Best of the blogs: Stupid people are not the only ones who fall prey to ID thieves. And there’s more than one way to have yours lifted, as Nick Corcodilos found out when a spammer copied his newsletter, added an obscene line to the ‘From’ field along with a sex-related ad, then blasted it out. “Many actually believe I sent it to them, and they’re pretty ticked off,” Corcodilos explains in this Ask the headhunter entry. “I sit here wondering, if billions of dollars worth of commerce can be transacted over a wire, why don’t we have secure e-mail? Without accountability, we are all at risk all the time.” Security: Striking on a similar theme, Roger Grimes writes “it is my strong belief that without a complete overhaul of default authentication, malicious hacking is going to continue indefinitely.” Trust is key to Internet security. Yes, readers complained about the obvious invasion of privacy, Grimes concedes. “An even bigger obstacle is the need to upgrade and replace nearly every involved software and hardware component.” That just means his idea won’t come to fruition for another 10 to 20 years. “What we need is ‘rings of trust’ for Internet communications,” he argues, beginning at the kernel-level and extending all the way out to all participating nodes. “Why are we continuing to allow the malicious minds of the Internet to use our online world as their perpetual bank account? Why don’t we care enough to demand more?”Careers: A reader writes in with a question about choosing the “best” MBA program. “There’s no right answer. If you choose a path based on current employment market conditions, you’ll inevitably be disappointed at the results,” Bob Lewis advises. “The question you have to answer is which you’ll most enjoy doing and for which of them you have the most aptitude.” Storage: Virtualization, no doubt, is all the rage these days. “Unfortunately, the complexity of virtualized environments, if left unchecked, could very well overwhelm … hindering the enterprise’s ability to make good on the promise,” explains Mario Apicella in Corralling VMware virtual machines. “Or at least that’s the value proposition put forth by Embotics, a newcomer to the virtualization party by way of autonomic computing.” Embotics offers V-Commander, a management solution for VMware environments. “As a new product in a relatively untapped area, V-Commander will likely take time to mature.” Related: VMworld Day 1 a virtual success and VMworld day 2 — Cisco and exhibit halls. Security