weekend in Vienna! Visit
people ..... go!
In recent days some sources information specialist in topics related to computer security have spread important information about Microsoft's updates. We are not referring to the usual monthly feature updates for Microsoft products, now universally known as "patch day", but we make reference to another story that deserves to be cited and thorough. Some users have reported that some of the newsletter Secret Windows operating system files were updated remotely without the prior written permission. We refer of course to the Microsoft Update tool in fact, in this case, the forced upgrade takes other routes. A merit the attention of the following files are Microsoft Windows Vista: wuapi.dll, wuapp.exe, wuauclt.exe, Wuaueng.dll, wucltux.dll, wudriver.dll, wups.dll, wups2.dll and wuwebv.dll. But Windows XP is not immune to this particular update mode, it was discovered that the files cdm.dll, wuapi.dll, wuauclt.exe, wuaucpl.cpl, Wuaueng.dll, wucltui.dll, wups.dll, wups2.dll and Wuweb.dll have changed. According to various sources on the network will also update these files on systems with the option of Windows Automatic Update was disabled. Microsoft Watch devoted a large study on the matter and also analyzes the documentation that comes with various operating systems on privacy and security issues. Joe Wilcox points out that the Windows Update tool is extremely clear in their settings: fully automatic when applying the patch, disabled or with two different degrees of intervention that require explicit confirmation from the user. In no case, therefore, there is a forced and arbitrary system upgrade. It thus appears that Microsoft may have an alternative way to intervene remotely on machines running Microsoft Windows XP or Vista, an alternative method that dishonestly canons tools Windows Update and, above all, that does not require permission. These reports have raised some criticism from security experts: none at the moment believes that these updates are of a malicious, but to fuel the debate seems to be the silent mode by which these changes have been applied. A number of statements common to the behavior of Microsoft tools in this particular circumstance to that of a worm. In the home of a simple upgrade that requires the least intervention possible for inexperienced users can be considered the main goal, but in reality business, where there are security issues and specific policies to follow, a behavior that can leave an arbitrary minimum sconcerto.Non is possible that Microsoft may release its own note of clarification in the coming days.
giving things their names, Microsoft has installed a backdoor into your system that allows you to update the component "Windows Update" without asking the user. This is very serious for two reasons, in my opinion:
1) the user is alerted and can not disable this "feature"
2) potential, now that the backdoor has been unearthed, a reverse engineer can understand fully operation and use it to his advantage.
Source hwupgrade.it , a more in depth article can be found on windowssecrets.com
Thanks Microsoft for the latter genius. ^ ^
... The traditional filters can eliminate the bacteria that are more than 200 nanometers, but not the viruses that are typically 25 nanometers big.
bottle of Mr. Pritchard can delete anything from the water - including faecal matter - using a filter that removes everything that is larger than 15 nanometers. This means that the virus be posonno filtrari without the use of chemicals. "
" From the Internet to the iPod, technologies are transforming our society and empowering us as speakers, citizens, creators, and consumers. When our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF broke new ground when it was founded in 1990 — well before the Internet was on most people's radar — and continues to confront cutting-edge issues defending free speech, privacy, innovation, and consumer rights today. From the beginning, EFF has championed the public interest in every critical battle affecting digital rights.
Blending the expertise of lawyers, policy analysts, activists, and technologists, EFF achieves significant victories on behalf of consumers and the general public. EFF fights for freedom primarily in the courts, bringing and defending lawsuits even when that means taking on the US government or large corporations. By mobilizing more than 50,000 concerned citizens through our Action Center , EFF beats back bad legislation. In addition to advising policymakers, EFF educates the press and public. Sometimes just defending technologies Is not enough, so EFF Also Supports the development of freedom-enhancing inventions .
EFF is a donor-funded nonprofit and depends on your support to continue successfully defending your digital rights. Particularly Litigation is expensive; Because two-Thirds of Our budget comes from individual donors, Every contribution is critical to helping EFF fight-and win-more cases. "
time ago while surfing the net on the site www.digg.com there was an article quoted by a user, digg.com works in exactly this way, speaking of a Scandinavian guy who unlock the iPhone. In his site there was a link to EFF's website. For some things that were written are appalled by what that in the U.S.. However they have the opportunity to valire their rights through class action and the like, so finding the right because I wanted them too, make a small donation. A few days after my house got a letter, it did not mention that on the site, in which he thanked me for the donation along with stickers. :) E 'was a gesture that I appreciated very much.
" Digital subscriber line technology was originally implemented as a specific
ISDN, which was later reused as IDSL with
. Connections from higher speeds such as HDSL and SDSL
are developed to expand the range of DS1 services on pair
phone. ADSL designed for the consumer market (ie private citizens
) is designed to run on a BRI ISDN line, which
esssa is itself a form of DSL as well as on a telephone line
analogica.La DSL, like many other forms of communication, comes from a crucial publication
academic Claude Shannon
dating to 1948. The mathematical theory of communication Shannon
place the basic elements of any digital communication:
Joe Lechleider at Bellcore (now Telcordia Technologies) developed the DSL in 1988 by placing wideband digital signals over the analog voice signal to baseband type (note: In Which a signal transfer method is Transferred Directly in digital form with no modulation) transported between central offices of the telephone company and ordinary users on a conventional twisted pair (note 2 copper wire in short, are twisted to avoid electromagnetic interference). The DSL service was first fonirto rented on a cable without reservations, but when the FCC required telephone companies to lease their lines to competitive providers such as Earthlink, shared lines, DSL became common. "
In this article, which of course has changed, no longer
mentioned that this technology is being developed by Bell in 1988,
but was put off by the cylinder when the companies that provided
connectivity through fiber cables perspective, offered these
connections at affordable prices for all end-users and, therefore, to turn
could do even more competitive prices because
were hanging out the fiber optic cables.
The bastards did to earn so what? Rather than make it all work on the normal telephone cable
, I did put a dedicated time to earn sopra.Insomma
installation, more or less what happened
recently with Telecom which seemed not to know that you could
I would put filters on the ADSL line to talk and surf the Internet using the same
cavo.Purtroppo
not all studying computer science and, anyway, just to have a connection, when the company offers is a
that, we are forced to adapt. : Conventional almost never told about it at all, and when they did, they misrepresented the reality as usual. If you download the video from E-Mule entire event, of Marco Biagi, just as Labor says, do not talk right. We always speak of the law that bears his name. This is a first step.
PROGRAM:
usual appointment at 20.30 Autogrill ex Spizzico
at 21.00 Kartdromo race at Misano Adriatico (inside of the racetrack)
at 22.00 Pizza meters from the BLUE ANGEL
A rulings: