Tuesday, August 31, 2010

The Associated Press: CIA chief spices up spy shop's image on reality TV

Around a long table in a windowless room, the CIA officials awaited the decision from their director, Leon Panetta.
"A little too salty," the CIA chief finally said, giving thumbs down to the dish prepared by a warring team of cooks from the reality TV show "Top Chef."
Panetta also guessed, quickly and correctly, that it was beef Wellington. The episode, dubbed "Covert Cuisine," featured traditional dishes disguised as something else. "Poor disguise," Panetta said. "They would have captured this individual and hung him!"
To Continue Reading This Associated Press (AP) News Agency Report Hosted by Google Inc , Please click the link bellow (Source & Copyright):
Source & Copyright : The Associated Press: CIA chief spices up spy shop's image on reality TV

Tuesday, August 24, 2010

DDoS extortion-themed scam circulating | ZDNet Discussion

A reply posting on discussion board on ZDNet by Me:

@vulpine@... Using Linux don't mean that you are not a part of any extended botnet. See my posting on TechRepubLic URL: http://techrepublic.com.com/5208-1009-0.html?forumID=102&threadID=334998, which has already been reported as SPAM by someone, what mean? The story I wrote is true ? New Linux Operating System have back door ? You can use Windows, Linux, MAC OS or anything else, but security depends on the configuration of your antivirus, firewall & using habit of Internet User. As per my experience, I saw a corporate network having the most expensive Firewall Device on their Internet Gateway, but the config was to allow bittrrent file transfer!!! I saw user who used to open all, I mean ALL incoming email, either it sold *gra, or Fake winning result. His personal believe was he is in safe position as their IT installed a good firewall and any email might give a opportunity to start a new business. Now understand what happens to him every week.

Ahamed Bauani

DDoS extortion-themed scam circulating | ZDNet

Friday, August 20, 2010

DDoS extortion-themed scam circulating

Symantec has intercepted a scam attempt, relying on scare tactics in order to trick domain owners into transferring virtual money, or face a distributed denial of service attack against their web site.

Sample message:

  • “You are welcomed with a command of hackers ZeleniyHach. We hold a huge network of Distributed Denial Of Service Attack, allowing to suspend any web site. We have been watching (domainname.com) and were able to find out that you have spent pretty money much for its advancement and want to to offer you to spend a little more yet.Just as little as 200 bucks as a voluntary donation to our fund will keep your web site away from DDOS attack. 200 bucks is not so much also will help you to avoid greater problems in the future.FOR DULLS..!!! IF YOU DO NOT OFFER TO US 200 bucks WE WILL KILL YOUR WEB SITE! Unfortunately, we accept only Webmoney Paymer Cheks, so make sure to get your fat asses out and without assistance find out how to transfer money into it. We give you 48 hours. If after 48 hours we will not get 200 dollars, there is one more 0 will be added to 200 bucks, i.e. 2000 bucks and so on until you come to reason. When you are ready, just send the check as your response to this message. In subject matter of the letter specify the domain with greater letters, it is a lot of you We are the one, respect our work.”

Despite the presence of “financial penalties”, which is a popular tactic used in professional DDoS extortion letters, this spamvertised campaign is a clear attempt to scam the user, meaning there’s a low probability that the scammers have the DDoS capabilities they’re referring to.

As far as the serious underground market players are concerned, in May, 2010, a study conducted by VeriSign’s iDefense Intelligence Operations Team, concluded that the average price for renting a botnet is $67 for 24 hours, and $9 for hourly access. And although their findings entirely depend on the underground service in question/long term or short term contracting, the conclusion is rather simple - renting botnets is getting cheaper, due to the never-ending supply of malware-infected hosts.

A Copy & Pest from: DDoS extortion-themed scam circulating | ZDNet

Thursday, August 19, 2010

eBay datacenter chief Dean Nelson: 'We are living Moore's Law

In May, as part of its data center consolidation strategy, eBay opened Project Topaz in South Jordan, Utah—its largest and most efficient data center. The site, owned (rather than leased) by eBay, encompasses 60 acres and allows the company to eventually quadruple the size of its current operation.

Dean Nelson is eBay’s senior director of Global Data Center Strategy and Operations. He was previously the senior director of Global Lab & Data Center Design Services at Sun Microsystems, and his job today focuses on the mission critical infrastructure for eBay, PayPal, Shopping.com and other eBay businesses. I recently talked with him about using leased IT equipment to increase efficiency at Topaz.

Tell me about eBay’s tech refresh cycle.

We have a process internally in which we lease equipment and replace it every two years with the newest, most powerful equipment. It used to be that costs and power consumption were at pace, and we have now stopped that and broken the linear relationship. We are living Moore’s Law. It comes down to how much work can get done. Our computing efforts have doubled, and the cost is flat.

