Kidd, Lionheart01, Littlefrog, MUHKUHisAlive, Manilook, Marti100, MrBigFeet84, Nannouk, NayotaN, NeroPulsaR, NocturnalX, OMAMAR51, Pergab, QK292, Reflect, Robotic, SDK, SFFantasy, Samipie, Silvercowboy, SisterCecilia, SkyPhoenixX1, Stump86, Stunson, Taine, The.Rock, WAX, abccba123, abhijit.panda.89, adidragon, akstar28, alchemist.edo, alexniste, aly_hall, amirkhokhar, ancasimona, andrew__dragon, animevenky, antoniodroland, artxp, asdf1, basharat, batdrum34, beemp3, benspartan3000, bixwax, brightstar, carlisledavid, ccc008, celticsfan1, chosenpackman, cjwgp28, clark1414, conb65, cougar4, craig68, creepo99, cwilcox6, daredaviltwins, darkgrave, davey743, davwilli, dawnbright, deathadder, densisono, dittyrock, djezar, donds99, dreadon, ejlarosa, ela002, emnm56, eriol75, fairytale, fallout2312, fardoche, finner, florlewin, forestrecon, foxyroxster, franknsign, fuktup96, geaktoni, gl2aview, gobbish, gwegiel61, henriiv, hot_girls_only, imransajan6, irfan2290, israel9161, ivisek333, jaimeboddien, jandkk, janhall_us, jazz2009, jeff_ong, jessiedarko, jimi12, jimmynoons, johjoh, jonsmith28, kartikathunder, killopoli, krasystoev, lakoakos, lane12, lyananis72, marimbondo, mikereggie, miragejz, mithrai, nahamaral, nerobojan, nicolemaschke, obito, parth281291, patou01, pluh, ppoiii, prankter, princesspixie12, raden, ramaske, rambleach, rattlhead, ricardoodracir, rocketero, roronoa, rosarina, sandrose, sedmic, shady3002, shecougar, silverwings58, spel, splizzle, srishti1402, ssaim3100, stochita, stoyan200, tggersen, themetamonster, tora, trv, tyumed, ucsdm9, valren, veselin, vipi, warlokk, wetwellie1, xristos666, yanthia, youngmillz, zekeielt, zero_phoenix009, zizimaus, zjimmy, zontor, zxczxc

Most users ever online was 12,942 on 3/10/11.

Leave us feedback!Support This Site

View the original article here

moose pair

Upload WallpapersDownloads: 250,862,932
Animal Walls: 53,156
All Wallpapers: 582,491
Tag Count: 3,376,043
Comments: 587,106
Members: 244,521
Votes: 7,361,493

