<html><head><style type="text/css"><!-- DIV {margin:0px;} --></style></head><body><div style="font-family:arial,helvetica,sans-serif;font-size:10pt">Hey everyone;<br><br>At yesterday's meeting, I outed myself as an IT Security guy ... I just wanted to pass along a great free resource for anyone interested in IT Security issues, malware, hacking, etc. See below. I do get some marketing-spam from them re: training and stuff, but I consider that to be the cost of the publication...<br><br>In order to download the pdf version, you do need to provide an email address (note: "an")<br><br>cheers,<br><br>Eric<div style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"><br><div style="font-family: times new roman,new york,times,serif; font-size: 12pt;"><font face="Tahoma" size="2">----- Forwarded Message ----<br><b><span style="font-weight: bold;">From:</span></b> Hakin9 Magazine &lt;newsletteren@hakin9.org&gt;<br><b><span style="font-weight:
 bold;">To:</span></b> eric.schmidt@rogers.com<br><b><span style="font-weight: bold;">Sent:</span></b> Wed, November 17, 2010 11:12:52 AM<br><b><span style="font-weight: bold;">Subject:</span></b> H9: November issue of Hakin9; Spyware - Someone is always watching...<br></font><br>
         
        <title>hakin9 Newsletter</title>
    
<div><table style="width: 774px;" cellpadding="5" cellspacing="0"><tbody><tr><td><table style="width: 819px;" border="0" cellpadding="0" cellspacing="0"><tbody><tr><td rowspan="3" width="23"><span style="font-family: Times New Roman;"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/newsletter/gora_01.gif" alt="" height="64" width="23"></span></td> <td rowspan="3" width="229"><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18910&amp;l=-http--www.hakin9.org/en"><span style="font-family: Times New Roman;"> <img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/logo%281%29.jpg" alt="" border="0" height="64" width="229"></span></a></td> <td colspan="7"><span style="font-family: Times New Roman;"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/newsletter/gora_03.gif" alt="" height="16" width="523"></span></td></tr>
 <tr><td rowspan="2" width="39"><span style="font-family: Times New Roman;"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/newsletter/gora_04.gif" alt="" height="48" width="31"></span></td> <td width="124"><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18911&amp;l=-http--hakin9.org/magazine/article"><span style="font-family: Times New Roman;"> <img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/newsletter/gora_05.gif" alt="" border="0" height="31" width="118"></span></a></td> <td rowspan="2" width="4"><span style="font-family: Times New Roman;"> </span><br></td> <td width="36"><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18912&amp;l=-http--hakin9.org/subscription"><span style="font-family: Times New Roman;"> <br>
 </span></a></td> <td width="182"><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18913&amp;l=-http--hakin9.org/newsletter"><span style="font-family: Times New Roman;"> <img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/newsletter/gora_08.gif" alt="" border="0" height="31" width="125"></span></a></td> <td bgcolor="#ffffff" width="176"><br></td> <td rowspan="2" width="6"><span style="font-family: Times New Roman;"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/newsletter/gora_10.gif" alt="" height="48" width="6"></span></td></tr> <tr><td><span style="font-family: Times New Roman;"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/newsletter/gora_11.gif" alt="" height="17" width="118"></span></td> <td colspan="3"><span style="font-family: Times New Roman;"><img
 src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/newsletter/gora_12.gif" alt="" height="17" width="359"></span></td></tr></tbody></table></td></tr></tbody></table> <table style="width: 775px;" cellpadding="5" cellspacing="0"><tbody><tr><td align="left" bgcolor="#ffffff" height="10" width="775"><hr><h1 style="text-align: center;"><span style="color: rgb(0, 0, 0);"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/listek.jpeg" alt="" align="right" height="90" width="90"></span> <span style="color: rgb(0, 0, 0);"><br> November issue of Hakin9 <br> Spyware - Someone is always watching...</span></h1> <hr></td></tr> <tr><td bgcolor="#ffffff" valign="top"><table style="width: 100%;" align="center" cellpadding="0" cellspacing="0"><tbody><tr><td colspan="2" height="310" valign="top"><table style="width: 100%;" bgcolor="#ffffff" border="0" cellpadding="3"><tbody><tr><td bgcolor="#ffffff"><span style="font-family: Times New