Who leases you the equipment?

We have multiple vendors. We’re always splitting between two vendors. Everyone has a chance to play.

So every two years all the equipment is replaced?

The two-year tech refresh is staggered. It’s not like on this one day every two years everything is replaced. Every month something is gong in and out of the data center. The center has to be extremely flexible for that to happen.

Have you always leased hardware?

No. We’ve done this over the last three years. The leasing model is fairly unique. We’re forcing the financial system and internal process, saying this equipment will go away every two years. That equipment for most companies is still really good, but for us we have to be able to deliver for the 90 million customers. We do more transactions than the New York Stock Exchange on our site.

None of this is wasted. We put a business model in place that allows us to optimize cost, efficiency and performance. At $2,000 per second of goods being traded, we need a really efficient engine to be able to deliver. So this data center is all those different elements coming together.

I joined the company 11 months ago. One of the main reasons I joined is that the organizational structure at eBay is different than at most other companies. The data center is in the same side as the IT side: one VP, one budget, one goal. Everything lines up neatly. We’re looking at it holistically, so we can see how efficiently we can run this machine.

You have also donated some of your obsolete servers?

We had an agreement with [the University of] Notre Dame where we were donating servers to them for medical research. We donated over 100 servers, which they used in research labs for AIDS and cancer research.

What other technologies and programs have you implemented to make the data center so efficient?

For electrical, we’re using 400 volts; the higher the voltage on a server, the more efficient it runs. We decided to go higher voltage everywhere in the data center, which is 2 percent more efficient. It has to step down the voltage. Imagine coming in from the substation, which is 138 volts, and you have to keep stepping that down, which means you lose efficiency. This eliminates a layer of transformers and increases efficiency.

We have power distribution through Starline Busway. We can snap in the power connection within minutes instead of calling an electrician. In what used to take weeks, we can have a technician just snap something in a power plug. Everything is visible; we can make decisions very quickly. We can make decisions that do not require a human. The system lets us know.

And should something go wrong, you have backups to the backups.

Right. For example, the dynamic cooling is remotely monitored. Say certain components fail. Another one picks it up. We have an extra one, plus one.

How is Utah, as a data center host state?

Utah’s been great. There’s a data center community. We’ve reached out to our neighbors here and built up a group to share information and collaborate.

Data Center Pulse is a nonprofit data center industry community. So we started a local chapter in April. The first meeting we had was a meet and greet, and those nine who were there represented 40 megawatts worth of consumption. Those who couldn’t attend represented another 160 megawatts. NSA [National Security Administration) putting $1.6 billion into a data center in Utah, Oracle is building a center.

So what have you learned?

We all have the same challenges: We all have costs issues, density issues, sustainability goals. The knowledge sharing in those sessions is huge. eBay is transparent. We’re now trying to get our peers together to share best practices.

Interested in more? Read a related interview about Project Topaz’and the value of greener datacenters on SmartPlanet’s Pure Genius blog.

The original version of this post said the facility is located in St. George; that is incorrect, and the post has been corrected.

Content Source & Copyright: eBay datacenter chief Dean Nelson: 'We are living Moore's Law'

Friday, August 13, 2010

IPv6 and Digital Bangladesh Thoughts

Recently an word 'Digital Bangladesh' a word (Actually a Phrase) is everybody's ear of Bangladeshi People. This Phrase was was in Election Manifesto of Current Government. Government is shouting Digital Digital and Digital Bangladesh in almost every program. They are taking every measurement to make our Country towards Digitalizing of every process. This is a very good steps to make the country's economy / lifestyle high. Internet play a very big role to develop a country. Currently Bangladesh is connected with Internet via a Submarine Cable & the protocol use to communicate via internet is 'IPv4', which is become 'finished'. So Internet Society start Develop a new Protocol name IPv6, which is currently almost production stage. All Traffic from or to Internet go through 2 International Internet Gateway (IIGW). Unfortunately none of this gateway support IPv6 yet and didn't have any plan to do so!(Giving this support is almost costless) Though they are not giving us support to connect to IPv6 Internet, we are currently using a technology called '6 over 4' tunnel.

We need to create a Group which Goal is to share our experience on brand new protocol IPv6 & Make pressure to our Government to take step to connect Bangladesh with IPv6 network via IIGW(s).

Ahamed Bauani
HP: +880-1818-BAUANI


1. Thanks to GlobalVoice in English, to Cover the Issue of IPv6 status in Bangladesh

2. Thanks for your support to spreed the concern to make both Government Own IIGW (BTCL), Privately Own IIGW (Mango Teleservices) has sufficient equipment to support IPv6 Routing, Only need it to enable and Manage. 

