Monday, November 24, 2008

Distinguish Between Hypothermia And Hyperthermia

Spamming - Definition and history

He talks a lot, but what is it and how does spam? The

term originates from the mockery of a group of British comedians (Monty Python's Flying Circus - years 1969-1974), regarding the continuous advertising that raged at the time of a type of canned meat (spam ). In fact, in one of their famous sketch, interpret those customers who were continually offered, the maid of the local dishes spam.



Spam arises precisely because of the publicity that goes from the most common goods until you get to advertise pornographic or illegal (drugs sold without a prescription rather than software piracy). Purtroppo questa tecnica non si è limitata alla mera forma pubblicitaria di merce ma è stato utilizzato, dietro la suddetta facciata di promozione, per attaccare il sistema elettronico in cui veniva aperta la missiva elettronica.

Lo spam viene anche definito come unsolicited commercial email , UCE (email commerciale non richiesta) e unsolicited bulk email , UBE (email non richiesta in grandi quantità). Spesso ci troviamo di fronte anche a messaggi di carattere non commerciale come ad esempio i messaggi di propaganda politica e le catene di Sant'Antonio

Gli spammers (coloro che inviano messaggi di spam), send the same email to several email accounts. These addresses may have been retrieved from the Internet automatically using special software (spambot ) or other programs can generate a number of mail account (using the most common names) knowing only the domain.

Later I will try to show how technically spamming is done and how you can try to defend themselves.


Friday, November 14, 2008

Russianbare Forumgallery

Nigerian Scam - evolution

Sometimes they come back! Seems to be put in the yard so-called old Nigerian scam, and instead we are now faced with its own evolution. Fraud, as many will recall, was based on aid requested surfers of the Internet, and not only to encourage the settlement of financial assets of imaginary diplomats who, because of the known political events in Nigeria, they had to transfer money to other countries. After being contacted, were asked, incidentally, a payment to them for the financial costs of the investigation. Who knows why, not just the money were paid by the user contacted the Nigerian diplomat will not receive more news.
Dopo aver rinvangato le vecchia tecnica truffaldina, passiamo ad analizzare la nuova.




Alcuni net-defrauders ,
  • rubano le grant di accesso (credenziali corrispondenti ad un nome utente o account di posta con relativa password) dalle sempre più diffuse social networking (ad es. facebook), per mezzo di spyware , keylogger ed altri simili malware e/o worm (comunque con le classiche tecniche del phishing),
  • contattano altri utenti, " mimetizzandosi " sotto falsa identità, risultanti amici dell'utente hackerato,
  • with a trivial excuse as to be uncomfortable in a country in difficulty, (as is Nigeria) and have been subject to attack or theft by terrorists of the local demand of making money to send with the shipping company financial notes - type Western Union.
Unfortunately, there are several Facebookers fall for the trap of realizing they were victims too late and, worse, have proved reluctant to complain for not to emphasize ingenuity they committed.



Thursday, November 13, 2008

Seagram's 100 Pipers Fiyatı Kaç Para

parcelling

Even scammers are careful to share the websites of television programs. In fact they should not be missed on the very successful format of the game of "packages" and that Italy is currently led by Max Giusti.
is spreading on the Internet a new type of scam: the parcelling (from the Anglo-Saxon parcel, package). Fortunately there were no reports of cheating Italians.
The scam relies on the good faith of the people (it could not be otherwise) with the aggravating circumstance of exploitation of the voglia di solidarietà degli internauti.
Tramite email (spam) o banner pubblicitari, si viene contattati per aderire a dei programmi di volontariato per Paesi e/o popolazioni bisognosi.


Queste organizzazioni acquistano, con carte di credito clonate, merci di grande valore ( televisori lcd o al plasma, pc portatili, etc.) indicando, come indirizzo di spedizione, quello dello stesso volontario appena arruolato.
Con la banale scusa di disguidi o problemi di tipo logistico, chiedono allo stesso volontario (evidentemente ignaro del raggiro che sta subendo) di ricevere i beni oggetto di operazioni benefiche.
Questi, rispettando le istruzioni ricevute, subito informa l'organizzazione once the goods have arrived and the package is picked up by a van.

In this way, the recipient of the goods, convinced that he had cooperated with a voluntary association, he finds himself actually an accomplice of an organization of crooks.
Code to hand an unsuspecting volunteer might be subjected to a criminal investigation on charges of receiving stolen ( art. 648 cp) at the risk of imprisonment ranging from two to eight years plus a fine ranging from 516 to € 10,329, as well as that of recycling ( art. 648 bis) with a fine ranging from 1,032 to 15,493 € .

A tip: when you have the desire to help charities, should gain some insight into organizations that addressed their collaboration. A mode of feedback is to consult the Register of the Volunteer Organizations - in the regions - ol ' Population Onlus only - at the Inland Revenue.



