*******
You may leave the list at any time by sending an email to
[EMAIL PROTECTED] with the text "SIGNOFF
SECURITYPORTAL-L" in the body of the email.  We will miss you!


******* Vendor Corner *******

WRITE YOUR INFORMATION SECURITY POLICIES IN A DAY!

INFORMATION SECURITY POLICIES MADE EASY is a kit, text and CD, of 1000+
already-written security policies by internationally-known consultant
Charles Cresson Wood. ISPME has JUST BEEN UPDATED and is now available in
Version 7! ISPME v7 is the most comprehensive collection of policies
available covering the latest technology developments and infosec topics.
Each of these policies is accompanied by commentary detailing policy
intention, audience, and the circumstances where it applies. Save weeks of
time and thousands of dollars developing policies for information security
manuals, systems standards, etc. with no consultant fees.

Go to - http://www.baselinesoft.com


******* What's New With SecurityPortal *******

This interview is with a representative of NTRU, a company which recently
made the news with a new public-key system that is considerably faster than
any other previously known, and which has been reviewed by a number of
independent experts who have not found any significant flaws in it. This
makes the system of considerable interest, considering that other proposed
rapid methods of public-key cryptography were found not to be secure after
scrutiny.

Read the full story here:
http://securityportal.com/cover/coverstory20000904.html


Ask Buffy Overflow

Do you have questions about information security? Buffy has the answers.
Every Thursday Buffy will post answers to your questions about security
issues.  Please send your questions to:
[EMAIL PROTECTED]

Want to read Buffy's answers to last week's questions?
http://securityportal.com/buffy/buffy20000831.html


******* Top News *******

Welcome to SecurityPortal - The Focal Point for Security on the Net(tm)

Recent postings in our top news
http://www.securityportal.com/topnews:

Sept 4, 2000

Weekly Axent Security Roundup
- In the news, RaptorMobile 6.5.1 is finally available. The mailing list
this week included discussions about SSL connection errors, packet
redirection, and the Nutcracker Kernel. The technical tip sheds light on the
firewall licensing agreement.
http://securityportal.com/topnews/weekly/axent20000904.html

Weekly BSD Security Roundup
- The big news this week is OpenBSD. They have admitted to having a local
root hack, and have changed the Web page to "Only one localhost hole in two
years in the default install!" I find it funny they did not put "One month
without a local hole in the default install!" Anyways, I digress. FreeBSD
has been incredibly busy issuing security updates this week and it looks
like if you are using the Linux compatibility stuff, you need to patch and
recompile your kernel to solve some problems.
http://securityportal.com/topnews/weekly/bsd20000904.html

Weekly Checkpoint Security Roundup
- High availability, network intrusion detection, encryption, VPNs, and
OPSEC - these are all buzzwords of the current era.  In order to continue to
offer a robust security solution these days, one must offer multiple lines
of defense.  Discussions this week show how Check Point consistently
recognizes that fact, and adds new functionality to their major product line
in order to combat growing threats.
http://securityportal.com/topnews/weekly/checkpoint20000904.html

Weekly Executive Digest
- Cell phones and personal digital assistants are susceptible to a new breed
of viruses, according to a couple of news items, liability for security
problems is debated, the public is increasingly calling for authorities to
take a hard line on hackers, and a Pentagon report blames the Internet as a
major method for transmitting information about weapons of mass destruction.
Also, did your techies catch last week's major problem with email
encryption?
http://securityportal.com/topnews/weekly/exec20000904.html

Weekly Linux Security Roundup
- The big news this week is a potential glibc hole, for which no exploit
code exists - but vendors are issuing fixes. (Dontcha love Linux security?
We know there might be an exploitable issue under certain rare
circumstances; nobody has seen exploit code yet, but here's the fix). The
other is mgetty - in certain configurations it can be used to overwrite
files. Vendors have been issuing updates. In general, the rest is catch-up
with older problems like Zope, Netscape and Xchat.
http://securityportal.com/topnews/weekly/linux20000904.html

Weekly Microsoft Security Roundup
- Microsoft Security developments have been somewhat slow this week, but we
did get one new bulletin from Microsoft, as well as some NTBugtraq postings.
A new patch has been issued for Windows 2000, regarding a security policy
corruption problem. NTBugtraq postings on Rootkits, NetBios Cache problems,
and a lock workstation problem. See the tip of the week for information on
Microsoft's latest Frontpage 2000 Service Release.
http://securityportal.com/topnews/weekly/microsoft20000904.html