Upstreams like Tata Communication in India or SingTEL in Singapore is currently major gateway of Bangladesh to Internet World. The Seabone in Italy is another gateway where major EU traffic pass through has IPv6 Support. So, why not BTCL or Mango Teleservices is creating BGP Peer with them to connect IPv6 Network?

Group name IPv6 in Bangladesh has been created to share the experience and knowledge on IPv6 along with pressure Bangladesh Government & Bangladesh Telecommunication Regulatory Board (BTRC) to enable IPv6 support on International Internet Gateway(s) of Bangladesh. Please join the group and support us to be ready before IPv4 Address Space is finished. 

Owner of a Small Business and Looking Forward to Grow?

You start an Small Business on your area, working hard day long to increase sell but by the end of day you found that you are not getting expected number of customer Revenue.

It happens to most of Small Business Owner because of your targeted customer don't know you are there to serve them. So customer automatically directed to another well known Store to buy their things or service. Everyone know that advertisement is the key to bring your customer to your door steps. As your business are small and don't have that much budget to go for advertisement on TV / Radio or Other Offline / Online service.

On this status, Google Inc, an Internet Giant came to help you! Yes recently they started a blog for Small Business Owner to gather all kind of Information you need to build more awareness regarding what you are offering to your targeted customer.

In our recent Small Business series on the Official Google Blog, a handful of real-life entrepreneurs have shared their experiences building companies from scratch and embracing Internet tools that have taken their businesses to the next level. We’ve received fantastic feedback about these posts, and realized that there’s a healthy appetite among small- and medium-sized business owners who want to know all about the latest web tools and tricks. Fortunately, we have lots more to share with you, too!

That’s why we’re introducing the Google Small Business Blog, a central hub that brings together all the information about our products, features and projects of specific interest to the small business community. Rather than having to sleuth around in many different locations for details about templates for creating video ads on YouTube, tips for your employees using Gmail or how to respond to the business reviews on your Place Page, you can find all of this helpful information right here in one place. - Posted on Google Official Blog

So, why wait? Start using the power tools provided by Google, and Hope people will not call your business as a Small Business, you might be a Corporation, who knows!

More On: Google Tags makes it easy as pie to find local customers

Posted by:
Ahamed Bauani

Thursday, August 12, 2010

First Mobile Phone Virus Targeting Android-Based Mobile Device Which Can Send SMS Automatically!

Security experts warned on Tuesday about what is believed to be the first Trojan targeting Android-based mobile devices that racks up charges by sending text messages to premium-rate numbers.
The Trojan-SMS malware, dubbed "Trojan-SMS.AndroidOS.FakePlayer.a," is being distributed via an unknown malicious Web site, said Denis Maslennikov, senior malware researcher at Kaspersky Lab.
Users are prompted to install a "media player application" that is a little bigger than 13 kilobytes, but which is hiding the Trojan inside, according to Kaspersky and mobile-phone security company Lookout, which analyzed the threat. Once installed, the Trojan starts sending SMS messages behind the scenes that cost several dollars per message, without the device owner knowing it.
For more on this story, read First SMS-sending Android Trojan reportedon CNET News.

Wednesday, August 11, 2010

IPv6 is Knoking on Door, Still You Want to Relax ?

In a comments on blog post on GDNet.Com, someone express that IPv4 will still be in Market. He also added that his mother home network is not going  to switch on IPv6 very soon. 

On the reply of that comments, I wrote some information. I can't control myself to share with my readers: 

Yes, it's true that ' you can't see my mother's home network switching over to IP6...' But when Internet Provider Switch on IPv6, she will look for expert engineer to switch over from IPv4 to IPv6 of her home network.

Actually general people are not aware of the IP address limitations on current Internet. But the Analyst of Bigger Company are already thinking and planing to move their network to IPv6. Google Inc, has already moved a copy of this network in IPv6, same to Hotmail, Yahoo, Microsoft, Apple has already done the job to migrate their network to IPv6. When people will found most of the content is in IPv6 Network, who will stay on IPv4 ?

We, who are working on ISP network expansion, we know how much effort we need to get an IPv4 allocation from respective RIR as they also have few more prefix to allocate. It's true that there is a lot of unused IPv4 in Internet, but if all of them can be used, still it will not cover the growth of current Internet for 1 year proximately. 

Thank You.
Ahamed Bauani
Chief Technology Advisor
Dhaka Wireless
An IPv6 Enable ISP of Bangladesh, Need IPv6? Knock us!

Bypass a $200 biometric lock with a paperclip | IT Security | TechRepublic.com

Using a strong digital security and sleeping well on night? Now read the blog post by TheRepublic.Com Blog Post:

Wired reports that the “gross insecurity” of high-tech locks has been exposed. Several different expensive, modern locks with advanced design concepts proved ineffective against the efforts of Marc Weber Tobias, Toby Bluzmanis, and Matt Fiddler, who have been exposing the poor security design of physical locks at DefCon for years.