4,244 Users Online
212 members, 4032 guests
25fabian, 300SDude, 69ED4, AOZORA, AmarilloByMorning1956, AmyA, Anarka, AndCate, AngelMagic, Apollymi28, BasmaEissa, Bones_1, Caravansarai, CleansingFlame, Cybermannetje, DarkDragon324, Daxe09, DeadlyMoves, Desktopjunkie71, Doomtriger, Dosmac, Drambliukas, DreadyK, Elvin, Evelena, FLCosmin, Fr33man, GMAN_57, GNMilasi, GoalFather, Hellion69, ILikeYou, Itachidoll, JJBOND, JackBauer, Jerome1989, Joni121981, Laming, Lauemek, Lil_Kidd, Lionheart01, Littlefrog, MUHKUHisAlive, Manilook, Marti100, MrBigFeet84, Nannouk, NayotaN, NeroPulsaR, NocturnalX, OMAMAR51, Pergab, Pretender, QK292, Reflect, Robotic, SDK, SFFantasy, Samipie, Silvercowboy, SisterCecilia, SkyPhoenixX1, Stump86, Stunson, Taine, The.Rock, WAX, abccba123, abhijit.panda.89, adidragon, akstar28, alchemist.edo, alexniste, aly_hall, amirkhokhar, ancasimona, andrew__dragon, animevenky, antoniodroland, artxp, asdf1, babylovesme, basharat, beemp3, benspartan3000, bixwax, boredascrap, brightstar, carlisledavid, ccc008, celticsfan1, chosenpackman, cjwgp28, clark1414, conb65, cougar4, craig68, creepo99, cwilcox6, daredaviltwins, darkgrave, davey743, davwilli, dawnbright, deathadder, densisono, dittyrock, djezar, donds99, dreadon, ejlarosa, ela002, emnm56, eriol75, fairytale, fallout2312, fardoche, finner, florlewin, forestrecon, foxyroxster, franknsign, fuktup96, geaktoni, gl2aview, gobbish, gunnakin, gwegiel61, henriiv, hot_girls_only, imransajan6, irfan2290, israel9161, ivisek333, iwoos, jaimeboddien, jandkk, janhall_us, jazz2009, jeff_ong, jessiedarko, jimi12, jimmynoons, johjoh, jonsmith28, kamakazi_y2k, kartikathunder, killopoli, krasystoev, lakoakos, lane12, lyananis72, marimbondo, mikereggie, miragejz, mithrai, nahamaral, nerobojan, nicolemaschke, obito, oskhrs, parth281291, patou01, pluh, ppoiii, prankter, princesspixie12, raden, ramaske, rambleach, rattlhead, ricardoodracir, rocketero, roronoa, rosarina, sailormoonndragonball, sandrose, sedmic, shady3002, shazatora, shecougar, shivers, silverwings58, spel, splizzle, srishti1402, ssaim3100, stochita, stoyan200, tggersen, the4elements, themetamonster, tora, trv, tyumed, ucsdm9, uncle_pain, valren, veselin, vipi, vishal9, warlokk, wetwellie1, xristos666, yanthia, youngmillz, zekeielt, zero_phoenix009, zizimaus, zjimmy, zontor, zxczxc

Most users ever online was 12,942 on 3/10/11.

Leave us feedback!Support This Site
This wallpaper has no comments yet.  Be the first! Download It! animals, autumn, forest, moose, mountains, painting, pair, river, season, stream, trees, water

View the original article here

october rendezvous

Upload WallpapersDownloads: 250,862,932
Animal Walls: 53,156
All Wallpapers: 582,491
Tag Count: 3,376,043
Comments: 587,106
Members: 244,521
Votes: 7,361,493

4,244 Users Online
212 members, 4032 guests
25fabian, 300SDude, 69ED4, AOZORA, AmarilloByMorning1956, AmyA, Anarka, AndCate, AngelMagic, Apollymi28, BasmaEissa, Bones_1, Caravansarai, CleansingFlame, Cybermannetje, DarkDragon324, Daxe09, DeadlyMoves, Desktopjunkie71, Doomtriger, Dosmac, Drambliukas, DreadyK, Elvin, Evelena, FLCosmin, Fr33man, GMAN_57, GNMilasi, GoalFather, Hellion69, ILikeYou, Itachidoll, JJBOND, JackBauer, Jerome1989, Joni121981, Laming, Lauemek, Lil_Kidd, Lionheart01, Littlefrog, MUHKUHisAlive, Manilook, Marti100, MrBigFeet84, Nannouk, NayotaN, NeroPulsaR, NocturnalX, OMAMAR51, Pergab, Pretender, QK292, Reflect, Robotic, SDK, SFFantasy, Samipie, Silvercowboy, SisterCecilia, SkyPhoenixX1, Stump86, Stunson, Taine, The.Rock, WAX, abccba123, abhijit.panda.89, adidragon, akstar28, alchemist.edo, alexniste, aly_hall, amirkhokhar, ancasimona, andrew__dragon, animevenky, antoniodroland, artxp, asdf1, babylovesme, basharat, beemp3, benspartan3000, bixwax, boredascrap, brightstar, carlisledavid, ccc008, celticsfan1, chosenpackman, cjwgp28, clark1414, conb65, cougar4, craig68, creepo99, cwilcox6, daredaviltwins, darkgrave, davey743, davwilli, dawnbright, deathadder, densisono, dittyrock, djezar, donds99, dreadon, ejlarosa, ela002, emnm56, eriol75, fairytale, fallout2312, fardoche, finner, florlewin, forestrecon, foxyroxster, franknsign, fuktup96, geaktoni, gl2aview, gobbish, gunnakin, gwegiel61, henriiv, hot_girls_only, imransajan6, irfan2290, israel9161, ivisek333, iwoos, jaimeboddien, jandkk, janhall_us, jazz2009, jeff_ong, jessiedarko, jimi12, jimmynoons, johjoh, jonsmith28, kamakazi_y2k, kartikathunder, killopoli, krasystoev, lakoakos, lane12, lyananis72, marimbondo, mikereggie, miragejz, mithrai, nahamaral, nerobojan, nicolemaschke, obito, oskhrs, parth281291, patou01, pluh, ppoiii, prankter, princesspixie12, raden, ramaske, rambleach, rattlhead, ricardoodracir, rocketero, roronoa, rosarina, sailormoonndragonball, sandrose, sedmic, shady3002, shazatora, shecougar, shivers, silverwings58, spel, splizzle, srishti1402, ssaim3100, stochita, stoyan200, tggersen, the4elements, themetamonster, tora, trv, tyumed, ucsdm9, uncle_pain, valren, veselin, vipi, vishal9, warlokk, wetwellie1, xristos666, yanthia, youngmillz, zekeielt, zero_phoenix009, zizimaus, zjimmy, zontor, zxczxc

