Date: Mon, 13 Oct 2003 12:08:30 -0400 (EDT)
From:"Network Computing Newsletter" <Network_Computing_Newsletter@update.networkcomputing.com> 
Subject: Network Computing Report #321
Network Computing Report #321
http://www.networkcomputing.com/
Monday, October 13, 2003

-----------------------------------------------------------
As small to medium sized businesses deploy PCs in more 
innovative, revenue-generating applications, the need for 
business-critical PC capabilities in the SMB arena is growing 
rapidly.  Find out what more than 3,000 IT professionals 
deemed important to selecting and choosing the right 
business PC technology.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B4fn0AR

-----------------------------------------------------------

This week, we tested six Web services security gateway products. Read
how they can help stop invaders and why Forum Systems' Sentry earned
our Editor's Choice. Plus, check out our editor's hot white paper pick
on Web services security.

If you're looking for real-world insights on outsourcing IT, check out
our newly launched forum, Outsourcing Center. Wesley Bertch, the
director of software operations at Life Time Fitness, is our guest
moderator, so post your questions and share your knowledge. Get the
details in our Newsletter Specials section.

And don't forget our other forums, Ask the Experts and Shop Talk. You
can browse for real-world, hands-on advice on tough IT problems from
NWC editors and readers as well as post questions. Our Current Forum
Threads section has all the details.

As always, please feel free to message us directly if you have any
comments or questions (mailto:newsletter@nwc.com).

Best regards,
--The Network Computing Report Team

-----------------------------------------------------------
In This Issue:
-----------------------------------------------------------
1)  Newsletter Specials
2)  Feature: WS-Security Gateways
3)  Last Mile
4)  Review: WS-Security Gateways
5)  Editor's Hot White Paper Pick
6)  Secure Enterprise: Fingerprints May Lure Attackers
7)  Sneak Preview: Clearsight Networks' Gigabit Analyzer
8)  Current Forum Threads
9)  Sneak Preview: Cisco's CallManager Express and Unity
      Express
10) BuzzCut
11) Network Computing's Security Pipeline: Don't Compromise
      on Security Testing
12) NWC Weblogs
13) Interactive Buyer's Guide: Web Middleware
14) Editor's Bookshelf and Storage White Paper Pick
15) Network Computing's Storage Pipeline: EMC, IBM Team Up to
      Help Customers With Mixed Infrastructure
16) Developing Trends: One Tool Doesn't Cut It
17) Mobile Pipeline: Acquiring Wireless Services: On to Phase 2
18) Career Coach
19) CMP Marketplace
20) Latest IT Professional Downloads
21) Subscription Information

------------------------------------------------------------
1) Newsletter Specials
------------------------------------------------------------
a) New Outsourcing Forum
Whether you're casting your development dollars overseas or
contemplating IT consulting in your own backyard, now you can post
your questions and share your knowledge on all aspects of outsourcing
IT on our newly launched forum, Outsourcing Center. To get things
started, we've invited Wesley Bertch, the director of software
operations at Life Time Fitness, to be our guest moderator. Ask Wesley
about his current outsourcing endeavors for a candid look at this
dangerous, but potentially beneficial practice.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBm0A4

b) Calling All Sig Files
In the spirit of giving, we'd like to invite each of you to submit
your favorite e-mail or newsgroup taglines--but please send only those
an IT professional (a.k.a., geek) could love. We'll publish the best
in print and online. Here's one of our favorites to start things off:
--"Did you know that if you play a Windows 2000 CD backwards, you will
hear the voice of Satan? // "That's nothing!  If you play it forward,
it'll install Windows 2000."
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBn0A5

c) Top 11: USB Media Drives
This week, we're looking for the Top 11 unintended uses for USB media
drives. Make us laugh and we'll publish your submission. Here are a
few ideas to get you started:
--Stir cocktails gratuitously.
--Budget MP3 player, just add headphones!
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BjCi0Af