Weekly Solaris Security Roundup
- Vulnerabilities in 3rd Party Applications: gwscripts, helix, mgetty,
kerberos.
News: Sun provides string crypto internationally.
Tool Updates: snort, sftp, cryptix, samhain.
Articles: Audits, Authentication and Access Control, PAM.
Discussions Summary: YASSP & Focus-Sun.
"Tip of the Week" presents tocsin, a "featherweight" IDS.
http://securityportal.com/topnews/weekly/solaris20000904.html

Sept 3, 2000

Cryptome: guide to NSA sabotage
- Your tax dollars at work, how the NSA strong arms companies into reducing
the strength of encryption in products.
http://cryptome.org/nsa-sabotage.htm

Shmoo: Capture the Capture The Flag
- Capture the Capture The Flag (CCTF) is a project by The Shmoo Group to
sniff and log all the data on the Capture The Flag contest at DefCon.
Hopefully, the end result is not better IDS's and such... the end result
should be a wakeup call for application developers to write more secure apps
that don't need an IDS in front of them.
http://www.shmoo.com/cctf/

Sept 2, 2000

SecurityFocus: AtStake jilts Phiber Optik
- When Mark Abene found himself being wooed last month by security services
firm @stake, he didn't expect his hacker past from seven years earlier to
come back to haunt him.
http://www.securityfocus.com/news/79

ZDNet: Old Internet Explorer Plus New Hotmail Equals Big Vulnerability
- Haven't upgraded Internet Explorer yet? Maybe this will convince you.
BugNet has validated a security vulnerability that could allow a malicious
user to gain access to your Hotmail account. By enticing a Hotmail customer
running Internet Explorer 4.x or 5.0 into clicking on a carefully
constructed link, the unwary victim would be tricked into abdicating crucial
cookie information that would allow the hacker to gain access to the Hotmail
account
http://www.zdnet.com/zdhelp/stories/main/0,5594,2623070,00.html

ECommerceTimes: Net Blamed for Identity Theft Spike
- The U.S. Federal Trade Commission (FTC) says it has seen complaints of
identity theft triple so far this year, and claims at least part of the
increase can be attributed to the Internet.
http://www.ecommercetimes.com/news/articles2000/000831-4.shtml

Red Hat: glibc vulnerabilities in ld.so, locale and gettext
- Several bugs were discovered in glibc which could allow local users to
gain root privileges.
http://www.redhat.com/support/errata/RHSA-2000-057-02.html

Salon: Ain't no network strong enough
- "Computer insecurity is inevitable," [Bruce Schneier] warns. "Networks
will be hacked. Fraud will be committed. Money will be lost. People will
die."
http://www.salon.com/tech/review/2000/08/31/schneier/index.html

PCWorld: Is Eudora Snooping on You?
- The popular mail client sends information to its servers when you're
online. It may not identify you. But shouldn't you know about it?
http://www.pcworld.com/pcwtoday/article/0,1510,18335,00.html

CERT Incident Note IN-2000-09: Vulnerability in the IRIX telnet daemon
- We have received reports of intruder activity involving the telnet daemon
on SGI machines running the IRIX operating system. Intruders are actively
exploiting a vulnerability in telnetd that is resulting in a remote root
compromise of victim
http://www.cert.org/incident_notes/IN-2000-09.html

Sept 1, 2000

ComputerWorld: Amazon.com revises privacy policy on use of customer data
- Amazon.com Inc. yesterday posted a new privacy policy on its Web site
that's aimed at giving online shoppers a better idea of exactly what happens
to the personal information they willingly give the company -- not to
mention the data they inadvertently leave behind
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49388,00.html?OpenDoc
ument&~f

Register: Microsoft won't fix new Windows security flaw
- Microsoft says it won't be issuing a patch for a newly discovered security
vulnerability in Windows that PGP's COVERT lab classifies as 'high-risk'.
The COVERT Lab issued an advisory earlier this week detailing how a local
Windows networking configuration can be corrupted by redirecting the user to
an arbitrary IP address of the hacker's choosing. In itself, say
researchers, the vulnerability isn't destructive. For malicious crackers
it's more likely to be a means to an end. But the simplicity and stealth
with which the attack can be carried out means that it merits a high risk
rating, says PGP.
http://www.theregister.co.uk/content/4/12951.html

