Wednesday, July 1, 2009

Worried About Bladder Cancer

Chinese censorship: green dam software for everyone with a surprise!

It's called "Green Dam-Youth Escort" the new program (software) Chinese protection objectives for the contents of the navigation of young Chinese. The software will be installed on all computers in China to "protect" the navigation carttere violent and pornographic content, but it seems to lend itself to another type of filtering, political censorship and to act as a spy.
The new program should already be installed on all computers in China is not known, however, slipped by how much. Moreover, many experts had already brought new problems of security and new software bugs that could make even more vulnerable and at risk computers on which it is installed. The software should be able to collect the data of the users and then putting them back to the competent authorities are serious security problems on PCs that would be exposed to so many attacks, as well as undermined in their freedom of navigation and Privacy. Also we do not know at what level is the actual security of the application used (or illegally copied and modified), but somebody has already done.
The program is freely downloadable from here:
http://www.lssw365.net/index.php/List/index/pid/2

This notice appeared on the site of the University of Michigan

http: / / www.cse.umich.edu/ jhalderm ~ / pub / gd /

is somewhat disturbing:

"We have Discovered remotely-exploitable vulnerabilities in Green Dam, the software reportedly mandated censorship by the Chinese government. Any web site at Green Dam user visits can take control of the PC ".
Or your computer may be exposed to attacks and remote control of PC (as with the trojans) from any website you visit!

The report continues: "We Examined the Green Dam That software and found it contains two serious security vulnerabilities to programming errors. Once Green Dam is installed, Any web site the user visits These problems can exploit to take control of the computer. This Could allow malicious sites to steal private data, send spam, or enlist the computer in a botnet. In Addition, we found vulnerabilities in the way Green Dam processes blacklist updates That Could allow the software makers to install malicious or others code during the update process".
Ovvero il software ha errori nel codice, di progettazione, è facilmente exploitabile e può essere utiizzato per rubare dati e informazioni personali.
C'è anche una pagina di dimostrazione del crash, basta installarlo ed andare a questa pagina web:
http://wolchok.org:8000/


I filtri agiscono con blacklist a livello politico e a livello di immagini. Ci sono filtri immagine, filtri URL, filtri per parole chiave, etc...
Insomma per ragioni di sicurezza nazionale si mette in pericolo ancora di più la sicurezza informatica dei computer di un'intera nazione.
Tra l'altro in rete si scopre che il programma è stato copiato da CiberSitter , un noto software americano per il parental control, oltre che per il monitoraggio della navigazione internet dei minori, in vendita su internet per soli 29 $, il che la dice lunga sulla considerazione che ha il governo cinese nei confronti dei suoi cittadini paragonati a dei bambini. La ditta vittima del "furto" del software e conseguente violazione dei diritti di proprietà è la Solid Oak , che ha già diffidato le case produttrici dall'utilizzo illegale di tale software, oltre che intentare cause legali anche in Cina: purtroppo ha già pagato le conseguenze di questo comportamento legittimo subendo numerosi attacchi DDoS a danno dei suoi server e allegati malware tramite e-mail inviati alla direzione.
Perhaps they have been postponing this because of poor advertising of the program as well as from countries like America who do not look favorably on these initiatives highly limiting individual freedoms.

Anyone Have Bunionette Removed

The flaw in the Iranian dictatorship is called twitter

The Iranian dictatorship is doing to deal with Twitter, better and more serious social network that is reporting the news in real time on-election clashes in Iran.
Many Iranian reporters who are enrolled in twitter now reporting the real situation degenerated into civil war because the people do not recognize the election of Ahmadinejad accused of electoral fraud in strong disagreement with Mousavi.
To follow the events just click on the 10 words Most searched at the time in 9th place after Michael Jackson, 5: #
iranelection

list of twitter users Iranian

http://twitter.com/knv
http:// twitter.com / tehranelection
http://twitter.com/change_for_iran
http://twitter.com/smileofcrash
http://twitter.com/Iran09
....
The most worrying news is that it seems that the police and supporters of the regime seeking to cut off the electricity and the telephone line in many areas.

But a question arises: what to expect the UN to intervene?
To create short URLs

Looking For Cherokee Nc

URLs and verification software and settings prior

now there are many valuable services:

- tinyurl
- bit.ly
- is.gd

In some social networks like twitter, where you can write a maximum of 160 messages characters (such as a text message) if it is an abuse of these services: it is lying in wait and then the security problem due to the use of false link, scam, phishing and spam.
So to check a preview of the goodness of the links are valid as web services:

- expandmyurl (www.expandmyurl.com)
- tinyurl.com / preview

Better check what is the real link before clicking , no?

Women Prefer Thong Or

Privacy

to respect the privacy of every person there is an ad hoc law in Italy, 196/2003, and a special body, the Privacy Authority, which oversees the adherence.
To outline each person should give their consent or dissent to the use of personal information, such processing of data.
In some cases computers this consensus is not just explicitly asked, and in some ways is not correct: for example in the case of cookie files tracking user behavior, there is a violation because it is not asked to use the personal data file content. It 's also true that you may disable (and in many cases even lose the basic functionality of the service required), but in any case is not correct. There
software and behaviors that allow us to correct these "gaps". First of all configure your browser to enable only cookies that the website visitor, not third parties, then we set the automatic cancellation when browser is closed, and never store passwords in the browser, any browser.
then the guarantor should also software like Eraser or Truecrypt for deletion irreversible free hard disk space, delete files of Internet surfing with CCleaner. All these operations must be done every day of course. But there are molti altri software che permettono la cancellazione sicura e irreversibile dei file storati sull'hard-disk.
Andrebbero poi impostati anche i cookie di flash (detti flash cookie) che memorizzano in locale, sul nostro disco fisso le informazioni di navigazione e ci inviano poi pubblicità mirata grazie a servizi quali Adsense per esempio.
Le animazioni, i banner e i filmati delle pagine web sono ormai realizzate in flash, un programma e linguaggio di programmazione che usa le immagini e le animazioni.
Andare a questa pagina sul sito ufficiale di flash player e impostare le varie pagine per non consentire la memorizzazione di file LSO (Local Shared Object) tipici di flash, nè dell'uso del microfono e della scheda audio da parte di terze parti:

http://www.macromedia.com/support/documentation/it/flashplayer/help/settings_manager02.html

Flash can not be disabled unless you have not uninstall (or not install either) or do not mutilizzi of Browser Extensions (Mozilla Firefox) to disable it:
- Adblock
- Objection
- BetterPrivacy

Good Privacy and Happy surfing!