The most egregious example appears to be the $200 Biolock Model 333. It provides a fingerprint reader as its main selling point, but also features a remote for locking and unlocking and a physical key in case the fingerprint reader fails to unlock the door for its user. The whole biometric selling point was trivially bypassed, however, by simply inserting a straightened paper clip into the keyhole. The sort of lockpicking practiced by locksmiths (and private investigators in the world of TV shows and movies) is not required; the whole process simply involves pushing the paperclip into the keyhole and turning the handle.

The Wired article offers a video of the technique, demonstrated by the security researchers presenting their findings at this year’s DefCon. They describe the lock’s vulnerability as a “perfect example of insecurity engineering”.

Another example involves a Kwikset smartkey deadbolt system that can be trivially cracked with a screwdriver. Kwikset has stated that the lock has “passed the most stringent lock-picking standard.” Marc Weber Tobias pointed out that adherence to standards is not enough when it comes to security. The very nature of many problems we face is defined by the unexpected and unpredictable. If we do not expect it and cannot predict it, we certainly cannot standardize it.

A small safe intended for residential use, a battery operated electronic lock operated by an RFID key, and an electro-mechanical lock that keeps an audit log — from AMSEC, KABA, and iLock respectively — were also found to suffer weaknesses in their security functionality.

Oke, from now on, I will carry a paperclip on my wallet. Will you?

Ahamed Bauani

1.5 million Facebook accounts offered for sale

Are you a Facebook user? Facebook is your tools to keep relationship with your friends? Read Bellow:

On Feb. 10, 2010, (cybercriminal) stated that he or she is selling 1.5 million compromised Facebook accounts, in bulk quantities, belonging to users in various countries. The price per 1,000 accounts varies based upon the number of friends and contacts that each account possesses. For a purchase of compromised accounts containing 10 contacts or fewer, a buyer must pay $25 per 1,000 accounts. A purchase of compromised accounts containing 10 or more contacts requires a buyer to pay $45 per 1,000 accounts. Accounts containing zero contacts are also available for bulk purchasing from (cybercriminal), at the cost of $15 per 1,000 accounts. The prices of these accounts are presumably in USD or the equivalent amount in some form of electronic currency.

This Security issue is covered by ZDNet.Com. Read More On: 1.5 million Facebook accounts offered for sale

Still you want to put your sensitive information on Facebook ?

Tuesday, August 10, 2010

IPv6 Network Administration Guide

IPv6 Network Administration, a book written to targeting administrator who are in a job to transform their Network from IPv4 to IPv6, so that in future they are safe and online.

A Customer Review on this Book at Amazone.Com:

The IPv6 book for those waiting to learn about IPv6
IPv6 Network Administration is an absolutely first-rate technical guide. It is refreshing to read a book that doesn't waste time by assuming the reader has no networking background. IPv6 Network Administration achieves just the right balance between history, theory, and practical application to serve the needs of administrators and interested readers. If you've been.. More...

IPv6: The end of the Internet as we know it (and I feel fine)

In 2012, it won’t be the the end of the Mayan Long Count that preoccupies the global technology industry — it will be running out of TCP/IP version 4 addresses.

