2012年6月4日星期一

Insecurity in Geneva: "We expect to lose tourists'"

The image of Geneva security is deteriorating rapidly. So much so that Chinese tour operators have announced they will abandon the city register in their program. One example among many that worried Philippe Vignon, Director of Geneva Tourism.Philippe Vignon, you receive many complaints from tourists?

Tourists are particularly targeted by petty criminals in Geneva, compared to other cities in the world. Past two years we have concrete feedback from customers who complain directly to tour operators in the Middle East, China, India and even Brazil. However, it is the most promising markets and on which we invest.

The consequences do they feel?The Embassy of Japan in Geneva Switzerland has come last among the riskiest cities in the world. The Chinese embassy in Bern has sent its entire network, 23 April, that Switzerland is not as safe, Geneva is the only city mentioned! A dozen Chinese tour operators to give up now integrate their tour in Geneva in Switzerland. Social networks can also be very painful.

In October 2011, the CEO of Google China, which has 13.5 million "followers" on his Twitter account, has announced that he had been stealing his business here. An English blogger wrote these last days: "Geneva is not a safe place."

These examples only confirm what is perceived for a long time. This is a very clear signal!That is to say?We see that among the actors of the tourism industry abroad there is a sharp deterioration in the perception of security conditions in Geneva. Consequently, Geneva can no longer rely on its image as a haven of tranquility that attracted so many tourists.This is worrisome.

Does Geneva sees tourists flee?Taking the example of the Chinese, who are expected to reach 50,000 visitors in 2012, we expect to lose between 10,000 and 15,000 this year.Prevention could it be enhanced, rather than let visitors leave with a bad memory?The challenge is to strike a balance.

When we sell the assets of Geneva tour operators, it is not possible to speak of insecurity. And other destinations benefit from this course to recover market ... Once in Geneva, our Home Department & Info offers advice to visitors, as security. We distribute flyers about the monte.

We also twenty "tourist angels" that run during the summer to meet tourists and especially warn. There is also a lot of work done by the hotels. But too much prevention would fuel the perception of insecurity in Geneva, it is considered out of control already.Would you support a fixed police presence in tourist areas?

In Paris, we see buses of riot police and it works. A constant and visible police presence at the Cornavin station would have the advantage of reassuring. When the Geneva citizens create a militia against the monte, it is true that there is a ras-le-bol. This is a sign of loss of control.

Do you have any doubts about the safety of social networking?

Warranty on social networks? Not really says 80% of Internet users surveyed by Avira. The fear is based on the use of private information without explicit consent, but also imperfect protection that encourages hackers to steal data for use course tort.

Chief among the defendants, they cite + Google and Facebook. And you suspect you also social networks well enough not to protect your information? Give us your feedback by filling out this survey.

From crime, there are still too fatalistic

"Too many people do not take all reasonable steps to protect themselves against crime. There are still too fatalistic. "Pierre-Olivier Gaudard directs the Crime Prevention Division at the cantonal police, on which the monitoring networks established in partnership with the people.The goal is that every citizen should learn to detect risky situations and adopt some basic reflexes giving it better security. The concept is celebrating its 20th anniversary.

Vaud Canton is still the only one to have established this collaboration system imported from England for burglary prevention. But interest continues to grow elsewhere, particularly in Geneva and Swiss German.Collaborative successPercent Vaud communes have now joined the organization. They indicate to the visitor by panels very explicit. Associated with the word "population", the term "police", understandable in all languages, clearly announces the color.

It took nearly twenty years proves that the only blunder of the formula, purely semantic. The original name of "buddy" in fact contained some ambiguity - it could suggest that spies on his neighbor. It has just been abandoned, to retain only "Police-population" (Popul).

"We want to leave the strict confines of burglaries, the police said. It is inviting people to reflect on a more holistic view of crime. "For example, members of networks set up in collaboration with local authorities are regularly informed of the arrival of a new internet scam .Even in Lausanne?"Police-population" is a concept of proximity that seems destined to local small and medium importance. It resembles, however, more densely populated areas and cities. The issue has even been put on the carpet to the Municipal Council of Lausanne.