 Roman;"><span style="color: red;"><span style="font-size: 14pt;"><strong>Secure Hash® Integrity Verification Utility </strong></span></span> </span><hr></td></tr> <tr><td align="left" valign="top"><p><span style="font-family: Times New Roman;"><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18914&amp;l=-http--secure1st.com">Secure 1st</a> have announced the release of <strong>Secure Hash V1.0</strong>. This new Windows application is designed to generate, store and analyse digital signatures. These digital signatures can then be used during a cyber forensic investigation to insure the integrity of the investigation.<br> <br> <strong>Secure Hash</strong> scans the hard disk (or any storage media) on a Windows PC and calculates the MD5, SHA1 and SHA2 hashes of the files and builds a list with other vital information such as file size, location, date of
 creation and date of modification. The resulting list can be used during a cyber forensic investigation. For example, the investigator may use Secure Hash to save the names, locations and hashes of
all the files on a PC during the first stage of the investigation, after the PC has been removed from the crime scene. Later, the investigator could use this information in a court of law or in a lab to generate a report and file list to insure the integrity of the investigation.<br> <br> <strong>Secure Hash</strong> is 100% compatible with all versions of Microsoft Windows from Microsoft Windows 95 to Microsoft Windows 7 including the 64 bit variants.<br> <br> <a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18914&amp;l=-http--secure1st.com">http://secure1st.com</a></span></p> <p>&nbsp;</p></td></tr></tbody></table> <table style="width: 100%;" bgcolor="#ffffff" border="0" cellpadding="3"><tbody><tr><td bgcolor="#ffffff"><span style="font-family: Times New Roman;"><span style="color: red;"><span style="font-size: 14pt;"><strong>SpyShelter - Protect Your
 Privacy. Feel Secured.</strong></span></span> </span><hr></td></tr> <tr><td align="left" valign="top"><p><span style="font-family: Times New Roman;"><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18915&amp;l=-http--www.spyshelter.com/description.html"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/2010_10_27/SpyShelter.jpg" alt="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18915&amp;l=-http--www.spyshelter.com/description.html" align="right" border="0" hspace="10" vspace="10"></a><strong>SpyShelter is the anti-keylogging, anti-spyware program that protects your data from all types of keylogging and spy programs: known, unknown, and under-development. </strong></span></p> <p><span style="font-family: Times New Roman;"> Whenever you use the ATM, you cover the keyboard to protect
 your pin. Spyshelter performs the same for your computer, it detects and block dangerous and malicious programs from
reading what your typing on your personal keyboard.</span></p> <p><span style="font-family: Times New Roman;"> <a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18915&amp;l=-http--www.spyshelter.com/description.html"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/2010_10_27/SpyShelter_box1.jpg" alt="" align="right" border="0"></a>By constantly scanning your machine for any malicious programs that attempt to capture and store your private and sensitive information, Spyshelter will keep you safe and secure. </span></p> <p><span style="font-family: Times New Roman;"> Unlike other anti-malware programs, Spyshelter doesn't rely on comparing items to another database, it has its own special in-built fast algorithms that won't slow down your computer while still keeping you safe.</span></p> <p><span style="font-family: Times New Roman;"> Every day
 cybercriminals are releasing custom-made keyloggers to try