The problem of running out was at least a decade or more away. There was more than enough time to figure it all out. Instead, they looked into band-aid type solutions such as Classless Inter-Domain Routing (CIDR) which is now quickly outliving its usefulness and practicality.
The current estimate is that IPv4 addresses in the public address blocks will run out completely sometime in the middle of 2011 or early 2012. And with that depletion will inevitably cause some degree of disruption, which will be far more greater than the disruption that was predicted with the Y2K remediation efforts of the 1990s.
In the last several years, two key things have happened which have vastly accelerated the depletion of IPv4 addresses. One of which is the global rise of consumer home broadband, and the other the global rise and use of smartphones like the iPhone, the BlackBerry and handsets which use Google’s Android, which are being activated on the order of many hundreds of thousands per day.
Unfortunately, the lion’s share of these are using addresses within the public address blocks, and not the private IP blocks such as the 192.168.x.x, 172.16.x.x, 10.x.x.x which could be externally routed using technologies such as Network Address Translation (NAT) gateways.
The answer of course is, why not switch these two big albatrosses over to IPv6 immediately? Well, the problem is much more complicated and painful than it looks.
In the case of consumer broadband, home and small business networks could continue to run with IPv4 192.168.x.x class C blocks indefinitely without impacting the public address space. And enterprises could continue to run with 10.x.x.x and 172.x.x.x class B blocks for the very same reasons.
The problems arise, however, is when these networks have endpoints that touch the public Internet, which use addresses that are managed by the Internet Service Providers (ISPs) themselves that have to be requested from the Internet Assigned Numbers Authority (IANA).
In North America, requests for address space are further delegated to ARIN, the American Registry for Internet Numbers. These endpoint addresses are handed out to Internet routers connected to ISPs which provide NAT gateway services to the consumer as well as to enterprises.
As a private end-user with residential broadband, you typically see the endpoint to the public Internet as your Cable or DSL modem attached to an inexpensive SOHO router such as a Linksys or a NETGEAR. As a mobile wireless user on 3G/4G and on future technologies such as WiMax and LTE, it’s the IP address used by the mobile device itself.
Many of the newer SOHO routers made in the last few years are capable of firmware upgrades that could easily support an IPv6 transition and could be used for tunneling or NATing IPv4 traffic. But in most cases, it would require human intervention and end-users would have to know how to deploy the patch.
Most end-users have never patched their firmware on their routers even for security-related patches. There are also a lot of SOHO routers in use which are not easily firmware upgradeable, and will almost certainly require complete replacement.
In the case of smartphones, the three predominant platforms in use, iPhone, BlackBerry and Android are all patchable with the appropriate new IPv6 stacks and could be automatically updated by the wireless provider with Over the Air (OTA) update with little human intervention on the customer side besides clicking on “Accept Update” when prompted.
But there are also a lot of other IP-connected mobile devices in circulation that cannot be easily updated to a modern IPv6 stack.
There is also the issue of OS-level compatibility of the IPv6 stack itself, for those organizations that may end up having to deploy the protocol internally on their own networks.
Windows Vista, Windows 7, Windows 2008 R2 Server, UNIX, most mid-range systems, mainframes, and all modern versions of Linux and the Mac support IPv6 natively, but Windows XP’s and Windows 2003 Server’s support is widely considered to be “Experimental” and requires bringing the OSes up to the most current patch levels. They also lack the GUI management tools of what is used to manage IPv4.
And as we all know, a very large percentage of PCs in the wild running Windows are still using XP. Either Microsoft is going to have to consider an SP4 for Windows XP to address the most current implementation of IPv6 with all the support tools required in the enterprise for large-scale deployments, or there’s going to be a great deal of scrambling within enterprises to NATify and tunnel their IPv4 networks to connect to the new IPv6 Internet.
Alternatively, there will have to be a concerted effort to migrate environments to Windows 7 or Linux-based desktops/thin clients running on native IPv6 to cope with the global problem.
In addition to the OSes, which would have to be patched or reconfigured to support end-to-end IPv6, there is also the issue of legacy applications which may have hard coded IP addresses in them that point to internal or external networks which will almost certainly end up getting re-mapped.
Since IPv6 will be highly reliant upon DNS and not the new-fangled 128-bit hexadecimal IP address scheme to resolve host connectivity, this chasing down addresses in configuration files and legacy application code and changing them as required is going to be a monumental effort in and of itself, not unlike the Y2K effort of the 1990s. And the consequences for not re-mediating these types of things could be enormous, particularly if they are apps that have any impact on our national infrastructure.
Beyond the device, operating system-level and application-level patching, there is also the immediately pressing issue that most ISP’s haven’t even begun the process of requesting their IPv6 address blocks from the IANA, and their respective transition strategies of re-mapping their networks to deal with migration issues are in their infancy.
Implementing IPv6 will be a Herculean effort on the part of the technology industry in 2011 and 2012. But it doesn’t have to play out like a Bruckheimer-esque or Emmerlichian disaster film. What is your organization doing to prepare for the IPv6 transition?
Article by:
Jason Perlow who is a technologist with over two decades of experience integrating large heterogeneous multi-vendor computing environments in Fortune 500 companies.
Source & More Reading: IPv6: The end of the Internet as we know it (and I feel fine) - A ZDnet.Com Copyrighted Article

Monday, August 9, 2010

Comtech Telecommunications Corp. Awarded $4.8 Million SATCOM Equipment Order From Telecommunications Service Provider || atrexx

Comtech EF Data was awarded a $4.8 million SATCOM equipment order from a leading telecommunications service provider. The equipment will be utilized to upgrade an existing network in Asia that currently has legacy cellular backhaul equipment.

internet via Satellite can be used for cellular backhaulThe order comprises a variety of Comtech EF Data products, including the CDM-625 Advanced Satellite Modem, companion redundancy switches and the CSAT-5060 C-Band Transceivers. The award-winning CDM-625 Advanced Satellite Modem combines advanced technologies for maximum bandwidth efficiency under all conditions, including DoubleTalk(R) Carrier-in-Carrier(R) bandwidth compression, patented VersaFEC(R) low latency LDPC forward error correction with Adaptive Coding and Modulation, patent pending ultra low overhead streamline encapsulation, header compression and payload compression. The CSAT-5060 C-Band Transceivers provide flexibility, ease of installation and RF performance typically available only with independent, solid-state power amplifier and frequency converter topologies.