Nothing prohibits the establishment of such networks, provided they are granted in the means.What benefit in twenty years of existence? "The practical effects are of course difficult to measure. How do you know if a home has not been broken because he was being watched, or if it is because it happened between the drops ... "Pierre-Olivier Gaudard emphasizes that it is the very long-term results can occur. He believes that Popul brings a sense of community feel stronger. "If people learn to better protect themselves, while their region becomes less attractive to burglars, and they will soon realize it." All indications, however, that we are still far away.

"I am always amazed at how few doors of buildings are protected. Will see in Paris ... "In terms of basic reflexes, the concern I hear most often is the interpretation of self-defense. "This is a false debate, said the policeman. First, because self defense is a highly codified concept. Secondly, because many people have great difficulty if they were to fight with the burglars. "To those who do not want to remain completely passive when they hear something suspicious in their home, police said that he is often sufficient to activate lights or make noise to drive away the thief.

2012年5月31日星期四

Security: a hotline to denounce police abuse


114 may be called at any time for free, from all telephone networks operating in the DRC. The number operates 24 hours 24 is made available to the public since May 29, to learn about the abuses committed by certain officers of the order. By launching this service, the General Inspectorate of the Congolese National Police (PNC) has recommended to all who live in the country and who will be victims of abuse from a police officer to call at any time and from any network.

However, the population was also warned against the false denunciations. "We must not falsely accuse the police. Do not use it to tell his life, "warned Gen. Constantin Mudekereza who urged people to make good use of this instrument available to him for his safety. He, cons, announced measures to protect the service against misuse. "The population has time to communicate his complaint and it will not abuse it, because we know when we can cut this communication," he warned.

Vice Minister of the Interior and Security, Aegis Kongoso, has, meanwhile, promised exemplary sanctions against PNC refractory to discipline and the laws of the Republic by this service because they are now under close surveillance.

A partnership with the UN mission

This service is a partnership between the PNC and the UN mission in DRC (Monusco). The latter will continue to help, according to officials of the National Police, in the monitoring of all the corners where the police would have behaved badly.

Monusco, by the head of its police, Wafi Abdallah, reaffirmed the desire to support the PNC in the process of reform of the security sector in the DRC.

Recall that another toll on 081 080 0012, had also been commissioned since 2011 by the National Network of organizations defending human rights in the DRC and the Joint United Nations Office for the right of the man to fight against all violations of human rights.

FireMon provides the first comprehensive solution for managing security posture of the industry


FireMon, a leading provider of solutions in terms of risk analysis and security management, today announced the launch of FireMon Security Manager 6.0. This major upgrade is the first solution for managing security policies and postures of the industry that fully integrates the comprehensive risk analysis to configuration management, application and control of network devices such as firewalls firewall, routers, switches and load balancers. This gives businesses, government agencies and providers of managed security services (FSSG) unparalleled visibility to understand the extent of the vulnerability of businesses and prioritize the proactive defense of critical assets, while being assured that their security infrastructure is devoid of human errors and inconsistencies between policies and protection.

The wave of discussion and excitement on the firewall of the new generation (PFNG) and infrastructure security has overshadowed a shocking lack of visibility regarding the domino effect of change - software patches to changes in access through the deployment of new systems - that can create vulnerabilities silent throughout a network. The staff responsible for daily security operations is challenged to understand the interdependencies in a quagmire of complex old and new hardware and software, and the implications and potential errors they represent. For example, last month, Medicaid and Social Security information of 780 000 citizens of Utah were exposed due to misconfiguration and access control ineffective.

Even for companies that have implemented some level of management policies / configurations, the deluge of data and the ability to trace the paths and assets at risk remains a challenge for many. The solution lies in the ability to identify, assess and address automatically change impact or a misconfiguration on controls and security policies in real time, and combine this with mechanisms that incorporate a comprehensive risk analysis to provide quantifiable and actionable information in order to focus on the most critical issues.

