Thursday, March 1, 2007

National Cyber Alert System


The popularity of social networking sites continues to increase, especially among teenagers and young adults. The nature of these sites introduces security risks, so you should take certain precautions.


Q.1 What are social networking sites?
Social networking sites, sometimes referred to as "friend-of-a-friend" sites, build upon the concept of traditional social networks where you are connected to new people through people you already know. The purpose of some networking sites may be purely social, allowing users to establish friendships or romantic relationships, while others may focus on establishing business connections.
Although the features of social networking sites differ, they all allow you to provide information about yourself and offer some type of communication mechanism (forums, chat rooms, email, instant messenger) that enables you to connect with other users. On some sites, you can browse for people based on certain criteria, while other sites require that you be "introduced" to new people through a connection you share. Many of the sites have communities or subgroups that may be based on a particular interest.

Q.2 What security implications do these sites present?
Social networking sites rely on connections and communication, so they encourage you to provide a certain amount of personal information. When deciding how much information to reveal, people may not exercise the same amount of caution as they would when meeting someone in person because
  • the internet provides a sense of anonymity .
  • the lack of physical interaction provides a false sense of security.
  • they tailor the information for their friends to read, forgetting that others may see it .
  • they want to offer insights to impress potential friends or associates .

Q.3 How can you protect yourself?

  • Limit the amount of personal information you post .
  • Remember that the internet is a public resource .
  • Be wary of strangers .
  • Be skeptical .
  • Check privacy policies .

Tuesday, February 27, 2007

Mobile Service Providers Benefit from Cisco IP NGN Innovations

Wataniya Telecom of Kuwait simplifies and cost-effectively provisions network bandwidth while improving architectural flexibility.

SAN JOSE, Calif., February 8, 2007 - Cisco® today announced two significant innovations to its Internet Protocol Next-Generation Network (IP NGN) architecture: a Mobile Transport over Pseudowires (MToP) solution and an enhanced Cisco Content Services Gateway.
These Cisco IP NGN innovations will enable mobile service providers to dramatically improve traffic backhaul, ease second-generation (2G), third-generation (3G) and fourth-generation (4G) service convergence, and manage content access and billing more efficiently - while offering greater mobile user personalization capabilities. Both innovations are designed for providers using Code Division Multiple Access (CDMA) or Global System for Mobile Communications (GSM) technologies.

Saturday, February 24, 2007

Cisco and Apple Reach Agreement on iPhone Trademark



CISCO weds Apple



Cisco® and Apple today announced that they have resolved their dispute
involving the "iPhone" trademark. Under the agreement, both companies are free to use the "iPhone" trademark on their products throughout the world. Both companies acknowledge the trademark ownership rights that have been granted, and each side will dismiss any pending actions regarding the trademark. In addition, Cisco and Apple will explore opportunities for interoperability in the areas of security, and consumer and enterprise communications. Other terms of the agreement are confidential.

Friday, February 23, 2007

Wireless LAN



  • Fundamentals of Wireless LANs is an introductory course that will focus on the design, planning, implementation, operation and troubleshooting of wireless networks. It covers a comprehensive overview of technologies, security, and design best practices with particular emphasis on hands-on skills in the following areas:
  • Wireless LAN setup & troubleshooting
  • 802.11a & 802.11b technologies, products and solutions
  • Site Surveys
  • Resilient WLAN design, installation and configuration
  • WLAN Security - 802.1x, EAP, LEAP, WEP, SSID
  • Vendor interoperability strategies
  • Wireless bridging

PDF on Fundamentals of wireless lan