Also included in the order is the CX-U Series cellular backhaul platform from Comtech EF Data's subsidiary, Memotec, Inc. Memotec's CX-U Series is a dedicated cellular backhaul platform delivering Radio Access Network optimization and A/E voice trunks compression. The CX-U reduces the bandwidth required to backhaul cellular traffic, therefore avoiding costly forklift network upgrades. The result is a significant reduction in operating and capital expenses.

Fred Kornberg, President and Chief Executive Officer of Comtech Telecommunications Corp., said, "Given the CAPEX and OPEX savings our technologies deliver, mobile operators are able to make compelling business cases to replace legacy networks with Comtech equipment."

Memotec, Inc., a subsidiary of Comtech EF Data Corp., is an innovative supplier of optimization solutions for cellular backhaul networks. Its flagship product, the CX Series, enables enterprises, GSM, CDMA and 3G operators to dramatically reduce network operating expenses by cutting transmission costs and extending the service capabilities for evolving networks. Memotec's solutions are proven globally with equipment deployed in over 200 cellular network operations throughout Latin America, the Middle East, Africa and Asia. Please visit www.memotec.com for more information.

Comtech EF Data Corp. manufactures a broad spectrum of satellite earth station communications products, including Satellite Modems, Bandwidth & Capacity Management, TCP/IP Performance Enhancement Proxies, Encapsulators, Receivers, Frequency Converters, Amplifiers, Transceivers and Terminals. All products meet or exceed the standards published by worldwide and regional satellite networks. Please visit www.comtechefdata.com for more information.

Comtech Telecommunications Corp. designs, develops, produces and markets innovative products, systems and services for advanced communications solutions. The Company believes many of its solutions play a vital role in providing or enhancing communication capabilities when terrestrial communications infrastructure is unavailable, inefficient or too expensive. The Company conducts business through three complementary segments: telecommunications transmission, mobile data communications and RF microwave amplifiers. The Company sells products to a diverse customer base in the global commercial and government communications markets. The Company believes it is a market leader in the market segments that it serves.

Certain information in this press release contains statements that are forward-looking in nature and involve certain significant risks and uncertainties. Actual results could differ materially from such forward-looking information. The Company's Securities and Exchange Commission filings identify many such risks and uncertainties. Any forward-looking information in this press release is qualified in its entirety by the risks and uncertainties described in such Securities and Exchange Commission filings.

Source: Comtech Telecommunications Corp. Awarded $4.8 Million SATCOM Equipment Order From Telecommunications Service Provider

This to note that recently BTRC ( Bangladesh Telecommunication Regulatory Commission) has cancel all commercial usages VSAT. BTRC has ban all type of commercial usages of VSAT and advice the VSAT Provider to deposit their VSAT equipment so that BTRC can add security tag which prevent the equipment to use farther. Removing the security tag is violation of low. Few other VSAT user like VSAT use by Diplomatic User, IIGW and few other organization like NGO etc will not effected on this Ban.

Posted by: Ahamed Bauani

Sunday, August 8, 2010

I receiving emails with Subject: Your private photo attached

In last 24 hours, I received almost 21 emails from different people with subject:

Your private photo attached

All email came from unknown people with a .zip compressed attachment. When try to open the attachment, nothing happen. In Linux system if I use gunzip to unzip the compressed file, a blank .jpg or .gif file found. Every attachment size is 13 to 15k. I think this is a new type of virus or botnet trying to spreed in cyberworld. 

Do you received this type of email yet?

Ahamed Bauani

Google vs. Facebook: Drawing the battle lines

There's a requisite chaos to the "hacker culture" that has been central to the rise of both Google and Facebook: cobble something together, fueled by Red Bull and pizza, until it works; keep changing it and improving it, lest a competitor jump in and create something better; and if for some reason it doesn't work, just do away with it altogether. From both the inside and the outside, it can look quite messy.

Take, for example, the fact that Google has been known to tweak its search algorithm hundreds of times per year, or that the Facebook home page goes through major facelifts on a regular basis. This week, Google killed an experimental social-collaboration project called Wave that had been heavily hyped at launch; last month, Facebook's "Gift Shop" feature got the ax. That slash-and-burn, change-the-system mentality that a Valley superstar like Google or Facebook projects to the outside world applies internally, too.

For more on this story, read Google vs. Facebook: Drawing the battle lines on CNET News.