d) Related Articles
Based on our recent move to a new content delivery system, we've added
a new tool to each article on www.nwc.com that allows you to see new
articles similar in content to that article. In other words, we've
added related contextual links to all our stories. Check them out here
(just look for the box labeled "Recent Security Articles").
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBo0A6

e) SIM Interactive Report Card
We tested six SIM (security information management) tools and found
that, for the most part, they deliver on their promises. Now you can
use our Interactive Report Card to see how these products stack up
according to your own priorities, choosing weightings for correlation,
architecture, reporting, price and integration.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBp0A7

f) CompareIT: Managed VPN Services
A fully managed VPN Service provides secure communications to all
remote locations, bypassing the need for expensive leased-line
networks. In addition, using a managed service can cut cost by
removing the need to provide your own in-house network security team.
Compare offerings from Exodus, Netifice and XO Communications.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBq0A8

g) Career Coach
Network Computing's Career Coach can get expert answers to your
thorniest workplace issues, be they certification questions, political
games gone haywire, geek etiquette or technical woes. Write the Career
Coach at:
careercoach@nwc.com

h) Introducing Mobile Pipeline
CMP's TechWeb division is proud to announce its brand new Mobile
Pipeline! Get the latest mobile and wireless news, trends, how-tos and
product information on wireless LANs, mobile devices, technologies and
much more.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CAPw0AS

i) What Your PC Vendors Need to Know
Your key PC vendors will be watching closely to see what you think of
them when InformationWeek publishes its latest Analyzing the Vendors
series report later this year. Each year we give IT professionals the
opportunity to rate their key vendors on a wide range of performance
and satisfaction issues. In return for your participation you will be
entered into a drawing for one $2,500 and three $500 cash prizes and
obtain free, in-depth evaluations of specific PC companies. Check out
this fast and totally confidential survey.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CAht0An

------------------------------------------------------------
2) Feature: WS-Security Gateways
------------------------------------------------------------
By Lori MacVittie
The promise of Web services is mighty tempting, but beware of the
technology's security vulnerabilities. WS-Security gateways can help
ensure your data's safety.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBr0AA

Read books on this topic.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BjYs0AD

Read more articles on this subject.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CN80AI

Read Web services security white papers.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBs0AB

Market research and analyst reports.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BsdA0Ah

------------------------------------------------------------
3) Last Mile
------------------------------------------------------------
Edited By Bradley F. Shimmin and Dave Joachim
This Edition: Top 11 lame excuses given by the Blaster Worm suspect;
Geek signatures; Who's Online?
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBt0AC

Plus:

Extended Top 11 Blaster Excuses List
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBu0AD

Calling All Sig Files, Geek Style
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBn0A5

Complete Text for Who's Online, by Lee Ratzman
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBv0AE

------------------------------------------------------------
4) Review: WS-Security Gateways
------------------------------------------------------------
By Lori MacVittie and Jeff Forristal
Is your Layer 7 firewall letting in treacherous XML traffic? All six
of the WS-Security gateways we tested can help thwart invaders, but
Forum Systems' Sentry stood tall for our Editor's Choice.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBw0AF

Read books on this topic.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BjYs0AD

Read more articles on this subject.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CN80AI

Read Web services security white papers.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBs0AB

Market research and analyst reports.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BsdA0Ah

------------------------------------------------------------
5) Editor's Hot White Paper Pick
------------------------------------------------------------
Our editors have chosen "Web Services Security Today with SSL"
from Service Integrity as this week's hot white paper pick.

What is the largest barrier to Web Services adoption?
The answer: security concerns. But the reality is that most Web
services can be securely implemented using digital certificates and
the SSL protocol, then monitored to ensure that security is not
compromised. Together, these provide a sensible approach to the
majority of today's Web service security challenges. Read this Service
Integrity white paper to learn how to use these technologies to
overcome these obstacles quickly and easily.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCk0A3

Access more white papers, case studies and product information on Web
Services Security in the Network Computing Tech Library.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BtXL0Ah