Sun: Solaris Data Encryption Supplemental CD Download delivery
- The software previously contained on the Solaris Data Encryption
Supplemental CD (SOLZ9-080N9999) is being repriced from $100 to no charge
(via web download) and will now be offered via download to all countries
except Russia, Israel and nations embargoed by the U.S. government and Burma
as per Sun policy. Comment: This sounds like exactly what International
Sunscreen and SKIP customers have been waiting for, but it is unclear how to
actually download.
http://www.sun.com/productflashes/july2000/080800_solaris_data_encryption.jh
tml

TechWeb: SMS Vulnerability Found In Nokia Phones
- A weakness has been discovered in Nokia AB cell phones that could
interfere with call completion and force the user to reboot, security
experts said
http://www.techweb.com/wire/story/TWB20000831S0011

NAI: BackDoor-HA Trojan Program
- This is a Windows 9x Internet Backdoor trojan. The Visual Basic 6.0
Runtime Module is required to execute this file. When running it gives
access to the system over the Internet to anyone running the appropriate
client software
http://vil.nai.com/villib/dispvirus.asp?virus_k=98802

Magic Bullets
- Computer security is difficult to achieve. It requires constant vigilance,
and it involves inconvenience. Sometimes, expensive products are offered
that are claimed to solve your security problems with no problems, and they
do not deliver. However, there are a number of inexpensive measures that
would seem to solve a lot of security problems that aren't being used.
http://securityportal.com/topnews/magic20000901.html

ZDNet: Security gaffe gores Bull's servers
- A security flaw at Bull on Thursday briefly allowed anyone access to the
IT company's servers, offering up confidential information on both the
company and its high-profile customers.
http://www.zdnet.com/zdnn/stories/news/0,4586,2622664,00.html

ComputerWorld: Microsoft adds cookie management to IE 5.5
- Microsoft Corp. today said it's ready to ship a promised set of cookie
management features for Internet Explorer 5.5 that give users of the Web
browser the option of deleting cookies as an added form of privacy
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49328,00.html

Aug 31, 2000

IDG: Charges brought in Parametric extortion case
- Michael Pitelis, of Tarpon Springs, Florida, was indicted on charges of
attempted computer extortion for allegedly threatening to release the "keys"
to operate Parametric's flagship design software, Pro/Engineer, if he did
not receive more than $1 million. The passwords and codes would have given
users free access to all the functions of the 20th version of Pro/Engineer,
which typically costs more than $100,000
http://idg.net/ic_236283_1773_1-483.html

Microsoft Word Documents, Among Others, Can Be "Bugged"
- The Previously Undocumented Feature Can Allow the Surreptitious Tracking
of Computer Files on the Internet. Readers of email document attachments
beware: the author of a computer file may be able to track the path of the
file to your computer and others through the use of "Web bugs," the Privacy
Foundation reported today. A summary in German is available on Global
Network News http://www.gnn.de/0008/9541.html
http://www.privacyfoundation.org/story2.html

Ask Buffy
- Do you have questions about information security? Buffy has the answers.
This week's theme is difficult questions.
http://securityportal.com/buffy/buffy20000831.html

ComputerWorld: Federal Agencies To Be Graded
- Apparently, many U.S. federal agencies can't see the need for improved
security on their own volition -- they will, therefore, be chided into
action by report cards similar to the ones used to stimulate compliance with
Y2K issues. We anticipate that the class average will be something less than
"A".
http://www.computerworld.com/cwi/Printer_Friendly_Version/frame/0,1212,NAV47
_STO49211-,00.html

TimesofIndia.com: Shareholders Suffer When Security is Poor
- With computer attacks on the rise, shareholders have become increasingly
nervous as they begin to realize the ramifications of poor security and the
direct effect it has on their portfolios. In an effort to address growing
concern surrounding this issue, the White House enlisted the help of The
Institute of Internal Audit. The result was "A Call to Action For Corporate
Governance," a paper they hope will become the global standard for companies
trying to protect themselves. The government insists that each company make
security a priority. Imagine that - asking companies to take responsibility
for their own security.
http://www.timesofindia.com/today/30mbom24.htm

The Emotional Side of Cryptography
- Encrypting data before storage or transmission involves a bit of extra
work. This often means that people who ought to be using encryption, instead
of relying that their data will not be intercepted, fail to do so. But it is
also true that some of the people who use encryption are keenly aware of the
importance of keeping their information secret.
http://www.securityportal.com/topnews/emotional20000831.html