FireMon Security Manager provides policy management and configuration, as well as enforcement and monitoring of network devices including firewalls, routers, switches and load balancers while monitoring and alerting in case of configuration changes. Security Manager also assesses the current configuration settings and controls by comparing them with best practices and compliance standards - and offers extensive options to address configuration problems.

With the addition of a new patented motor Risk Analysis, Security Manager can now analyze the accessibility of any vulnerability to sources of threats, by measuring the impact, depth and the risk of a potential attack . The?? Integration enables Security Manager to evaluate, visualize and simulate attack paths across the network to help security teams to quantify risks and prioritize remediation. In addition to the vulnerabilities detected by traditional scanners Vulnerability Assessment (VA) conventional, Security Manager can also incorporate the results of penetration testing with Metasploit Rapid7 and proven performance to factors in its risk rating. Engine technology risk analysis, obtained through the acquisition in April 2011 the young company MIT Lincoln Labs, Saperix Technologies, is deployed for over a decade, is used in demanding areas of civil and Defense and technology is automated risk analysis fastest and most flexible on the market today.

Change management of firewall


The combination of new applications and new users, network evolution and new threats are a source of many evils for IT staff and security. How these teams should they then work together to eliminate the risk in environments in constant change?

By Mark Henry Guy, Regional Director EMEA AlgoSec.

"Our only security is our ability to change," wrote John Lilly, the American philosopher and physician. But talk to a security manager under pressure or a CIO, and they will tell you they gladly accept much less change if they got more security.

In other areas of IT, such as that of integrated enterprise resource systems, will continue to operate effectively, without major intervention for long periods of time. But security, each new hire, each patch or software upgrade and update each of the network open a security hole and increase the risk exposure of the organization. This situation becomes even more complicated in large organizations, which may have a mixed field of security including firewalls traditional firewall and next generation of virtual firewalls provided by different suppliers, all with hundreds of Thousands of policies and rules.

Then there is the rapid and unexpected, often requested by members of the Executive Committee to access resources or specific functions. In some cases, these changes are made in haste (after all, who can refuse a request for a supervisor because he wants to access, immediately, to the network with its new Tablet PC?), Without sufficient analysis of whether the change is authorized under the existing security policies, or creates a new source of exposure to risk.

If we add to these concerns the internal growing number of external threats, malware, social engineering exploits and hackers, it is not surprising that IT and security teams believe the change, although that inevitable, their launches many more challenges than they would like.
So how IT and security teams should they work together to manage change and better control the security issues associated with it? How should they deal with updating their infrastructure and their complex security policies to ensure simultaneously a better system availability and better security?

In the same boat

The first step is to ensure that IT teams and those of security work in harmony with each other. In many large companies, operational and administrative tasks can be performed routinely by different teams of those who deal with security risks and tasks. Although both teams generally tend towards the same objectives, the decisions of one can cause problems for the other - as in the previous example, the executive who wants to add its new Tablet PC to the network. Sometimes these situations can be handled in a hurry to get rid of them, with the intention to treat security issues later. But if the latter is crucial, it can be neglected.

It is therefore useful to recognize that these potential pitfalls exist and to implement measures to improve coordination between different teams. If you can not always predict exactly when users request to add new devices to the network, you can certainly prepare a routine process to meet these requests as and when they occur. Gather the two teams to prepare roadmaps for dealing with such situations - as well as other situations "listed" such as updates to the network, the gels changes, and audits - helps reduce the risk of These changes open up security vulnerabilities.

A clearer

To establish these roadmaps, it is essential to understand the topology of your network, which can be extremely complex enterprise environments in multi-site. Where are the main channels and choke points for traffic flow computer? Where are the potential vulnerabilities? How are configured firewalls on the network, and what policies and safety rules, operating on these devices?

The answers to these questions will help you identify and target areas with potential security holes. However, the pace of infrastructure changes under way - not to mention the speed at which external threats are evolving - means that manual assessments and periodic risk and network are simply more frequent enough to allow staff to arrive to follow.