Most users ever online was 12,942 on 3/10/11.

Leave us feedback!Support This Site

View the original article here

THE FAWN AND THE BABY SKUNK

Upload WallpapersDownloads: 250,862,932
Animal Walls: 53,156
All Wallpapers: 582,491
Tag Count: 3,376,043
Comments: 587,106
Members: 244,521
Votes: 7,361,493

4,185 Users Online
209 members, 3976 guests
25fabian, 300SDude, 69ED4, AOZORA, AmarilloByMorning1956, AmyA, Anarka, AndCate, AngelMagic, Apollymi28, BasmaEissa, Bones_1, Caravansarai, CleansingFlame, Cybermannetje, DarkDragon324, Daxe09, DeadlyMoves, Desktopjunkie71, Doomtriger, Dosmac, Drambliukas, DreadyK, Elvin, FLCosmin, Fr33man, GMAN_57, GNMilasi, GoalFather, Hellion69, ILikeYou, Itachidoll, JJBOND, JackBauer, Jerome1989, Joni121981, Laming, Lauemek, Lil_Kidd, Lionheart01, Littlefrog, MUHKUHisAlive, Manilook, Marti100, MrBigFeet84, Nannouk, NayotaN, NeroPulsaR, NocturnalX, OMAMAR51, Pergab, Pretender, QK292, Reflect, Robotic, SDK, SFFantasy, Samipie, Silvercowboy, SisterCecilia, SkyPhoenixX1, Stump86, Stunson, Taine, The.Rock, WAX, abccba123, abhijit.panda.89, adidragon, akstar28, alchemist.edo, alexniste, aly_hall, amirkhokhar, ancasimona, andrew__dragon, animevenky, antoniodroland, artxp, asdf1, babylovesme, basharat, beemp3, benspartan3000, bixwax, boredascrap, brightstar, carlisledavid, ccc008, celticsfan1, chosenpackman, cjwgp28, clark1414, conb65, cougar4, craig68, creepo99, cwilcox6, daredaviltwins, darkgrave, davey743, davwilli, dawnbright, deathadder, densisono, dittyrock, djezar, donds99, dreadon, ejlarosa, ela002, emnm56, eriol75, fairytale, fallout2312, fardoche, finner, florlewin, forestrecon, foxyroxster, franknsign, fuktup96, geaktoni, gl2aview, gobbish, gunnakin, gwegiel61, henriiv, hot_girls_only, imransajan6, irfan2290, israel9161, ivisek333, iwoos, jaimeboddien, jandkk, janhall_us, jazz2009, jeff_ong, jessiedarko, jimi12, jimmynoons, johjoh, jonsmith28, kamakazi_y2k, kartikathunder, killopoli, krasystoev, lakoakos, lane12, lyananis72, marimbondo, mikereggie, miragejz, mithrai, nahamaral, nerobojan, nicolemaschke, obito, oskhrs, parth281291, patou01, pluh, ppoiii, prankter, princesspixie12, raden, ramaske, rambleach, rattlhead, ricardoodracir, rocketero, roronoa, rosarina, sandrose, sedmic, shady3002, shazatora, shecougar, shivers, silverwings58, spel, splizzle, srishti1402, ssaim3100, stochita, stoyan200, tggersen, themetamonster, tora, trv, tyumed, ucsdm9, uncle_pain, valren, veselin, vipi, vishal9, warlokk, wetwellie1, xristos666, yanthia, youngmillz, zekeielt, zero_phoenix009, zizimaus, zjimmy, zontor, zxczxc