ComputerWorld: Developer Unleashes Palm Trojan Horse Program
- An independent developer inadvertently unleashed a Trojan horse program
that can wipe out the files on Palm handhelds. Palm Inc. downplayed the
impact but acknowledged that its devices are susceptible, as analysts warned
of copycat attacks.
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49272,00.html

Aug 30, 2000

ZDNet: Text Messages May Freeze Nokia Phones
- A Norwegian company claims coding in text messages could freeze
top-selling cell phones. Are viruses far behind?
http://www.zdnet.com/zdnn/stories/news/0,4586,2622049,00.html

ZDNet: Palm Trojan Fails to Sting Users But Gets Security Pundits in a Flap
- Antivirus vendors report that the first Trojan horse program to affect the
Palm handheld computers poses little tangible threat but highlights a
significant future danger.
http://www.zdnet.co.uk/news/2000/34/ns-17579.html

CNet: Password Glitch Riles ICQ Users
- America Online's efforts to bolster security for its ICQ instant messaging
service are drawing complaints from some people who say the measures have
locked them out of their accounts.
http://news.cnet.com/news/0-1005-200-2652485.html?tag=st.ne.1430735..ni

EcommerceTimes.com: Is Anyone Accountable for Net Security Snafus?
- The United States is the most litigious country in the world. People sue
McDonald's if their coffee is too hot. Prisoners sue if their color TVs are
taken away. Doctors, lawyers, big corporations, mom-and-pop corner stores --
no one is immune to being slapped with a contentious lawsuit. Except,
apparently, Microsoft and all the other high-tech companies who peddle
software with gaping security holes.
http://www.ecommercetimes.com/news/viewpoint2000/view-000831-1.shtml

LinuxWorld: Attacking Linux
- To Stop an Attacker, Think Like a Cracker - Network scanning, password
grabbing, trojaned software -- all are the bane of the righteous sysadmin.
Craig Ozancin reveals how to beef up network security and ward off attackers
at the LinuxWorld Expo, as reported by Rick Moen.
http://www.linuxworld.com/linuxworld/lw-2000-08/lw-08-expo00-hacking.html

Wired: Joining Forces at New Linux Lab
- Computer hardware giants Hewlett-Packard, Intel, IBM, and NEC are joining
together to fund an independent, nonprofit laboratory to help speed the
development and testing of enterprise-targeted Linux projects.
http://www.wired.com/news/business/0,1367,38505,00.html

ZDNet: The New Virus War Zone: Your PDA
- As more PDAs and smart phones get connected to the Internet, they're
increasingly vulnerable to the world of viruses.
http://www.zdnet.com/zdnn/stories/news/0,4586,2621395,00.html

Top 20 Virus Report
- A comprehensive ranking of the 20 most important viruses to be aware of
and watch out for this week, including profiles, links, and other timely
information.
http://securityportal.com/research/virus/virustop20.html

SSL Server Security Survey
- A random sample of 8081 different secure web servers (servers running the
SSL protocol) in active use on the Internet shows that 32% are dangerously
weak. These weak servers either support only the flawed SSL v2 protocol, use
too-small key sizes ("40 bit" encryption), or have expired or self-signed
certificates. Data exchanges with all types of weak servers are vulnerable
to attack.
http://www.meer.net/~ericm/papers/ssl_servers.html

NAI: W32/NewsTick Virus
- This is a Windows 9x Internet Backdoor trojan. When running it gives full
access to the system over the Internet to anyone running the appropriate
client software. The application hides itself from the Win9x task manager
http://vil.nai.com/villib/dispvirus.asp?virus_k=98800

Aug 29, 2000

ComputerWorld: Federal Agencies FaceGrading on Security Readiness
- The congressional committee that released A, B, C, D and F grades on the
year 2000 compliance of federal agencies during the last two years now
intends to issue similar grades evaluating the information security
readiness of 54 federal agencies and departments
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49211,00.html?OpenDoc
ument&~f

UK.Internet.com: Security on Q With James Bond device
- ComSense, an Israeli startup, has created a James Bond style technology
that uses sound waves to tackle fraud and privacy problems on the internet.
http://www.uk.internet.com/Article/100460

TheWeb.com: As West Nile Virus Threatens, PC Viruses Live On
- As New York, Boston, and other Northeastern cities take precautions to
combat the West Nile virus in the real world, take a look at how PC viruses
have affected cyberspace in the past decade.
http://www.techweb.com/wire/story/TWB20000829S0009

