<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 10pt;
font-family:Tahoma
}
--></style>
</head>
<body class='hmmessage'>
<FONT style="FONT-SIZE: 16pt" size=4>DOMAIN NAME</FONT><BR>
&nbsp;<BR>
Authorities Approve .XXX Addresses for Pornography Sites <BR>
<A href="http://www.designtaxi.com/news/34327/Authorities-Approve-XXX-Addresses-for-Pornography-Sites/?page=1">http://www.designtaxi.com/news/34327/Authorities-Approve-XXX-Addresses-for-Pornography-Sites/?page=1</A><BR>
&nbsp;<BR>
&nbsp;<BR>
&nbsp;<BR>
Approval given for xxx domain names<BR>
<A href="http://www.ft.com/cms/s/0/1e83a4e8-51c0-11e0-888e-00144feab49a.html?ftcamp=rss#axzz1HEfpg0cl">http://www.ft.com/cms/s/0/1e83a4e8-51c0-11e0-888e-00144feab49a.html?ftcamp=rss#axzz1HEfpg0cl</A><BR>
&nbsp;<BR>
&nbsp;<BR>
&nbsp;<BR>
Despite objections, .xxx OK’d for Internet domain names<BR>
<A href="http://www.washingtontimes.com/news/2011/mar/20/despite-objections-xxx-okd-internet-domain-names/?page=2">http://www.washingtontimes.com/news/2011/mar/20/despite-objections-xxx-okd-internet-domain-names/?page=2</A><BR>
&nbsp;<BR>
&nbsp;<BR>
&nbsp;<BR>
&nbsp;<BR>
<FONT style="FONT-SIZE: 16pt" size=4>CYBERCRIME</FONT><BR>
&nbsp;<BR>
&nbsp;<BR>
Google says China disrupting e-mail service<BR>
<A href="http://www.bbc.co.uk/news/business-12802914">http://www.bbc.co.uk/news/business-12802914</A><BR>
&nbsp;<BR>
&nbsp;<BR>
&nbsp;<BR>
Google Points the Finger at the Chinese Government In Latest Cyber Attack<BR>
<A href="http://business2press.com/2011/03/20/google-blames-chinese-government-second-gmail-cyber-attack/">http://business2press.com/2011/03/20/google-blames-chinese-government-second-gmail-cyber-attack/</A><BR>
&nbsp;<BR>
&nbsp;<BR>
&nbsp;<BR>
Cyber attack on security company<BR>
<A href="http://www.ft.com/cms/s/2/9d32f9fc-5183-11e0-888e-00144feab49a.html#axzz1HEfpg0cl">http://www.ft.com/cms/s/2/9d32f9fc-5183-11e0-888e-00144feab49a.html#axzz1HEfpg0cl</A><BR>
&nbsp;<BR>
&nbsp;<BR>
&nbsp;<BR>
International cyber crime Treaty And India<BR>
<A href="http://cjnewsind.blogspot.com/2011/03/international-cyber-crime-treaty-and.html">http://cjnewsind.blogspot.com/2011/03/international-cyber-crime-treaty-and.html</A><BR>
&nbsp;<BR>
&nbsp;<BR>
&nbsp;<BR>
CSIS expert lists worst cyber security breaches since January 2010<BR>
<A href="http://nakedsecurity.sophos.com/2011/03/21/worst-security-breaches-2010/">http://nakedsecurity.sophos.com/2011/03/21/worst-security-breaches-2010/</A><BR>
&nbsp;<BR>
&nbsp;<BR>
<FONT style="FONT-SIZE: 16pt" size=4></FONT>&nbsp;<BR>
<FONT style="FONT-SIZE: 16pt" size=4>OTHER NEWS</FONT><BR>
&nbsp;<BR>
Middle East CIOs Should Prepare and Plan..Not Panic To Tackle IPv6 Migration, Says Expert<BR>
<A href="http://www.zawya.com/story.cfm/sidZAWYA20110321080247">http://www.zawya.com/story.cfm/sidZAWYA20110321080247</A><BR>
&nbsp;<BR>
&nbsp;<BR>
Cloud computing's toughest obstacle<BR>
<A href="http://www.indianexpress.com/news/cloud-computings-toughest-obstacle/765069/0">http://www.indianexpress.com/news/cloud-computings-toughest-obstacle/765069/0</A><BR>                                               </body>
</html>