Source: Google vs. Facebook: Drawing the battle lines

Saturday, August 7, 2010

HP CEO Mark Hurd resigns amid sexual harassment investigation

HP CEO Mark Hurd resigns amid sexual harassment investigation; Company raises full year guidance

HP CEO Mark Hurd Resigns; CFO Cathie Lesjak Appointed Interim CEO; HP Announces Preliminary Results and Raises Full-year Outlook

PALO ALTO, Calif. — HP today announced that Chairman, Chief Executive Officer and President Mark Hurd has decided with the Board of Directors to resign his positions effective immediately.

The Board has appointed CFO Cathie Lesjak, 51, as CEO on an interim basis. Lesjak is a 24-year veteran of the company who has served as HP’s CFO and as a member of the company’s Executive Council since January 2007. She oversees all company financial matters and will retain her CFO responsibilities during the interim period.

Hurd’s decision was made following an investigation by outside legal counsel and the General Counsel’s Office, overseen by the Board, of the facts and circumstances surrounding a claim of sexual harassment against Hurd and HP by a former contractor to HP. The investigation determined there was no violation of HP’s sexual harassment policy, but did find violations of HP’s Standards of Business Conduct.

A Search Committee of the Board of Directors has been created, consisting of Marc L. Andreessen, Lawrence T. Babbio, Jr., John H. Hammergren, and Joel Z. Hyatt, which will oversee the process for the identification and selection of a new CEO and Board Chair. HP’s lead independent director, Robert Ryan, will continue in that position.

Hurd said: “As the investigation progressed, I realized there were instances in which I did not live up to the standards and principles of trust, respect and integrity that I have espoused at HP and which have guided me throughout my career. After a number of discussions with members of the board, I will move aside and the board will search for new leadership. This is a painful decision for me to make after five years at HP, but I believe it would be difficult for me to continue as an effective leader at HP and I believe this is the only decision the board and I could make at this time. I want to stress that this in no way reflects on the operating performance or financial integrity of HP.”

“The corporation is exceptionally well positioned strategically,” Hurd continued. “HP has an extremely talented executive team supported by a dedicated and customer focused work force. I expect that the company will continue to be successful in the future.”

Robert Ryan, lead independent director of the Board, said: “The board deliberated extensively on this matter. It recognizes the considerable value that Mark has contributed to HP over the past five years in establishing us as a leader in the industry. He has worked tirelessly to improve the value of HP, and we greatly appreciate his efforts. He is leaving this company in the hands of a very talented team of executives. This departure was not related in any way to the company’s operational performance or financial condition, both of which remain strong. The board recognizes that this change in leadership is unexpected news for everyone associated with HP, but we have strong leaders driving our businesses, and strong teams of employees driving performance.”

“The scale, global reach, broad portfolio, financial strength and, very importantly, the depth and talent of the HP team are sustainable advantages that uniquely position the company for the future,” said Lesjak. “I accept the position of interim CEO with the clear goal to move the company forward in executing HP’s strategy for profitable growth. We have strong market momentum and our ability to execute is irrefutable as demonstrated by our Q3 preliminary results.”

Lesjak has taken herself out of consideration as the permanent CEO but will serve as interim CEO until the selection process is complete. Candidates from both inside and outside the company will be considered. The selection of a new chairman will occur in conjunction with the CEO decision.

The company does not expect to make any additional structural changes or executive leadership changes in the near future.

HP announces preliminary third quarter results; raises full-year outlook for revenue and non-GAAP EPS

HP is announcing preliminary results for the third fiscal quarter 2010, with revenue of approximately $30.7 billion up 11% compared with the prior-year period.

In the third quarter, preliminary GAAP diluted earnings per share (EPS) were approximately $0.75 and non-GAAP diluted EPS were approximately $1.08. GAAP and non-GAAP EPS were negatively impacted by $0.02 pertaining to one-time charges relating to the previously announced U.S. Department of Justice settlement. Non-GAAP diluted EPS estimates exclude after-tax costs of approximately $0.33 per share, related primarily to restructuring, amortization of purchased intangible assets and acquisition-related charges.

For the fourth fiscal quarter of 2010, HP estimates revenue of approximately $32.5 billion to $32.7 billion, GAAP diluted EPS in the range of $1.03 to $1.05 and non-GAAP diluted EPS in the range of $1.25 to $1.27. Non-GAAP diluted EPS estimates exclude after-tax costs of approximately $0.22 per share, related primarily to restructuring, amortization of purchased intangible assets and acquisition-related charges.

For the full year, HP now expects revenue in the range of $125.3 billion to $125.5 billion. FY10 GAAP diluted EPS is expected to be in the range of $3.62 to $3.64 and non-GAAP diluted EPS in the ranged of $4.49 to $4.51. FY10 non-GAAP diluted EPS estimates exclude after-tax costs of approximately $0.87 per share, related primarily to restructuring, amortization of purchased intangibles and acquisition-related charges.