and steal your personal and private information from your personal computer. Stop this now by installing Spyshelter, and never face this threat again.</span></p> <p><span style="font-family: Times New Roman;"> With its simple and easy-to-use intuitive GUI, you'll be protected in no time at all.</span></p> <p><span style="font-family: Times New Roman;"> Spyshelter is Windows x32/x64 compatible.(World first 64 bit anti keylogger)</span></p> <p><span style="font-family: Times New Roman;"> For detailed description of SpyShelter please visit <a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18915&amp;l=-http--www.spyshelter.com/description.html">www.spyshelter.com</a></span></p> <p>&nbsp;</p></td></tr></tbody></table> <table style="width: 100%;" bgcolor="#ffffff" border="0" cellpadding="3"><tbody><tr><td bgcolor="#ffffff"><span style="font-family: Times New
 Roman;"><span style="color: red;"><span style="font-size: 14pt;"><strong>FREE White Papers to help protect your company information - STOP document leakage and information theft</strong></span></span> </span><hr></td></tr> <tr><td align="left" valign="top"><p><span style="font-family: Times New Roman;"><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18916&amp;l=-http--www.locklizard.com"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/2010_11_17/confidential.jpg" alt="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18916&amp;l=-http--www.locklizard.com" align="right" border="0" height="133" hspace="5" vspace="5" width="199"></a><a rel="nofollow" target="_blank"
 href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18917&amp;l=-http--www.locklizard.com/Information_Leakage.pdf">Information Leakage - the enemy is within</a><br> <br> This paper covers why DRM is required for data leakage
prevention from within and outside of the enterprise for use as an effective document control system. It covers why encryption and access control are only effective inside the enterprise to secure information.</span></p> <p><span style="font-family: Times New Roman;"> <a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18918&amp;l=-http--www.locklizard.com/Document_Security.pdf">Document Security - a guide to securing your documents</a><br> <br> This paper explains what components make up a document security solution and which one is right for you. It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.</span></p> <p><span style="font-family: Times New Roman;"> <a rel="nofollow" target="_blank"
 href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18919&amp;l=-http--www.locklizard.com/PDF-Security-10-questions.pdf">10 things you wished you had known about PDF Security, but they didnt tell you!</a><br> <br> Is the PDF security software you are looking to purchase really secure?  If the PDF security software you are evaluating can be simply broken then you might as well save your money.  What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.</span></p> <p>&nbsp;</p></td></tr></tbody></table> <table style="width: 100%;" bgcolor="#ffffff" border="0" cellpadding="3"><tbody><tr><td bgcolor="#ffffff"><span style="font-family: Times New Roman;"><span style="color: red;"><span style="font-size: 14pt;"><strong>Netsparker Web Application Security Scanner</strong></span></span> </span><hr></td></tr> <tr><td align="left"
 valign="top"><p><span style="font-family: Times New Roman;"> <a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=19067&amp;l=-https--www.mavitunasecurity.com/demo/"> <img src="http://mytalkoot.com/12all/images/andrzejkuca/netsparker.jpg" alt="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=19067&amp;l=-https--www.mavitunasecurity.com/demo/" align="right" border="0" hspace="5" vspace="5"></a> <strong>Netsparker Web Application Security Scanner</strong> uses exploitation in its core engine to detect vulnerabilities and eliminate false positives. All critical and important vulnerabilities have a direct impact, Netsparker uses this impact to prove that identified vulnerabilities are not false positives and demonstrates this impact to you.  <br><br> Finally a scanner that you can trust, a scanner that doesn't
 guess but knows, a scanner that you can say <em>"Yeah!"</em> when it reports a vulnerability rather than <em>"Meh...,
