<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 10pt;
font-family:Tahoma
}
--></style>
</head>
<body class='hmmessage'><div dir='ltr'>
<DIV dir=ltr>
<DIV dir=ltr><FONT style="FONT-SIZE: 12pt" size=3><STRONG>DOMAIN NAME</STRONG></FONT></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>Internet Body Opens Way For New Domain Names<BR><A href="http://online.wsj.com/article/BT-CO-20110620-703270.html">http://online.wsj.com/article/BT-CO-20110620-703270.html</A><BR></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>Icann increases web domain suffixes</DIV>
<DIV dir=ltr><A href="http://www.bbc.co.uk/news/technology-13835997">http://www.bbc.co.uk/news/technology-13835997</A></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>.Coke? .Nike? Internet Name Shakeup Signals Big Changes for Brands</DIV>
<DIV dir=ltr><A href="http://www.foxnews.com/scitech/2011/06/20/coke-nike-internet-name-shake-up-signals-big-changes-for-brands/">http://www.foxnews.com/scitech/2011/06/20/coke-nike-internet-name-shake-up-signals-big-changes-for-brands/</A></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>Internet Body Approves Freer Domain Names</DIV>
<DIV dir=ltr><A href="http://www.bloomberg.com/news/2011-06-20/internet-group-agrees-to-open-website-addresses-to-include-anything-.html">http://www.bloomberg.com/news/2011-06-20/internet-group-agrees-to-open-website-addresses-to-include-anything-.html</A></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>ICANN approves open Web domain name rules: .anything is possible</DIV>
<DIV dir=ltr><A href="http://latimesblogs.latimes.com/technology/2011/06/icann-approves-open-domain-name-rules-whatever-is-a-go.html">http://latimesblogs.latimes.com/technology/2011/06/icann-approves-open-domain-name-rules-whatever-is-a-go.html</A></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr><FONT style="FONT-SIZE: 12pt" size=3><STRONG>IPv6</STRONG></FONT></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>What did IPv6 Day Teach Us?</DIV>
<DIV dir=ltr><A href="http://www.informationweek.com/news/infrastructure/ipv6/230800027">http://www.informationweek.com/news/infrastructure/ipv6/230800027</A></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>World IPv6 Day is Complete. Did Anyome Notice?</DIV>
<DIV dir=ltr><A href="http://www.networkworld.com/community/blog/world-ipv6-day-complete-did-anyone-notice?t51hb">http://www.networkworld.com/community/blog/world-ipv6-day-complete-did-anyone-notice?t51hb</A></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>What IPv6 Day Proves</DIV>
<DIV dir=ltr><A href="http://www.pcmag.com/article2/0,2817,2386720,00.asp">http://www.pcmag.com/article2/0,2817,2386720,00.asp</A></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>Making Sure IPv6 and IPv4 co-exist Reliably and Security</DIV>
<DIV dir=ltr><A href="http://www.itbusinessedge.com/cm/blogs/itdownloads/making-sure-ipv6-and-ipv4-co-exist-reliably-and-securely/?cs=47360">http://www.itbusinessedge.com/cm/blogs/itdownloads/making-sure-ipv6-and-ipv4-co-exist-reliably-and-securely/?cs=47360</A></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title><FONT style="FONT-SIZE: 12pt" size=3><STRONG>CYBERCRIME</STRONG></FONT></DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>Japan : Legislation criminalize creation of computer viruses enacted</DIV>
<DIV class=title><A href="http://mdn.mainichi.jp/mdnnews/news/20110617p2g00m0dm013000c.html">http://mdn.mainichi.jp/mdnnews/news/20110617p2g00m0dm013000c.html</A></DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>Malaysia's cyber crime unit best in the world </DIV>
<DIV class=title><A href="http://blog.thestar.com.my/permalink.asp?id=35559">http://blog.thestar.com.my/permalink.asp?id=35559</A></DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>EU clamps down on carbon trading cyber crime</DIV>
<DIV class=title><A href="http://www.businessgreen.com/bg/news/2079940/eu-clamps-carbon-trading-cyber-crime">http://www.businessgreen.com/bg/news/2079940/eu-clamps-carbon-trading-cyber-crime</A></DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>Sega hacked as cyber crime runs rampant</DIV>
<DIV class=title><A href="http://www.ibtimes.com/articles/165228/20110618/google-sega-hacked-as-cyber-crime-runs-rampant.htm">http://www.ibtimes.com/articles/165228/20110618/google-sega-hacked-as-cyber-crime-runs-rampant.htm</A></DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>U.S building virtual Internet as cyberattack testbed</DIV>
<DIV class=title><A href="http://news.cnet.com/8301-1009_3-20072516-83/u.s-building-virtual-internet-as-cyberattack-testbed/">http://news.cnet.com/8301-1009_3-20072516-83/u.s-building-virtual-internet-as-cyberattack-testbed/</A></DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>Special report : government in cyber fight but can't keep up</DIV>
<DIV class=title><A href="http://www.reuters.com/article/2011/06/17/us-usa-cybersecurity-idUSTRE75F4YG20110617">http://www.reuters.com/article/2011/06/17/us-usa-cybersecurity-idUSTRE75F4YG20110617</A></DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title><FONT style="FONT-SIZE: 12pt" size=3><STRONG>OTHER NEWS</STRONG></FONT></DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>&nbsp;</DIV>
<DIV class=title>Russia and Internet regulation: What would China do?</DIV></DIV>
<DIV dir=ltr><A href="http://blogs.csoonline.com/1558/russia_and_internet_regulation_what_would_china_do">http://blogs.csoonline.com/1558/russia_and_internet_regulation_what_would_china_do</A></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>The Internet in East Africa: An aid or a weapon?</DIV>
<DIV dir=ltr><A href="http://www.cpj.org/blog/2011/06/the-internet-in-east-africa-an-aid-or-a-weapon.php">http://www.cpj.org/blog/2011/06/the-internet-in-east-africa-an-aid-or-a-weapon.php</A></DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>&nbsp;</DIV></DIV>                                               </div></body>
</html>