Tuesday, August 3, 2010

Apple drops competitor antenna criticism from website

After it became obvious that there was something wrong with the antenna design on the iPhone 4, Apple kept pointing out that there are similar problems with models made by its competitors. Now, the Cupertino company has quietly stopped.

Up until recently, Apple targeted specific smartphones that they claimed suffered the same antenna-related problems, including taking a stab at the Motorola Droid X. But now, visitors are automatically redirectedtowards another page about the antenna lab and design.

There hasn’t been an explanation of Apple pulled the comparison pages, but it could have something to do with a study about the “death grip” problems being unique to the iPhone 4. There was also certainly a lot ofbacklash from other smartphone manufacturers following the July 16 press conference, including retorts from RIM and Samsung, among others.

There have been plenty of mixed reviews on Apple’s entire response to the situation, and some think the company’s once glowing brand name has now been tarnished. While the company is still surely going to sell plenty of products and continue to be successful, this has definitely proven to be a turning point in Apple’s history.

Other Posts

Labels / Category

2013 (1) 3G (4) Adsense (2) AKTEL (2) Amateur Radio (3) APNIC (5) Bajaj Discovery (1) Bajaj Pulsar (1) Bangla News (5) Bangladesh (29) Bangladesh Computer Market (1) Bangladesh Cricket (2) Bangladesh earthquake (3) Bangladesh Educational Board (1) Bangladesh Energy (4) Bangladesh ICT (15) Bangladesh Internet Service (15) Bangladeshi Credit Card (3) Bangladeshi News Site (3) Bank in Bangladesh (7) Bank of Bangladesh (10) Banking in Bangladesh (10) BGMEA Bulding (1) Big File Download (3) blackhat (1) BLOG (6) Bogon (3) bot (2) BTCL (3) BTRC (14) BTTB Internet (10) BTTB Submarine Cable (9) Byke Hijack (1) Cacti (1) Call Block (1) Carbon Credit (1) CentOs (2) CentOs Bangladesh (2) Charity (2) Chrome (2) Computer Booting (1) Credit Card (10) Credit Card in Bangladesh (8) Crime (3) CyberCrime (11) Cyclon (1) DDoS (8) Dengue (1) Denmark (1) Dhaka earthquake (5) DNS (3) DNSSEC (2) Domain (9) DoS (4) dot bd domain (3) Dot CO.CC (2) Download (4) Drive not opening on click (1) DV Lottery 2010 (2) E-Learning (1) earthquake (5) EARTHQUAKE BANGLADESH (2) EARTHQUAKE DHAKA (2) earthquake in Bangladesh (5) earthquake in Dhaka (5) Email (7) Email Full Header (3) Email Sender Identify (4) Entertainment (2) Fake Email Sender (5) Firefox (8) FTP (1) Funny (4) GMail (4) Google (18) GPRS Settings (1) GrameenPhone (1) HAM (4) Health (3) Hobby (1) IGW (3) IIG (3) India (1) Indian ICT (1) Indian IT (1) Internet (19) Internet Mail (1) Internet Security (9) iPhone (3) iPhone Bangla (2) iPhone Bangladesh (2) iPhone in Dhaka (2) iPod (1) IPv4 Allocation (8) ipv6 (10) islam (4) ISOC (3) Linux Articles (6) Metal News (1) Microsoft (4) Microsoft buy Yahoo (1) Mirror Server (1) Mobile Phone (3) Mobile Phone Internet (1) Mobile Phone News (3) Mobile Phone Operator (6) Mobile Phone User (3) Mozilla (8) Mozilla Firefox (8) Myself (1) Mystery (1) Netcraft (4) Network Monitoring (4) neverBot (2) News Site (1) Nokia (3) Oil Price (2) Online Security (7) Paypal in Bangladesh (6) Personal View (1) Phishing (2) Pigeons (1) Postfix (7) PSTN (2) RANGS Bulding (1) Relay Host (2) robot.txt (1) robots.txt (2) Scour (2) Scour.com (2) Second submarine cable (3) Sendmail (4) Share Market (4) Smart Relay (3) SSC Result (1) SSC Result 2008 (1) Stock Market (3) Technology (1) Ubuntu (4) UCB (5) UCBL (5) URL Redirect (2) Virus (3) Virus Infected Windows (3) Virus Information (3) Warid (2) Web Spider (3) Webhosting (6) Wimax (4) Windows (1) Windows Problems (1) Wireless Internet in Bangladesh (5) Yahoo (4) Yahoo Sold (1)

Share it