CNN: Auctions No.1 Net Fraud
- Online auctions are the number one source of fraud on the Internet,
according to a nationwide FBI tally reported Tuesday. The information is
based on consumer complaints lodged with the Internet Fraud Complaint
Center, a joint project of the Department of Justice and the FBI
http://cnnfn.cnn.com/2000/08/29/technology/netfraud/

Reuters: Most Say Computer Hacking Should Be a Felony
- Tampering with computers and the Internet should be charged as a felony,
most Americans said in a recent nationwide survey.
http://dailynews.yahoo.com/h/nm/20000828/zo/crime_1.html

ABCNews: A Different Kind of Hijacking is Taking Place in the Skies
- Britain's Civil Aviation Authority has issued a safety alert about a new
threat to air passengers: hackers taking over air traffic control
transmissions and giving pilots bogus orders.
http://www.abcnews.go.com/sections/us/DailyNews/FakeAirTraffic000829.html

CNet: Net Security Firm Mum on Microsoft Takeover Rumor
- Ireland-based Internet security firm Baltimore Technologies declined to
comment today on reports that U.S. computing giant Microsoft is considering
a takeover bid
http://news.cnet.com/news/0-1003-200-2640454.html?tag=st.ne.1002.thed.ni

FCW: Internet Enables Surfing For Secrets
- A study conducted for the Pentagon has singled out the Internet as one of
the primary vehicles by which classified information related to weapons of
mass destruction often falls into the wrong hands
http://www.fcw.com/fcw/articles/2000/0828/web-secret-08-28-00.asp

TechWeb: Trojan Horse App Threatens Palm Platform
- A software gaming developer posted a Trojan horse application called the
Liberty Emulator that attacks the open-source developer platform of the Palm
OS.
http://www.techweb.com/wire/story/TWB20000828S0025

Firewalls - Placement
- Security is no good if it isn't in the right place. Think about a modern
office building - where are the doors with locks? The lobby doors can always
be locked, and usually the doors on each floor have locks as well. If only
the office doors had locks, the building would be less secure. More security
guards would be needed to make sure no one is trying to force a door. In a
perfect world, every door would have a strong lock and a guard sitting next
to it with a shotgun - but since cost is a factor, this won't happen. The
same applies to networks. While there are many free firewalls available, it
costs a lot to install and maintain a firewall on each machine. It is much
more efficient to have firewalls where your network connects to distrusted
networks. You should also consider the type of traffic a firewall will need
to handle. The more traffic, the more complex the rules necessary, and the
greater the chance an attacker can slip in.
http://www.securityportal.com/topnews/fw20000829.html

Government-Assisted Cryptography
- Given that cryptography is a useful technique to protect the security of
financial and other transactions, government restrictions on cryptography
have received a great deal of attention in today's wired climate.
http://www.securityportal.com/topnews/goascr20000829.html

Independent: How to Beat the Net Censors
- Filtering software is designed to restrict access to websites which its
manufacturers deem unsuitable. But now there's an easy way to bypass all
that.
http://www.independent.co.uk/news/Digital/Update/2000-08/feature280800.shtml

ComputerUser.com: Network Solutions Confirms Internet Addressing Database
Glitch
- Network Solutions registry division, which maintains a directory of more
than 19 million Web addresses and is responsible for making this information
available to other computers on the Internet, confirmed a glitch with its
system on Wednesday evening.
http://www.computeruser.com/news/00/08/28/news4.html

ComputerUser.com: Arachne Browser Architect Dismisses Virus Charge
- Michael Polak, a Czech scientist whose browser has been causing so many
problems for its users that he was accused of disseminating a virus, issued
an explanation on his Web site this week.
http://www.computeruser.com/news/00/08/28/news1.html

CNN.com: Software Security Holes: To Tell, or Not to Tell
- Some "bug hunters" who uncover security flaws in computer software and
rush to issue public warnings may be helping hackers more than consumers,
industry officials worry.
http://www.cnn.com/2000/TECH/computing/08/28/computer.bugs.ap/index.html

Aug 28, 2000

TechServer.com: Attack on Irish ISP May be the Work of a Teenager
- The investigation into a security break-in at Eircom, Ireland's largest
ISP, hones in on a 17 year old suspect. The Eircom attack allegedly
compromised the usernames and passwords of 30,000 customers.
http://www.techserver.com/noframes/story/0,2294,500244325-500361491-50212412
5-0,00.html

TheStar.com: Software Trapdoor Threatens Canadian National Security
- The Royal Canadian Mounted Police has launched an investigation into a
software product named Promis that may have been tampered with in an attempt
to obtain classified information. As news of the investigation unfolds,
there is a possible link to homicides that are under separate investigation.
http://www.thestar.com/editorial/news/20000828NEW01b_NA-MOUNTIE28.html