In addition to being able to visualize your network, you must be able, in near real time, to respond to network problems and quick access to all types of firewalls and to apply changes in a way that is both consistent with security policies and fully verifiable. This requires the automation of these critical tasks consuming labor.

Automation for IT staff

Why automate these tasks? Simply put, organizations can not afford not to automate. In 2011, leaders of the IT and security were interviewed about their * management problems of firewalls. 66% said that human error was the main cause of failure of network security - in other words, simple errors made when evaluating the application or "manual" rules of firewalls or policies.

Respondents also said that it is the management of firewalls that asked the biggest investment of time while causing as many disruptions in the networks. 73% cited a large number of changes as the main reason for their investment of time in the management of security gateways. The survey clearly identified several needs: an overview, dashboards, security issues, information on availability issues and compliance, reduced human error, and prioritized actions for reduce critical risks.

The automation allows teams to take control and not simply fighting fires being tossed between incidents. The right solution can help teams to track traffic or potential connectivity problems. It highlights areas of risk, the current state of compliance with the policies in mixed environments including traditional firewalls, those of the next generation and virtual. It can also automatically identify precisely the features that require changes, and show how to design and implement this change, the safest way.

An automated solution enables easier management and more predictable change firewalls in large environments with multiple teams. Because it is the solution itself that does the most work, it also frees up time to manage security tasks more strategic as well as compliance. An additional advantage comes from optimizing the performance of firewalls and gateways. Remember that firewalls generally treat their sets of rules sequentially until they find one that matches the traffic. How many rules have been added to your firewall during these years? Extending the number of sets of rules degrades performance. By cleaning up unused rules of your firewall, and prioritizing rules that are most frequently used, you reduce the amount of processing that the device should do.

Thus, the constant changes should not be a nightmare for IT staff and for those of security. The ability to better manage change afforded by automation can make a real difference to the security of a company.

Certificate in Cyber ​​networks at the Polytechnic


Increase in attacks against government sites and industrial intrusions, hacking, viruses, Trojan horses ... more and more threats on computer networks today.

Identify, prevent these hazards, provide knowledge and develop skills to handle these events are the objectives ducertificat cybersecurity computer networks that the Centre for Continuing Education will offer Polytechnique Montreal in the fall of 2012.

Advanced investigative techniques to the legal aspects through specific risks related to telecommunications, smart phones and prototypes of the future, training will cover a broad spectrum of this emerging field.

The program is open to stakeholders from the private and public who wish to preserve network security of their organization.

Courses will be offered online, which will serve clients located outside of Montreal.

More details here.

The security of personal data concerned 86% of social network users


An overwhelming majority of Internet fears for the safety of their personal data left on social networks, according to a study of Avira, unveiled Wednesday, May 30 The survey reveals that 86% of users of this antivirus solution fear that their personal information may be stolen or misused on Facebook, or Twitter + Google.

It shows that 40% of respondents have confidence in any social network in terms of data security and information available online. It should be added to the group of skeptics who consider 25% as the Facebook social network is most vulnerable to theft or misuse of data, like the 19% who most fear Google + and 2% who are not trust Twitter.

Finally, only 14% of respondents rely on all social networks.

This survey was conducted in January and February 2012, with 2,710 users of the antivirus Avira.

2012年5月26日星期六

Dell would buy Quest Software, a specialist in network security

In March the private fund Insight Venture Partners has agreed to acquire Quest Software for $ 2 billion. According to Bloomberg Magazine, Dell would be part of one of the companies currently in talks to buy the publisher.

Past two years, Dell has made more than fifteen acquisitions to strengthen its portfolio of professional services. The last of them dated to the early redemption of SonyWALL. Last year, revenues from Quest totaled $ 887 million with net profits of about $ 44 million.

The company specializes in systems management applications for companies. Among the solutions offered by Quest Software, Toad and we find SharePlex, to automate some tasks on a database like Oracle or replicating it.

The editor also has management tools for Microsoft Sharepoint and Exchange. Other potential buyers, analysts had counted on logically Oracle, Microsoft. Quest Software is the company now valued at 2.12 billion.


