<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 10pt;
font-family:Tahoma
}
--></style>
</head>
<body class='hmmessage'><div dir='ltr'>
<SPAN><STRONG><FONT style="FONT-SIZE: 12pt" size=3>NOM DE DOMAINE</FONT></STRONG></SPAN><BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN>30 000 noms de domaine en .fr réservés libérés à la vente depuis 12h00</SPAN><BR>
<SPAN><A href="http://www.journaldunet.com/ebusiness/le-net/noms-de-domaine-reserves-0711.shtml">http://www.journaldunet.com/ebusiness/le-net/noms-de-domaine-reserves-0711.shtml</A></SPAN><BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN>Noms de domaine : deblocage des mots reserves le premier Juillet 2011</SPAN><BR>
<SPAN><A href="http://www.polen-mende.com/93A350-noms-de-domaine-deblocage-des-mots-reserves-le-premier-juillet-2011.html">http://www.polen-mende.com/93A350-noms-de-domaine-deblocage-des-mots-reserves-le-premier-juillet-2011.html</A></SPAN><BR>
<SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG><FONT style="FONT-SIZE: 12pt" size=3>CYBERCRIMINALITE</FONT></STRONG></SPAN></SPAN><BR>
<SPAN><SPAN class=style17><STRONG></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG>Le malware TDL-4 inquiete les spacialistes de Kaspersky </STRONG></SPAN></SPAN><BR>
<SPAN><SPAN class=style17><STRONG><A href="http://www.rtl.be/loisirs/hightech/informatique/9104/le-malware-tdl-4-inqui-te-les-sp-cialistes-de-kaspersky">http://www.rtl.be/loisirs/hightech/informatique/9104/le-malware-tdl-4-inqui-te-les-sp-cialistes-de-kaspersky</A></STRONG></SPAN></SPAN><BR>
<SPAN><SPAN class=style17><STRONG></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17>TDL-4, un botnet quasi indestructible a fait son apparition</SPAN></SPAN><BR>
<SPAN><SPAN class=style17><STRONG><A href="http://www.lemondeinformatique.fr/actualites/lire-tdl-4-un-botnet-quasi-indestructible-a-fait-son-apparition-34100.html">http://www.lemondeinformatique.fr/actualites/lire-tdl-4-un-botnet-quasi-indestructible-a-fait-son-apparition-34100.html</A></STRONG></SPAN></SPAN><BR>
<SPAN><SPAN class=style17><STRONG></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><FONT face=Arial color=#ff6633><FONT color=#2663fd size=3><STRONG><FONT style="FONT-SIZE: 10pt" size=2>Les spams reculent et les malwares atteignent des sommets</FONT><BR></STRONG></FONT></FONT><FONT color=#000000><SPAN style="FONT-SIZE: 12px"><A href="http://www.pcinpact.com/actu/news/64094-spams-reculents-malwares-mobiles-symbian-and.htm?vc=1">http://www.pcinpact.com/actu/news/64094-spams-reculents-malwares-mobiles-symbian-and.htm?vc=1</A></SPAN></FONT></SPAN></SPAN><BR>
<SPAN><SPAN class=style17><STRONG><FONT face=Arial color=#ff6633></FONT></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG><FONT face=Arial color=#ff6633></FONT></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG><FONT face=Arial color=#ff6633></FONT></STRONG></SPAN></SPAN> <BR>
<SPAN><SPAN class=style17><STRONG><FONT face=Arial color=#ff6633>Cybersécurité : le Royaume-Uni se dote d'une force de dissuasion militaire</FONT></STRONG></SPAN></SPAN><BR>
<SPAN><A href="http://www.bulletins-electroniques.com/actualites/67150.htm">http://www.bulletins-electroniques.com/actualites/67150.htm</A></SPAN><BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN>Le ministre François Biltgen à la conférence Benelux sur la cybersécurité</SPAN><BR>
<SPAN><A href="http://www.gouvernement.lu/salle_presse/actualite/2011/06-juin/30-biltgen/">http://www.gouvernement.lu/salle_presse/actualite/2011/06-juin/30-biltgen/</A></SPAN><BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN>Le coût exorbitant et opaque des cyberattaques</SPAN><BR>
<SPAN><A href="http://www.lefigaro.fr/conjoncture/2011/06/30/04016-20110630ARTFIG00750-le-cout-exorbitant-et-opaque-des-cyberattaques.php">http://www.lefigaro.fr/conjoncture/2011/06/30/04016-20110630ARTFIG00750-le-cout-exorbitant-et-opaque-des-cyberattaques.php</A></SPAN><BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN><FONT style="FONT-SIZE: 12pt" size=3><STRONG>REGULATION INTERNET</STRONG></FONT></SPAN><BR>
<SPAN></SPAN> <BR>
<SPAN>Un Internet libre de toute règlementation est-il un Internet libre ? </SPAN><BR>
<SPAN><A href="http://www.directioninformatique.com/DI/client/fr/DirectionInformatique/Nouvelles.asp?id=63073">http://www.directioninformatique.com/DI/client/fr/DirectionInformatique/Nouvelles.asp?id=63073</A></SPAN><BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN>Le gouvernement Sarkozy veut censurer internet</SPAN><BR>
<SPAN><A href="http://yannick-comenge.blogs.nouvelobs.com/archive/2011/06/30/le-gouvernement-sarkozy-veut-censurer-internet.html">http://yannick-comenge.blogs.nouvelobs.com/archive/2011/06/30/le-gouvernement-sarkozy-veut-censurer-internet.html</A></SPAN><BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN>Mayotte privee d'internet</SPAN><BR>
<SPAN><A href="http://www.malango-actualite.fr/article/mayotte_privee_d_internet-7724.htm">http://www.malango-actualite.fr/article/mayotte_privee_d_internet-7724.htm</A></SPAN><BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN>Le phénomène du mobile en Afrique</SPAN><BR>
<SPAN><A href="http://www.sudonline.sn/le-phenomene-du-mobile-en-afrique_a_3584.html">http://www.sudonline.sn/le-phenomene-du-mobile-en-afrique_a_3584.html</A></SPAN><BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>
<SPAN></SPAN> <BR>                                            </div></body>
</html>