------------------------------------------------------------
6) Secure Enterprise: Fingerprints May Lure Attackers
------------------------------------------------------------
By Robert Moskowitz
Even with a perfectly trustworthy fingerprint database it does not
help to know a system file is unaltered if that file, through a buffer
overflow, is itself a method of attack.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBy0AH

Read more from Network Computing's Secure Enterprise.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B8C70Az

------------------------------------------------------------
7) Sneak Preview: Clearsight Networks' Gigabit Analyzer
------------------------------------------------------------
By Lee Badman
This tool answers the challenges of decoding high-speed, high-capacity
networks--all with user-friendly ease.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBBz0AI

Read books on this topic.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BjYs0AD

Read more articles on this subject.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CTE0Ab

Read gigabit analyzers white papers.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBB10A4

Market research and analyst reports.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BsdA0Ah

------------------------------------------------------------
8) Current Forum Threads
------------------------------------------------------------
a) Ask the Experts: Active Directory and icmp Issues
By Walter Browning
We're migrating from Windows NT domains to an AD schema. I'm on the
networking side...our server group complains that our router access
lists, which block icmp pings (because of hackers and viruses, etc.),
also prevents communication between AD controllers. Is this the case?
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBB20A5

b) Shop Talk: Enterprising AP
By Uday Hajari
I read Jesse Lindeman's piece on wireless networking. I just happen to
be implementing the same Proxim ap-2000b/g access points in a hotel
environment with three floors. Currently, I have installed one AP on
the first floor and have great access all throughout the lobby and
hall areas (open areas). However, I tested several rooms and have no
signal strength. I would say the distance between the AP and the
closest room is around 40 to 50 feet. I am also using Proxim's combo
a/b/g PCMCIA card. Have you had any luck with the company's extender
antenna and would that help in the range issue?
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBB30A6

Got a tough question? Ask the Experts.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B5tT0AG

Need to vent or commiserate? Talk shop in Shop Talk.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40Boqs0Ag

------------------------------------------------------------
9) Sneak Preview: Cisco's CallManager Express and Unity Express
------------------------------------------------------------
By Joel Conover
Designed for the autonomous branch office, Cisco's latest adds an IP
telephony key system and voicemail support to its 2600XM, 2691 and
3700 series routers.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBB40A7

Online-Only: Audio Samples
Check out Joel Conover's audio samples used in his review of Cisco's
telephony products. (Requires RealPlayer)
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBB50A8

Read books on this topic.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BjYs0AD

Read more articles on this subject.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40COC0AU

Read IP telephony and router white papers.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBB60AA

Market research and analyst reports.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BsdA0Ah

------------------------------------------------------------
10) BuzzCut
------------------------------------------------------------
a) Migration Pain in the Real World
By Lori MacVittie
Faced with a lack of support from some of the application
infrastructure vendors we chose for our fictional company, NWC Inc.,
which we use to test enterprise apps against simulated traffic and
transaction data, we've decided to make some changes.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBB70AB

b) Microsoft Embraces BIOS Vendor Phoenix
By Steven J. Schuchart Jr
The reality of the agreement will mean fewer choices for customers and
more control for Microsoft.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBB80AC

c) The Trade-Offs of On-Demand Computing
By Don MacVittie
The press seems to be missing the point about IBM's Virtual Server
Service, which gives customers on-demand server space.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCA0AM

------------------------------------------------------------
11) Network Computing's Security Pipeline: Don't Compromise
    on Security Testing
------------------------------------------------------------
By Don MacVittie
It amazes me that in today's hostile IT security environment,
companies rely on firms that don't specialize in security to test and
validate their security measures. In a large corporation it's often
easier to convince management to sign-off on IBM or a large accounting
firm like Price-Waterhouse-Coopers to perform penetration testing and
security audits than the companies that really know this business.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B7BE0AD

Read more from Network Computing's Security Pipeline.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B6hK0Au