Pretty Good Privacy and the ADK Bug
- PGP, the program, will be remembered by many as a watershed event in the
popularity of encryption use by ordinary people. Although there was a
version 1.0 that used a weak cipher devised by Phil Zimmerman himself, it
was version 2 that recieved the publicity. Like PEM (Privacy-Enhanced Mail),
it was an implementation of a model of encryption that was known then, and
which is now nearly ubiquitous: a public-key cipher is used to convey a
session key belonging to a single message, and the message itself is
enciphered in a conventional, or "symmetric" cipher using the session key.
The legal problems surrounding PGP were also well known: the government's
investigation of whether Mr. Zimmerman could be held responsible for the
fact that versions were passed around to people outside the United States,
and the use of the RSA algorithm in PGP.
http://securityportal.com/topnews/pgpadk20000828.html

NWFusion: Survival Tips
- Here are some cheap, easy and effective steps to keep your network safe
from DDoS attacks.
http://www.nwfusion.com/research/2000/0828feat2side.html?nf

TheRegister: Hacktivists Crash Korea Govt Home Page
- Protesters forced the Korean Ministry of Information and Communication's
Web site to shut down for 10 hours on Saturday. But was it a mass click-in
or a DDoS (Distributed Denial-of-Service) attack which brought the service
to its knees?
http://www.theregister.co.uk/content/1/12863.html

PGPI.org: PGP v6.5.8 Released, Fixing ADK Problems.
- PGP 6.5.8 has just been released, and is available for download now
(Windows & Macintosh). This release fixes a nasty bug in PGP 5.5.x and 6.x
regarding the ADK (Additional Decryption Key) feature. - The NAI security
advisory discussion the ADK problems, and countermeasures:
http://www.pgp.com/other/advisories/adk.asp - A brief introduction in German
is also available from heise.de:
http://www.heise.de/newsticker/data/jk-26.08.00-006/ - Updates for the
commercial PGP products do not seem to be available yet
http://www.pgpi.org/news/#20000825

Anyone with a Screwdriver Can Break In!
- This article will discuss the second weakest layer of computer security,
Physical Security. As we'll see, any attacker with physical access to a
computer, a little ingenuity, and sufficient time can compromise the system
http://securityportal.com/cover/coverstory20000828.html


******* What's New With SecurityPortal *******
Debian 2.2

I wanted to write a really positive article about Debian 2.2, which was just
released a few weeks ago. Unfortunately, I can't. While Debian itself is a
reasonably well-done Linux distribution, it has some major security issues.

Read the full story at:
http://securityportal.com/closet/closet20000830.html


******* New at SecurityPR.com, a Vendor Press Release Site ********
Foundstone Offers Hacker Investigation Classes
- Foundstone Inc., the premier computer security training and consulting
company, announced a new series of computer security classes, Ultimate
Incident Response: Hands On.
http://securityportal.com/pr/pr.20000830101927.html

RSA Security Offers Industry's First e-Security Experience to Help Educate
Customers on the Benefits of e-Security
- RSA Security Inc (NASDAQ: RSAS), the most trusted name in e-security,
announced the launch of its inaugural "e-Security Experience," a Webinar
designed to deliver a high-level, online, interactive experience to educate
e-business organizations on the key issues and decision-making criteria in
the e-security space.
http://www.rsasecurity.com/news/pr/000817.html

The New Israeli Standard for Information Security Will Draw on Comsec e-Sure
Methodology
- The new Israeli standard will base upon the leading British Standard BS
7799; Implementation will draw on Comsec e-Sure(tm), security standard for
e-commerce.
http://securityportal.com/pr/pr.20000828023811.html

Enter your own Press Releases directly at SecurityPR.com.
http://securitypr.com


*******************************************

You may leave the list at any time by sending an email to
[EMAIL PROTECTED] with the text "SIGNOFF
SECURITYPORTAL-L" in the body of the email.  We will miss you!

Tell us how we're doing.  Send any other questions or comments to
[EMAIL PROTECTED]

Micheal McCrea and Tony Chapman
SecurityPortal -- The Focal Point for Security on the Net
[EMAIL PROTECTED], [EMAIL PROTECTED]


--------------------------------------------------------------------------
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3
Pengelola dapat dihubungi lewat [EMAIL PROTECTED]


Kirim email ke