Monday, November 10, 2008

Mary Stuart Masterson Residenz

Case

An example of a phishing email that is running these days on behalf of the Bank Rome and Unicredit



Dear Customer,

I. Online Services (Internet and telephone) allow you to transfer money, buy stocks, pay bills and more, all in total comfort and independence.
II. UniCredit Banca di Roma also offers an adequate system of protection: the security card.
III. The card that gives you the secret password to validate online transactions, protecting you from prying eyes.
IV. The security card you are given with the activation of the Online Services and is immediately usable.



Warning
With vechia security card is no longer possible to carry out device. Banca di Roma clients are unable to transfer money online, payments to pay the bills until they receive the NCP UniCredit Pass

electronic tool that UniCredit Bank makes available to all users of Multichannel Bank, to manage the password " Disposable safely.
UniCredit Bank also gives you total security. With UniCredit Pass: an innovative electronic device that changes your password every 60 seconds.


alternative to UniCredit Pass, Password Card is still available, the card, the size of a credit card, containing 40 password (numeric codes) disposable necessary to confirm your transactions.





Cliccate qui per ricevere UniCredit Pass

How To Congratulate For New Home

Phishing Phishing (interview) Draw a

L’espressione secondo alcuni deriva dalla storpiatura del verbo inglese to fish che significa pescare. L’idea è quella di pescare utenti in rete per farli cadere all’interno di trappole tese da incalliti ed navigati truffatori. Come i pescatori catturano inermi pesciolini così, nel mare magnum di internet, vi sono soggetti che cercano di carpire dati ed informazioni relative agli utenti che si imbattano nel phishing.
Ma quali sono gli scopi del phisher? È presto detto: i soldi. La letteratura recente ci descrive casi di phishing che hanno una ben precisa vittima sacrificale delle loro azioni: l’home banking, ovvero le carte di credito, i conti correnti on-line, i codici relativi a depositi effettuati in noti istituti di credito. Ma come è possibile riuscire a rubare denaro attraverso il phishing? Il fenomeno è allo stesso tempo criminale e sarcastico, ingegnoso e infantile. Si cerca di estorcere danaro agli utenti della rete allo stesso modo con il quale da bambini si cercava di rubare le caramelle ai coetanei: prendendoli in giro.
La tecnica utilizzata per colpire gli utenti italiani attraverso il phishing è stata, sinora, quella di inviare un’e-mail apparentemente proveniente dal proprio istituto di credito (in particolare Banca Intesa, Unicredit e Banca di Credito Cooperativo i casi più frequentemente riscontrati) with which the user is informed that, due to a transfer of the site (or for other technical reasons unspecified) was necessary to connect to the new site, enter the section reserved to their account and complete a claim form.
Apparently there is nothing strange. Only the site to which it is addressed is not the site of our bank, but another site is used as bait to lure the unsuspecting fish. Following the data and information snatched are used in many different ways, but a timely warning not to your bank could lead to bitter surprises in the next statement.
Why is subtle and sarcastic is phishing? Because it exploits the naivete e l’ignoranza degli utenti. Il messaggio di posta elettronica del phisher è generalmente scritto in un italiano improbabile (il che lascia supporre che il fenomeno non abbia ancora preso piede presso i criminali del Belpaese), con gli accenti sbagliati, con verbi coniugati male, con improbabili espressioni idiomatiche. Pertanto, un utente accorto avrebbe buon gioco a notare la "enarmonia" fra un e-mail scritta con i piedi e le comunicazioni usualmente provenienti dagli istituti di credito, formulate sempre in un italiano piuttosto forbito.
Sarebbe sufficiente una maggiore familiarità con la lingua di Dante per accorgersi che una banca non si sognerebbe mai di mandare una comunicazione così delicata ad un cliente, invitandolo ad aprire il proprio conto on-line digitando password e quant’altro, attraverso un’e-mail zeppa di orrori ortografici.
Sotto il profilo tecnico è opportuno adottare ulteriori accorgimenti, e seguire questi brevi suggerimenti per non cadere in trappola.
Nel momento in cui giunge l’e-mail phishing occorre sapere che lo scopo del truffatore è quello di indurci in errore facendoci credere che il link presente nell’e-mail conduca verso la nostra banca.
Per smascherare il trucco è sufficiente posizionare il mouse sull’indirizzo della banca verso cui il messaggio ci invita a recarci. Posizionandoci sull’indirizzo, senza cliccare, potremmo osservare sulla barra di navigazione (presente su ogni browser) il nome dell’indirizzo which will lead us to the link.
careful reading that address does not match at all as we realize that our bank has succeeded in exposing the phishing, without lapsing into his net.
However it should be noted as the recent news stories it is apparent a certain evolution of phishing techniques: in the case of Unicredit bank, there was only one "s" of the difference between the actual site of the bank and cloned by the phisher. In addition, the site owl was in all respects similar to the original.
What to do in these cases? A telefonatina certainly would not hurt, after you spend a few cents to save thousands and thousands.