Open Forum: Security Challenges with IPv6


There is no doubt that the imminent worldwide launch of IPv6 June 6, 2012 heralds a new era of Internet infrastructure worldwide, both in terms of evolution and widespread adoption.

The world has already had a taste of the new protocol last June, when the IPv6 World Day.

Led by the Internet Society, more than 1,000 websites, high-tech companies and ISPs have been encouraged to shift to IPv6 collectively for a period of 24 hours to "test" the protocol and try to anticipate technical problems that might occur during the official launch.

June 6, 2012, key organizations and high-tech leaders like Google Web, Facebook and Yahoo, among others, will switch to the new Internet protocol during official global launch.

And the transition becomes increasingly necessary. The current protocol IPv4, which supports about 3.7 billion addresses, was simply exhausted the stock of available addresses, in part due to the explosion of mobile devices.

But IPv6, in turn, has an unlimited capacity of addresses, which allows it to adapt to a mobile infrastructure and growing Internet world.

However, with the imminent launch of the Global IPv6 protocol, researchers and IT professionals anticipate some challenges, especially in security.

The novelty and lack of knowledge relating to IPv6 as there will inevitably configuration errors, compatibility issues and other blunders implementation.

There is no institutional knowledge about IPv6 that was on IPv4, which has been used for decades and offers a broad knowledge base.

But perhaps the most important security challenge is that many network security appliances are able to transfer IPv6 traffic, but not to inspect it.

And as IPv6 is enabled by default on many platforms current network - such as Windows 7 - these systems are already installed on the network.

The further deterioration of the S & P: The safety outweighs the numbers


And besides, he had perfectly foreseen. The strong cash infusions could not prime the pump in the manner hoped for recovery. GDP has plunged into recession and whatever the approach of analysts, at constant prices to current prices or whatever, the result at the end of 2011 closed at -1.8% to -2.2% and one for other. Meanwhile, the prime minister has just spoken by 1.2% in the first quarter of 2012, during negotiations with the UGTT, whereas today, half of the year, the economic program barely started.

Can we put everything on the back of the current governance?

Not really, because the new administration has taken the hand in the last days of last year. And therefore, the numbers (BB) as Standard &; Poor's advanced should not be attributed solely to the new governance. Or even the old, because it has ruled that seven months, but still managed to cushion the blow, the consequences could continue at the pace of first quarter 2011, which had already declined by -8%. It is fitting that after a revolution, to which is added one, related to Libya, there is a slump.

But already by lowering the sovereign rating of our country, S & P, who shoots anything that moves, did not miss the opportunity to "run", already a first time to relapse in late summer 2011 and now we finish we finish in posting a grade "speculative" on international financial center. In reality, donors, observing in the early summer the figures announced with slow growth, may have other reasons to fear the Tunisian site. Attempt an explanation.
On the one hand, the beginnings of recovery since the beginning of 2012 do not seem entirely convincing.

Neither the CBT nor the INS had released to date figures on what really weighs (at constant prices) GDP at end-March and late April if possible. Because, by reading the notes in reverse that publishes the OWA, we see indeed that our trade deficit continues to widen because of Europe, itself, dilapidated. Is that our foreign reserves, which should cover the normal six months of imports, are currently on the red limit of 100 days of import. Moreover, by dint of injecting dinars into a brand new economy seized up, it eventually led to exacerbate inflation. This is already double what it was to end in December 2011 and is already at about 6%.

Working for several sectors are still struggling export and tourism that seems to make an effort, also remains at the stage of chugging along despite the high-dose amphetamine prescribed to him ... Provided the real reason lies elsewhere. Is that the social and political approach to tolerable limits.
Security and stability first

In a report from the U.S. embassy in mid-April, which was widely distributed on networks, social, reads in part: "the political protests, work stoppages, roadblocks and other public disturbances continue to occur. Demonstrations turned violent on several occasions in violent clashes between police and demonstrators, causing deaths, injuries and property damage "..." U.S. citizens are urged to remain alert to developments and local safety be vigilant about their personal safety "... "The Interior Ministry has confirmed ... that the group had links with Al-Qaeda in the Islamic Maghreb and arms traffickers known".
A month later, the U.S. Ambassador, he was doing a tour in the south, has seen firsthand that the situation remains precarious, since it almost got itself was attacked.