------------------------------------------------------------
12) NWC Weblogs
------------------------------------------------------------
a) The Daily Blog: CyberTerrorism By Real Terrorists?
A British "task force against high-tech crime" is planning to
investigate possible ties between virus writers and actual terrorist
groups. Rather disturbing, but you have to figure it was only a matter
of time before someone considered a possible link.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCB0AN

b) The Daily Blog: Best Worst Server Name Compendium Oversight
Thanks again to all of you who submitted entries to our server name
competition. We tried to include all of the quality entries in our
online compendium, but as is always the case, one or two goodies
slipped through the cracks.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCC0AO

Be sure to check out our other blogs:

Site Content
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B5Mm0A1

MoblogIT
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B6IL0AQ

NWC Inc.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BiG60Ar

NWC Goes to School
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BkTj0Ay

------------------------------------------------------------
13) Interactive Buyer's Guide: Web Middleware
------------------------------------------------------------
Three-tier architectures' flexibility, scalability and robust
nature are winning more believers. Our comparative database
examines built-in management functionality, security features,
Script languages supported, and more to help you with your Web
middleware product selection.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCD0AP

Read books on this topic.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BjYs0AD

Read more articles on this subject.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CTM0Aj

Read Web middleware white papers.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCE0AQ

Market research and analyst reports.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BsdA0Ah

------------------------------------------------------------
14) Editor's Bookshelf and Storage White Paper Pick
------------------------------------------------------------
Our editors have chosen "Web Security: A Step-by-Step Reference Guide"
by Lincoln D. Stein as this week's featured companion book. Written
for Web site administrators, developers and end users, this book is a
readable, real-world guide to securing your Web site with the latest
in security technology, techniques and tools.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40Btrv0Ap

Find other books.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BjYs0AD

-------------------------------------------------------------
Storage White Paper Pick: An Overview of WORM Technology--Storing
Fixed-Content Non-Erasable Data
-------------------------------------------------------------
This Datalink white paper provides information about new technical
advances in tape and RAID WORM storage that promise more
cost-effective and efficient options than ever before, particularly
compared to optical WORM technology.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCF0AR

Access more storage white papers, case studies and product information
in the Network Computing Tech Library.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B5Mp0A4

For the latest technical information on today's key IT issues, visit
Network Computing's Tech Library.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BsdA0Ah

Get the latest IT white papers via our RSS feed.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40Bu2H0A1

------------------------------------------------------------
15) Network Computing's Storage Pipeline: EMC, IBM Team Up to
    Help Customers With Mixed Infrastructure
------------------------------------------------------------
Storage rivals EMC and IBM have partnered to swap programming
interfaces for better interoperability of their disk arrays. They'll
also boost joint support for customers who use both companies'
products.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCG0AS

Online Poll: Bucks Per Byte
Step into our polling place and tell us how much you'll spend per
gigabyte on SANs in the next year.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCH0AT

Read more from Network Computing's Storage Pipeline.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B1260Aa

------------------------------------------------------------
16) Developing Trends: One Tool Doesn't Cut It
------------------------------------------------------------
By Don MacVittie
Those who know more than one language can deliver solutions that
address business needs more quickly.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCI0AU

------------------------------------------------------------
17) Mobile Pipeline: Acquiring Wireless Services: On to Phase 2
------------------------------------------------------------
By David Haskin
You'll be surprised at how much your enterprise can save on wireless
data and voice services. A consultant describes how to proceed.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCJ0AV

Read more from TechWeb's Mobile Pipeline.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CAPw0AS

------------------------------------------------------------
18) Career Coach
------------------------------------------------------------
Edited By Lorna Garey
This Edition: The blackout of 2003 has one IT professional pondering
future disaster recovery--and preparation. Also, implementing an HR
management system.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CBCK0AW

------------------------------------------------------------
19) CMP Marketplace
------------------------------------------------------------
CNS Inc. introduces their newest high performance touch screen
computers based on Intel's 865 chip set CPU board with processor
speeds up to 3 GHz. The panel mount metal enclosure is very 
compact, and forms an ideal solution for industrial applications.
Standard and low profile PCI expansion cards are supported. 
More details at 
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BtPg0A1