Mr. Marcello Pirani - legal@anti-phishing.it

Sunday, November 9, 2008

Lung Scarring Life Expectancy

Email

Each e-mail message that contains the path taken by the sender to the recipient. The "road " made is identified by an IP address and the entire route is shown in ' header of the email. Normally the mail header is not displayed but you can do so with the most common email management programs (outlook) and many webmail . The header is read from the bottom up because the first IP address in the bottom refers to the sender, or rather, the server di posta del mittente. Tutti gli altri indirizzi si riferiranno ai vari server di posta in cui l'email ha stazionato durante il suo percorso. L'ultimo indirizzo, posizionato più in alto, sarà quello del server di posta del destinatario.
Esempio
I dati in rosso sono riferiti all'account di posta elettronica del destinatario (la stringa xxx.xxx.xxx.xxx si riferisce all'indirizzo IP);quelli in azzurro ai server, con i relativi indirizzi IP, attraversati dalla email;quelli in viola fanno riferimento al server ed alll'indirizzo IP del mittente.Con un semplice WhoIs sugli indirizzi IP ottenuti dall'header di posta, è possibile capire da dove (Geographical location) is playing the stessa.Questo control is very useful to avoid falling into telematics such as phishing scams.

Return-Path:
Received: from smtp- recipient. It ( xxx.xxx.xxx.xxx) by ims53b. recipient. It (xxxxx)
id 487FB6CC0081130A for recipient @postaelettronica.it; Sun, 1 January 2008 15:02:59 +0100
Received: from mailrelayXX. serverdipassaggio . It ( xxx.xxx.xxx.xxx ) by smtp-inx. serverdipassaggio .it (x.x.xxx)
id 47F237DF23D49C31; Sun, 1 Gen 2008 15:02:58 +0100
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvAAAGl8FklR5Ai1kWdsb2JhbACUIQEBAQEJCwoHEQO0BoNY
X-IronPort-AV: E=Sophos;i="4.33,569,1220227200";
d="scan'208";a="1032070930"
Received: from av7-2-sn3.vrr. serverdipassaggio . net ([xxx.xxx.xxx.xxx ])
by mailrelay06. recipient. Com with ESMTP; January 1 2008 14:02:56 +0000
Received: by AV7-2-sn3.vrr. serverdipassaggio . Net (Postfix, from userid 502)
id E609438095; Sun, January 1 2008 14:30:38 +0100 (CET)
Received: from smtp3-1-SN3. serverdipassaggio . net (smtp3-1-sn3. serverdipassaggio . net [ xxx.xxx.xxx.xxx ])
by-AV7 2-sn3.vrr. serverdipassaggio . Net (Postfix) with ESMTP
7DC0C381D9 id; Sun, January 1 2008 14:30:38 +0100 (CET)
Received: from 90-227-95-172-no25. sender . Com (90-230-2-215-no118.mittente.com [ xxx.xxx.xxx.xxx ])
smtp3 by-1-sn3.vrr. sender. Net (Postfix) with SMTP id 0B87D37E53;
Sun, January 1 2008 15:02:45 +0100 (CET)
In -Reply-To: <370401c78hj18gh4$dfc58b00$eeeea8c0@aol.com>
References:
<001303c5ee2fab8556d80c5fe7@aol.com>
Date: 01/01/2008 15.02
From: " Mittente "
Subject: Re:
To:
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: Sender <20081109140245.0b87d37e53@smtp3-1-sn3. . net




Does My Three Year Old Have A Cold Sore

The acquisition of evidence in the digital world

The digital forensics is the process of recreation of what happened in a digital device. In the past this activity was limited only to computers (computer forensics then), now with the diffusion of new electronic devices that can store data on digital storage media or external, includes all the digital devices including mobile furniture,
digital cameras and even GPS devices (which is why we talk more generally of digital forensic ). As for the forensic pathology (forensic science that allows us to clarify how and when a person is deceased) digital forensics has been used to catch numerous crimes.
therefore can be summarized in very general terms, that the analysis of digital information, you can (unfortunately not always) to:
  • reconstruct what was done with a computer
  • recover deleted files (text documents , images, videos, etc...)
  • find certain types of files.
  • search for some phrases.
  • examine areas of your computer.
Just as there has been the evolution of computer forensic to digital forensics, we can say that a new field of action is that of the Internet. Consequently, the application of the above mentioned techniques and methods of acquiring digital evidence from the Web, it is identified as forensic network.