Sunday, August 29, 2010

Genital Warts Lip Piercing

Negative list of subscribers

In un recente corso mi è capitato di spiegare la recente modifica al codice Privacy sull'elenco (negativo) degli utenti che non vorranno più ricevere le comunicazioni di marketing e del principio opt-out: useless to dwell on negative comments and opinions of the audience, you can imagine. The
becomes difficult to explain that every day becomes a matter (here at the state level) enslaved to "logic" of the market without any protection of the user and distorted, messy, compared to the primary objectives: it would be "logical" as well as Ethics, create an exception that violates a major principle without any further protect the top of the first principle, but only the interests of certain categories, so it is illogical not only in the strict legal sense.
But beware, weaknesses in nortmativa not however lead us to the conclusion that the legislation is good for nothing: we avoid generalizations, is often also the application of a rule that gets to influence the goodness of this.
In fact, the matter (Privacy), if properly applied, could be an excellent tool for defense but lack the tools for direct tracking personal data, so you may contact or directly to the controller or the Guarantor in person especially when data is transferred to third parties not directly identified in the information at other times it is the informational mess, or ambiguous and integrated in the same consent to the contract you are accepting.
We are still waiting to know the rules and procedures for registering in these lists, but it certainly lacks just as it was posted on DPR: in this period of "regulatory holidays" n o one, I mean nobody, can use the address in your list-without-consent for the purposes of telemarketing: so if this happens contact the Ombudsman at the address at left or using the model provides.
The Guarantor is skeptical about this solution will not solve the problem, but a priori arginerà certainly compared to the previous chaotic situation.
The registration is free and can be made online at certain Internet addresses, e-mail address, telephone number c to green and from that moment will no longer be used the number of that user for the purpose of telemarketing or sales.
remember that the penalties for companies ranging from 10,000 to 120,000 €, tripled because of the economic conditions of the person contravened.
We still curious to know who will be the list manager and hopefully will be resolved at least in part the previous situation untenable, pergiunta who had led the EU to open an infringement procedure to Italy for violating rules on Privacy .

http://www.repubblica.it/cronaca/2010/07/12/news/telemarketing_registro-5541083/

DPR approved

Friday, August 20, 2010

Auto Auctions Open To The General Public Ontario

Reflections of August on the Net

I read in prorpio questi giorni alcuni articoli interessanti e considerazioni sullo stato attuale delle Rete e sulle politiche future: inoltre in rete si rincorrono notizie, le più disparate, anche allarmanti, su quale sarà il suo futuro.
Vorrei soffermarmi però su di una analisi personale su punti e principi, alcuni già realizzati altri meno, che caratterizzano la rete attuale, operando allo stesso tempo un'analisi sulla situazione allo stato dell'arte:

1) facilità di utilizzo dello strumento informatico (eccessiva facilità anche di copia); problema del "falso"(fake) o della falsificazione sempre in agguato;

2) dato informatico altamente dinamico e passibile di modifiche e copie (anche non autorizzate), what distinguishes it from the old paper-based data (analog) given its intangible

3) Freedom of access to the network but still a fee (not yet realized, given that most ISPs provide supplies and services fee: the digital divide is also a problem of infrastructure in Italy) and the network is then democratic, anyone can use and access to it;

4) Equality in access to the network: each is guaranteed access, regardless of other conditions or subjective status ;

5) Freedom in the use of the service: Anyone is free to use the internet for what pleases him most, always within the limits of the law;

6) Privacy, right of action on the network within the law "without being monitored or spied upon" you can not monitor the content of users' internet surfing, slalvo exceptions, but only traffic. I wonder if it still exists in the Privacy particular areas such as social networking, as users share their own initiative their own habits and personal information, then Internet traffic is mostly clear (some exceptions), however, hesitate tools (for the most advanced user) to ensure the confidentiality and access to information;

7) Principle of non-locality of the network: the network is almost everywhere, it's redundant, is accessible regardless of the place is full of PoF to support their operation in the event of a fall of some nodes;

8) Quantity of the information network ("too much information to be checked"): the large amount of data prevents the proper management and control capillary

9) Quality of information (certification of the information, accuracy of the sources): anyone can write a contribution on any platform (wiki, blog, etc. ..) from non-technical matters;

10) Provenance certain Information: It is not yet a reliable tool for identification in the network, but there are several tools (digital certificates) which ensure the provenance and authorship of the data;

11) Knowledge for everyone (with the downside of that malware or computer crimes are easily achievable even by a user does not own appraiser);

12) reviews and criticism easily detectable: l ' economics and marketing if they really free benefit, since they are easy to detect the pinion soggettivedegli users

13) trend of Eternity information (there is a right to oblivion?) suits the information passed is always potentially available on the network;

14) criticism and opinions easily expressible, and this leads to an enlargement of the different opinions, but also more critical;

15) New "professions" to change position on the instrument, but also widening of the platform of the authors (frankly, nowadays anyone can express their art form ripsetto easily at first and possibly less fit);

16) Problem of greater selectivity and information content (given by the enormous amount of material available);

17) Increased dissemination of ideas and creativity of the users;

18) the last but not least , L ' Use of the network: the "goodness" of the network depends on your use if it is in practice so far are the statistics to give us guidance in this regard;

Censorship is inherently incompatible with the tool, which should operate as a sort of filter information and then make a selection upstream damaging many of the points mentioned above. I do not believe that the preventive control is a viable option, but a dangerous threshold for democracy for all and for the circulation of ideas.
last question, but the network is neutral? now the answer is no, as there is logic of the market very urgent by large groups.
These are just a reflection of the items on which to base future decisions on future considerations set that the system will do: therefore we welcome further consideration, reviews and criticism.

Tuesday, August 3, 2010

Dongle Emulator Freeware

extraordinary security bulletin (out-of-band) for Microsoft: Summer 2010

New Vulnerability in Windows Shell exploited through a hole in the management system of icons that allow a remote malicious code (viruses or malware) without the need to take action. Ini file. Currently the only solution is to correct a key of the registry or through a fix-it made available by Microsoft.
The new vulnerability not yet corrected, affects all Microsoft platforms, from XP to Server 2003, Vista, Windows 7. Missing at the time the Security update.
recommend waiting two valuable tools available from Sophos and GDATA known companies Antivirus:
- GDATA LNK checker
- Sophos shortcut exploit protection tool

The original report is here:
http://www.microsoft.com/technet/security/bulletin/MS10-046.mspx
whole article in English here: http
: / / sicurdigital.wordpress.com/2010/08/02/new-vulnerabilities-for-microsoftsummer-2010 /

remember that Microsoft has dropped its support in June this year for XP SP2 (except the 64-bit ) and Windows 2000, so it is advisable to upgrade the OS to SP3 or Windows 7.