---------------------------------------------------------------
This issue is sponsored by Computer Mail Services, whose rules-
based content filtering product, PRAETOR, has been successfully
solving the growing problems with Internet email since 1998 ...
Spam and viruses -- do you know what it is costing you?
Find out - 
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40BwNU0Aj
Get the free 21-day evaluation and get some relief with PRAETOR!
--------------------------------------------------------------- 
This issue sponsored by Worth Data, a leading manufacturer of bar
code data collection hardware. Application software includes, 
inventory control, fixed asset accounting, tool tracking, document
tracking, and labeling software. Inexpensive USB attached readers
and portable batch or RF terminals. Simple and Powerful.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B1250AZ

Sensatronics, the world's IT environmental monitoring supplier 
of TempTrax, solves the age old problem of predicting environ-
mental faults/failures.  The standard in fortune 500 companies
for environmental monitoring, TempTrax alerts administrators 
or system managers before problems become business critical.
Info at: 
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B7dO0Av


------------------------------------------------------------
20) Latest IT Professional Downloads
------------------------------------------------------------
Find some of the newest files in IT Pro's collection of shareware,
utility and demo downloads for network and IT professionals below. If
you would like to see more downloads and begin receiving the latest
info on hot new utilities, packs and jewels, sign up for our free,
weekly IT Pro Downloads newsletter.
http://www.submag.com/sub/nc?wp=wpdly2

a) 0-Code E-Mail Address Encoder 1.2
0-Code E-Mail Address Encoder can help reduce spam by converting your
posted e-mail address to a JavaScript function that cannot be read by
e-mail extraction robots. No coding is required, just enter your
e-mail address, preview the result and copy/paste the code into your
pages.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CAr50Au
Size: 530k
Platform: Windows 95, 98 or NT
Licensing: Freeware

b) NTFS for Linux 1.0
NTFS driver for Linux provides full read-write access to NTFS
partitions under Linux. It supports NTFS 1.2, NTFS 3.0 and NTFS 3.1
and NTFS partitions are mounted as "native" ones and assigned drive
letters.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40CAr80Ax
Size: 69k
Platform: Linux
Licensing: Commercial Demo; $69.95

By using IT Pro Downloads you agree to these terms of use.
http://www.nwc.com/itpro/itpro-terms.html

-----------------------------------------------------------
As small to medium sized businesses deploy PCs in more 
innovative, revenue-generating applications, the need for 
business-critical PC capabilities in the SMB arena is growing 
rapidly.  Find out what more than 3,000 IT professionals 
deemed important to selecting and choosing the right 
business PC technology.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B4fn0AR

-----------------------------------------------------------

21) Subscription Information
------------------------------------------------------------
Did someone forward this newsletter to you? Get your own issue.
http://www.submag.com/sub/nc?wp=wpdly2

Subscribe to Network Computing newsletters.
http://www.submag.com/sub/nc?wp=wpdly2

Still not receiving your own FREE subscription to Network Computing
Magazine?
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40B5yO0AG

Note: To better serve you we use dynamic URLs, which allow us to see
how many readers view each story. We do not share this information, or
your personal information, with any outside party. Concerned about the
privacy of your information relative to these tracking URLs? Please
refer to our privacy policy.
http://www.doubleclick.net/us/corporate/privacy

We'd like to know what you think about the newsletter and what
information you'd like to see in future editions. E-mail your comments
to (mailto:newsletter@nwc.com).

Subscribe Today! Network Computing's Security Alert Consensus, created
in conjunction with The SANS Institute, is a free, customizable
newsletter that gives you concise, timely, accurate and authoritative
data on security holes, exploits, patches and workarounds -- all
delivered directly to you from the industry's brightest and best
security experts. What's more, you can customize your content,
selecting from various areas of interest. For more information and to
subscribe to this free newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/edKu0E43wY0V40COV0An

Look for the next Network Computing newsletter on Monday, October 20,
2003.

Copyright (c) 2003 Network Computing, a CMP Media LLC publication --
http://www.nwc.com/

This message powered by DARTmail
http://www.doubleclick.net/us/corporate/privacy