Most users ever online was 12,942 on 3/10/11.

Leave us feedback!Support This Site

View the original article here

Fawn Nursing

Upload WallpapersDownloads: 250,862,932
Animal Walls: 53,156
All Wallpapers: 582,491
Tag Count: 3,376,043
Comments: 587,106
Members: 244,521
Votes: 7,361,493

4,005 Users Online
197 members, 3808 guests
25fabian, 300SDude, AOZORA, AmarilloByMorning1956, AmyA, Anarka, AndCate, AngelMagic, Apollymi28, BasmaEissa, Bones_1, Caravansarai, CleansingFlame, Cybermannetje, DarkDragon324, Daxe09, DeadlyMoves, Desktopjunkie71, Doomtriger, Dosmac, Drambliukas, DreadyK, FLCosmin, Fr33man, GMAN_57, GNMilasi, GoalFather, Hellion69, ILikeYou, Itachidoll, JJBOND, JackBauer, Jerome1989, Joni121981, Laming, Lauemek, Lil_Kidd, Lionheart01, Littlefrog, MUHKUHisAlive, Manilook, Marti100, MrBigFeet84, Nannouk, NayotaN, NeroPulsaR, NocturnalX, OMAMAR51, Pergab, QK292, Reflect, Robotic, SDK, SFFantasy, Samipie, Silvercowboy, SisterCecilia, SkyPhoenixX1, Stump86, Stunson, Taine, The.Rock, WAX, abccba123, abhijit.panda.89, adidragon, akstar28, alchemist.edo, alexniste, aly_hall, amirkhokhar, ancasimona, andrew__dragon, animevenky, antoniodroland, artxp, asdf1, basharat, batdrum34, beemp3, benspartan3000, bixwax, brightstar, carlisledavid, ccc008, celticsfan1, chosenpackman, cjwgp28, clark1414, conb65, cougar4, craig68, creepo99, cwilcox6, daredaviltwins, darkgrave, davey743, davwilli, dawnbright, deathadder, densisono, dittyrock, djezar, donds99, dreadon, ejlarosa, ela002, emnm56, eriol75, fairytale, fallout2312, fardoche, finner, florlewin, forestrecon, foxyroxster, franknsign, fuktup96, geaktoni, gl2aview, gobbish, gwegiel61, henriiv, hot_girls_only, imransajan6, irfan2290, israel9161, ivisek333, jaimeboddien, jandkk, janhall_us, jazz2009, jeff_ong, jessiedarko, jimi12, jimmynoons, johjoh, jonsmith28, kartikathunder, killopoli, krasystoev, lakoakos, lane12, lyananis72, marimbondo, mikereggie, miragejz, mithrai, nahamaral, nerobojan, nicolemaschke, obito, parth281291, patou01, pluh, ppoiii, prankter, princesspixie12, raden, ramaske, rambleach, rattlhead, ricardoodracir, rocketero, roronoa, rosarina, sandrose, sedmic, shady3002, shecougar, silverwings58, spel, splizzle, srishti1402, ssaim3100, stochita, stoyan200, tggersen, themetamonster, tora, trv, tyumed, ucsdm9, valren, veselin, vipi, warlokk, wetwellie1, xristos666, yanthia, youngmillz, zekeielt, zero_phoenix009, zizimaus, zjimmy, zontor, zxczxc

Most users ever online was 12,942 on 3/10/11.

Leave us feedback!Support This Site

View the original article here