Businessafrica.net Newsletter ISSN 1563-4108
Dr. QUENUM & ASSOCIATES
INVESTMENT AND BUSINESS PLANNERS

Tel: +1 440 941 5187
Click here for contact & support console


fatfile.com - Send large file to anyone...anywhere
AFRICABIZ MONTHLY ISSUE - BACKPAGE

Africabiz Online Home
Jobs Bidding
Current
Financing
Opportunities
Desktop Control
Add Links
Dynamic News
Developing News
MediaKit
FAQ
Contact-Support
Site Search by Freefind


Only US$12.75
Achetez Africains, Refusez de Rester Pauvres!

AFRICABIZ VOL 1 - ISSUES: 40 & 41
AUGUST 15 - OCTOBER 14, 2002
Previous Issue
Editor: Dr. Bienvenu-Magloire Quenum
Click here for contact & support console
Featured Article
Countries Briefs
Live News On Africa
Contact Information
Synopsis Rss Feed Sample
A Word From the Editor
Business Opportunities
FrontDoor
Your Feedback
Freebie For You
Control Your Desktop

CONTROL YOUR DESKTOP


Click here
for Africabiz Online RSS Feed Sample.

- SECURITY...SECURITY...SECURITY IN NETWORKING

In several deliveries of CONTROL YOUR DESKTOP the security problem of networking has been considered (5, 16, 24, 26, 28, 37). And we have particularly advocated for the use of PGP. However, many articles are now appearing in the WWW pages signaling for flaws in PGP plug-ins to Microsoft Outlook / Outlook Express. It's highly important to make search for available patches in order to stemming out these flaws.

All security tools reported in links above mentioned and plenty of others available on the Net are either about CRYPTOGRAPHY (files or emails are encrypted before dispatch over the Net) or STEGANOGRAPHY (files or emails are hide in another file, which is dispatched over the Net).

ENCRYPTED files are spotted when traveling into the Net's circuit. The gibberish composition of the encrypted "text" makes the spotting easy. Your Internet Service Provider knows when you are receiving encrypted mails or attached files. Big Brother also, who has dedicated software like CARNIVORE, which performs the spotting very fast - even if the deciphering may not be so easy depending on the quality and efficiency of the used encryption package. In the contrary STEGANOGRAPHED files may travel unnoticed. They are masked, hid and inserted inside another normal looking file - text, image, sound files. Etc.

However, people who are not fully security conscious do send their encrypted or steganographed files through open Public Networking Computing Channels, which make the spotting, detection and (maybe) deciphering of said files an easy job for malicious onlookers and eavesdroppers.

- YOU NEED A VIRTUAL NETWORKING COMPUTING - VNC - IF YOUR FILES ARE SENSIBLE STUFFS

There are a lot of snake oil security tools around, which just give you a false feeling of security and confidentiality. Therefore, the secure transfer of your encrypted or steganographed files or emails over Public Networking Computing Channels depends on the surety and efficiency that your security tool really provides. When you use bogus security tools, and transfer through Public Networking Computing Channels you just play into the hands of resolute competitors or in Big Brother's clutches. Even proven tools like PGP are now, as above reported, showing leaking holes.

Hence the necessity not to use Public Networking Computing Channels to transferring your sensible encrypted or steganographed files over the Net.

- MAKE USE OF AN EFFICIENT VIRTUAL NETWORKING COMPUTING UTILITY

If you are dealing in a sensible business, scientific or Information Technology area, and need full confidentiality of exchange with your counterpart; if you do not want to see your valuable work copied, duplicated and or snatched away from you by avid and resolute competitors, you will need advanced security and surety of exchanges; either when you have text or voices exchanges over the Net.

There is a FREE utility called PRIVARIA developed by Ed Suominen of eepatents.com/privaria/, which makes Virtual Networking Computing a snap! With PRIVARIA you can perform the following:

1 - Remote desktop access (keyboard and mouse).
2 - Remote command shell to exchanging files.
3 - Collaborative whiteboard sketching and text with a remote user.
4 - Video conference via secure video and audio transmission.

PRIVARIA is here available for FREE

FREEBIE


WORKING TIME TRACKER

Here is a nifty little tool which will assist you tracking how much time you spend on different projects and tasks. You can bill each client / project separately in real time; manage your working time and schedule your tasks more efficiently.

Click here to get WORKING TIME TRACKER.

FREQUENTLY ASKED QUESTIONS
AFRICA'S DYNAMIC NEWS HEADLINES

COUNTRIES BRIEFS
OFFERS ON TROPICAL COMMODITIES


BID ON JOBS AND PROJECTS WORLDWIDE
VIP MEMBERS LOUNGE
Africabiz Newsletter

Click here to review million of Free Auctions and Classifieds
Click for Banners Positioning and Pricing
SEARCHING FOR SUCCESS IN HOME BUSINESS?
YOU NEED A COMPUTER & THE RIGHT KNOWLEDGE & TIPS

Click Here to Download Free eBooks for Successful Home Business