Let's investigate if it's real or not."</em>, <br><br> <strong>Try Netsparker Professional Today and see it with your own eyes:<br> <a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=19067&amp;l=-https--www.mavitunasecurity.com/demo/"> https://www.mavitunasecurity.com/demo/</a></strong> </span></p> <p>&nbsp;</p></td></tr></tbody></table> <table style="width: 531px; height: 291px;" bgcolor="#ffffff" border="0" cellpadding="3"><tbody><tr><td bgcolor="#ffffff"><p><span style="font-family: Times New Roman;"><span style="color: red;"><span style="font-size: 14pt;"><strong>Vulnerability Management Buyers Checklist</strong></span></span></span></p> <hr></td></tr> <tr><td valign="top"><p style="margin-bottom: 0cm;"><span style="font-family: Times New Roman;">Key Questions to Ask Before You Select a VM Solution</span></p> <p style="margin-bottom: 0cm;"><span
 style="font-family: Times New Roman;"> Choosing a solution for VM is
a critical step toward protecting your organizations network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.</span></p> <p style="margin-bottom: 0cm;"><span style="font-family: Times New Roman;"> To help finalize your decision on which solution to buy, download this 12-point short list of considerations that will help you determine what will work best for your organization. </span></p> <p style="margin-bottom: 0cm;"><span style="font-family: Times New Roman;"> URL: <a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18920&amp;l=-https--www.qualys.com/forms/guides/vm_buyers_checklist/--Q-leadsource--E-826891">https://www.qualys.com/</a></span></p> <p>&nbsp;</p></td></tr></tbody></table> <table style="width: 100%;" bgcolor="#ffffff"
 border="0" cellpadding="3"><tbody><tr><td bgcolor="#ffffff"><span style="font-family: Times New Roman;"><span style="color: red;"><span style="font-size: 14pt;"><strong>eLearnSecurity Penetration Testing Course</strong></span></span> </span><hr></td></tr> <tr><td align="left" valign="top"><p><span style="font-family: Times New Roman;"><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18921&amp;l=-http--www.elearnsecurity.com"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/2010_03_10/logo_small_transp.png" alt="elearnsecurity" align="right" border="0" hspace="10" vspace="10"></a>"eLearnSecurity Penetration Testing Course is the course for professionals who want to study and practice the most advanced hacking skills, the best project management methodology and the guidelines for state of the art reporting.<br><br> Get 1 free SQL Injection
 module here: <a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18921&amp;l=-http--www.elearnsecurity.com">http://www.elearnsecurity.com</a> <br> <br> "I kept thinking "this is what the CEH/LPT should have been," and I am delighted to say that if students can master the topics and techniques in eLearnSecuritys Penetration Testing Pro, they should be well on their way to being an accomplished pentester" Jason Haddix - SecurityAegis"</span></p> <p>&nbsp;</p></td></tr></tbody></table></td> <td style="padding: 10px;" align="center" bgcolor="#ececec" valign="top" width="239"><p><span style="font-family: Times New Roman;"><span style="color: red;"><strong>Spyware - Someone is always watching... <br> <br> <strong><a rel="nofollow" target="_blank"
 href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18922&amp;l=-http--hakin9.org/magazine/1544-spyware-someone-is-always-watching">DOWNLOAD</a></strong>
</strong></span> </span></p> <hr><p><span style="font-family: Times New Roman;"><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18923&amp;l=-http--hakin9.org/magazine/1528-email-security"><img style="width: 200px; height: 289px;" src="http://hakin9.org/system/editions/photo1s/1544/medium/hakin9_10_2010_EN.png?1288296768" alt="" border="0"></a></span></p> <p><span style="font-family: Times New Roman;">See the full list of articles at <br> </span><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18922&amp;l=-http--hakin9.org/magazine/1544-spyware-someone-is-always-watching"><span style="font-family: Times New Roman;">hakin9 website</span></a></p> <hr><p><span style="color: red;"><strong>Advertise with Hakin9 magazine</strong></span></p> <p><span style="font-family:
 Times New Roman;"> <a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18924&amp;l=-http--hakin9.org/advertising"><strong>Visit our website</strong></a> or contact us directly at <a rel="nofollow" ymailto="mailto:karolina.lesinska@hakin9.org" target="_blank" href="mailto:karolina.lesinska@hakin9.org">karolina.lesinska@hakin9.org</a> </span></p> <hr><p><span style="color: red;"><strong>Download 2009/2010 archives of Hakin9 magazine</strong></span></p> <p><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18911&amp;l=-http--hakin9.org/magazine/article"><span style="font-family: Times New Roman;">Click here!</span></a></p> <hr><span style="font-family: Times New Roman;"> <p><span style="color: red;"><strong>NetClarity</strong></span></p> </span> <p><a rel="nofollow"
 target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18925&amp;l=-http--www.netclarity.net/extreme/"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/2010_07_28/net_clarity.png" alt="box" border="0" hspace="5" vspace="5"></a><br> <br> <a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18925&amp;l=-http--www.netclarity.net/extreme/">http://www.netclarity.net</a></p> <hr><p><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18926&amp;l=-http--www.activecampaign.com/email-marketing/">Email marketing by<br> <img src="http://mytalkoot.com/12all/images/wydawnictwo/ActiveCampaing.png" alt="" border="0"></a></p></td></tr></tbody></table></td></tr> <tr><td style="padding: 20px;"
 bgcolor="#ececec"><table style="width: 741px; height: 115px;"><tbody><tr><td><p><span style="font-family: Times New Roman;"><span style="color: rgb(0, 0, 0);">Please spread the word about Hakin9.<br> Hakin9 team<br> </span></span><span style="font-family: Arial;"><span style="font-family: Times New Roman;"><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18910&amp;l=-http--www.hakin9.org/en"><span style="color: rgb(0, 0, 0);">www.hakin9.org</span></a><span style="color: rgb(255, 255, 255);"><br> </span></span><span style="font-family: Arial;"><span style="font-family: Times New Roman;"><a rel="nofollow" ymailto="mailto:en@hakin9.org" target="_blank" href="mailto:en@hakin9.org"><span style="color: rgb(0, 0, 0);">en@hakin9.org</span></a><span style="color: rgb(0, 0, 0);"><br> tel. +1 917 338 36 31</span></span><span style="font-family: Arial;">
 </span></span></span></p></td> <td style="text-align: left;" bgcolor="#ececec"><div><span style="font-family: Times New Roman;">Find hakin9 magazine on:</span></div> <div><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18927&amp;l=-http--twitter.com/Hakin9"><span style="font-family: Times New Roman;"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/26_11_2009/twitter-logo.png" alt="" border="0" height="50" hspace="10" vspace="10" width="50"></span></a><span style="font-family: Times New Roman;"> </span><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/lt.php?c=775&amp;m=482&amp;nl=9&amp;s=48627b845cfda8b004a2e20a9f773085&amp;lid=18928&amp;l=-http--www.facebook.com/group.php--Q-gid--E-20129542629"><span style="font-family: Times New Roman;"><img
 src="http://www.payrankings.com/12all/admin/images/wydawnictwo/hakin9_EN/26_11_2009/FBLogo.png" alt="" border="0" height="50" hspace="10" vspace="10" width="50"></span></a><span style="font-family: Times New Roman;"> </span><a rel="nofollow" target="_blank" href="http://www.linkedin.com/profile?viewProfile=&amp;key=42924199&amp;authToken=Sy5B&amp;authType=OUT_OF_NETWORK&amp;locale=en_US&amp;srchindex=1&amp;pvs=ps&amp;goback=%2Efps_hakin9_*1_*1_*1_*1_*1_*1_*1_Y_*1_*1_*1_false_1_R_true_G%2CN%2CI%2CCC%2CPC%2CED%2CFG%2CL_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2"><span style="font-family: Times New Roman;"><img src="http://mytalkoot.com/12all/images/wydawnictwo/hakin9_EN/26_11_2009/linkedin-logo.gif" alt="" border="0" height="54" hspace="10" vspace="10" width="54"></span></a></div></td></tr></tbody></table></td></tr></tbody></table></div>
<div><a rel="nofollow" target="_blank" href="http://mytalkoot.com/12all/box.php?nl=9&amp;c=775&amp;m=482&amp;s=48627b845cfda8b004a2e20a9f773085&amp;funcml=unsub2">Click here</a> to unsubscribe from future mailings.</div><img src="http://mytalkoot.com/12all/lt.php?nl=9&amp;c=775&amp;m=482&amp;s=48627b845cfda8b004a2e20a9f773085&amp;l=open" border="0"></div></div>
</div></body></html>