Friday, December 18, 2009

Short Signature Quotes

use 3DES encryption in Outlook Express with S / MIME

Digital certificates S / MIME v3 digital certificates today's most popular and allow you to send e-mail signed or encrypted with 3DES algorithm (version 2 instead of 40-bit).
S / MIME means Secure Multipurpose Internet Mail Extension and is a standard for digital certficate using PKCS # 7 for the data and format for X.509 certificates themselves. Its operation is based on so-called CA, Certification Authority or Certification Authority, the public, which is connected to the certificate required by the user (the public key, private remains secret) and that it publish and make accessible to anyone ( using a Web browser) for the subsequent verification of the origin of this. The request to the CA then generates two related keys: one secret, private and installed directly in the browser, and the public, knowable by anyone.
The current Italian legislation provides for the use of the PEC (Presidential Decree 68/2005), but also allows the use of other appropriate instruments, as may be precisely that of S / MIME security much higher: in fact the PEC does not certify the 'identity of the sender but only time and the receipt of a letter as A / R. Instead SMIME is similar to digital signatures.
Certificates S / MIME in fact guarantee the following:

- non-repudiation
- source
-

authenticity of the sender but can also provide:
- confidentiality (or privacy)
- integrity of the message (with encryption)

There are several online companies that provide free digital certificates to users for personal use: GeoTrust, Thawte, Comodo. Some of these links the certificate to the personal identification documents (some visually), some to the simple mail and generate keys on-line through the browser and then install this. Generate two keys, one private and one public.
Once you have your certificate you can use it through the most popular email client (or client websites that allow you: Gmail now allows it through an add by name S / MIME, however, not yet fully functional in reception)
Outlook Express the default e-mail, however, 40-bit encrypted messages (SMIME v2). To set it to 168 is necessary to modify the following registry entry:

1) run - run - type regedit
2) HKEY_CURRENT_USER \\ Identities \\ "codiceutente" \\ Software \\ Microsoft \\ Outlook Express \\ 5.0 \\
3) create DWORD key by name
Encrypt Using 3DES
4) assign a hexadecimal value (active)

NB remember to backup the registry or the key before making any changes!

How Does A Digital Camera Work Diagram

new clarification of the Privacy Guarantor in extremis

If the law 300/2008 the Guarantor Privacy intervened to determine some obligations on system administrators (rules on the appointment, to appoint in all remaining cases removed the exclusions under Article 34 co2) now with the measure December 10, 2009, more of a clarification, the Guarantor Pizzetti intervened to clarify in extremis (and perhaps technical solutions already implemented by more careful), some misunderstandings:
- seemed (and was confirmed) fact that all companies would be obliged to appoint the administrators: please read all the provisions of the technology to disperse it included But that figure was compulsory only where necessary and in all structures already taken are techniques of this type (the latter now reading measure it includes even better):

"requirements apply only those persons who, in dealing with personal information by computer, have to resort or have resorted to professional system administrator or a figure equivalent. "

- Just the ex art.34co2 cases (first and second sentence), which covers companies that do not process sensitive data to the exclusion of employee health data, PMI (criteria of the effective employment of up to 250 employees or 50 million euro annual turnover) or administrative and accounting functions, so you think you should be appointed in all other cases and in the presence of even one given sensitive for SMEs (if not uncommon).
This has changed now, as evidenced by the clarification of the order adopting a policy also adopted dimensional computer systems ("small and limited extent") and seems to be much more flexible than before:

"requirements do not apply, Instead, those persons of association, which also tend to have systems small and limited extent, but not particularly complex, can do without a professional specifically dedicated to system administration or in any case have decided not to make Appeal. "


remain, however, still doubts about tenuta dei file di log dei soli amministratori di sistema (perchè mai non di tutti gli utenti?)comunque risolvibile ricorrendo all' interpretazione e all'esperienza.

http://www.garanteprivacy.it/garante/doc.jsp?ID=1676654

Saturday, December 12, 2009

How To Unlock Cdma Motorola V3a

New malware attacks 300,000 web pages

Un nuovo malware dal nome backdoor.win3.buzus.croo si sta diffondendo rapidamente in rete con la tecnica dell'injection (nella fattispecie SQL injection) di codice maligno su siti web legittimi e con la tecnica degli iframe, ovvero frame nascosti in pagine web contenenti collegamenti ad altre pagine web. Le pagine web oramai contengono così tanti contenuti dinamici provenienti da più siti da rendere il controllo almost impossible.
Immagianiamo all these sites with different scripts or links to sites that contain malicious scripts. If we do not have the filters and security patches (OS and software included) end up starting the script on your machine and run it through the browser.
This is what does this new malware and that is what has already happened to 300,000 web pages that have damaged as a result a considerable number of PCs in the world and is expected to be at risk between now and Christmas, even the codes of credit cards, favorite object of this malware. Subject
favorite malware Vulnerabilities 5 applications including Flash and Explorer, which, if detected, allow the malware diu run and install themselves as the MBR rootkit. Since rootkits, hidden, is not easily detectable because installatie modifying the operating system kernel level.
Attuialmente there are many tools to avoid it, in addition to the filters on scripts, updates, rootkit and malware (but often do not detect them), well-configured firewall.
The original article can be found here:
http://www.theregister.co.uk/2009/12/10/mass_web_attack/

Mossy Oak Birthday Cake

New rules system administrator: December 15, 2009 deadline to upgrade

The new rules of the administrator system to be adopted by organizations, both private and public by the date of December 15 (except extensions, however, unlikely since there is already a delay of up to 6 months).
Privacy
The Guarantor has no requirement for the appointment of administrators to the system only for certain types of companies and provides for the exclusion of SMEs and companies that deal with administrative data-sensitive accounting and whose only data those of its employees on the state of health, illness (excluding diagnosis). These are the companies that benefit from the self-declared alternative to the DPS and the DPS simplified (under Article 34 Privacy Code). But remember that you only need one or sensitive data to trigger the judiciary.
Small and medium-sized enterprises are defined by Article 2083 Civil Code and regulations specifying that European SMEs are those enterprises which employ fewer than 250 employees and have an annual turnover not exceeding EUR 50 million.
The Guarantor has also provided the traceability of the activities of these obligation with the tracking log file access (log in and log-out), and therefore not all the activities, and hold them for at least 6 months. He predicted that these log files should eesere intact, verifiable and will not change, all of which will incur an overhead and administrative costs as well as considerable cause for further concern about the application.
But reading the FAQ Garannte are clarified some of the modalities of implementation. To achieve
such measures would be implemented, for example, the log server or software for interfacing with SQL databases, perhaps encrypted with asymmetric keys, also in communication with the server, and perhaps in the back-end behind the firewall.
There are several computer security companies that have in fact prepared ad hoc solutions such as GFI. In a number of courses offered
doubt I noticed on the figure of the system and its interaction with the figure of the owner of the personal data or manager: in reality the system administrator should not be the one who can do everything and control systems but is a technician who must be audited by their agents. His figure may be as the responsibility of the person or the simple, but in any case, the Ombudsman stated that a figure should be clearly identified and named in the DPS, as well as the choice for specific requirements of capacity, reliability and experience. Moreover, the disclosure under Article 13 shall also contain a list of all the generals and administrators. It will then
holders and / or responsible for verifying the function of directors with annual updates and revisions.