But such facts and reports fall inevitably into the hands of U.S. analysts and primarily S & P whose mission is to inform the sovereign risk in all states where U.S. investors put their savings, especially through the famous "investment funds" , they are expected to grow, to serve particular social pensions for "retirees".

It is perhaps this aspect that has counted most of the Tunisian sovereign risk rating. Since by reading his notes carefully, the agency reports that indirectly under conditions of stability (it considers the upcoming elections), the takeover of all azimuths could bounce economic data, which are an epiphenomenon.

Certainly, many will address the rating agencies because they can push states causing the rise in compensation costs of debt (6% for Spain and Italy, 11% for Portugal and even up 30% for Greece). However, it is highly likely that at some threshold higher compensation costs of debt, the risk of not being able to honor the debts of principal and interest is a mathematical inevitability.

This "club effect" may lead to a default (bankruptcy) for the fragile economies while debt is expected to induce a boost saving in order to generate leverage ... But it's not that slow growth may do so if it does not release enough resources to repay.

This is why the rating agencies take into consideration all other elements, including the country's stability, the quality of political governance and its ability to ensure security without the slightest flaw, the confidence of local investors, etc.., For note the reliability of a State as a whole, even though sovereign, especially in the era of globalization and mobility-volatility of capital ... Between charity and donor must be defined clearly and act accordingly.

Road Safety - The interior minister keeps his hand: The change is not for now


The alternation has sounded in May and now the ambitious slogan of winners is now put to the test of facts. Change, it should be now. Comprehensive program that both the FFM FFMC through Codever had asked to speak in detail of road safety in particular and the bike in general.

About a less repressive approach of the first theme mentioned, the idea of ​​reclaiming the land by the Department of Transportation instead of a monoculture of one minister of the interior had been addressed. And now the President of the Republic seemed to be leaning in this direction by passing through mail response:

"I believe that the policy on road safety should not be reduced to repression. It must involve cross and, in a dynamic inter-as much security as prevention education and transport, sustainable development ... In the same logic of compartmentalization, the establishment of a local consultation on the road I think is important. "

Not bad in theory. And practice? It just fell on Friday with the awarding of Ministers decrees published in the Official Gazette. To discover what? Nothing new under the sun! The interior minister, Manuel Valls, keeps road safety. The change is not for now.

That said, there is still the law. And tireless FMWC resumed their pens to ask five questions to the candidates. Something to be aware while not ever raising the mortgage of the sincerity of those who will have to respond. But their proximity to more pronounced with the voter can also play its role in everyday life.

Questions FMWC candidates for legislative:

Question 1: instead of 2WD

If elected (e) MP (e), will you commit to mandate the inclusion of two-wheelers (2WD) as a legitimate means of transportation and an alternative to "all-car" and to consider their 3 , 8 million users as drivers in their own right: evolution of the Highway Code, 2WD integration in urban transport plans, road infrastructure adapted taking into account the specific evolution of 2WD and vulnerability of their users ?

Question 2: the retro-reflecting device

The decree of January 3, 2012 reveals the ignorance of government officials on the accident of 2WD and needs of their users by punishing a fine of the third class and the withdrawal of two points allowed from 2013 on non -wearing a "retro-reflective device," even in daylight, for users of motorcycles over 125 cm3, then no serious study justifies such a device which is unnecessary, inappropriate and discriminatory. If elected (e) MP (e), will you commit to lobby the government to review the decree in consultation with associations?

Question 3: technical control

Despite studies that show no relationship between technical failure of the vehicle and accident rates of the two wheelers, the government announced its intention to introduce a technical inspection of mopeds. Then the measure was postponed twice.

If elected (e) MP (e), will you commit to abandon this plan complicated, expensive for users and no measurable effect on road safety for 2WD?

Question 4: projects tolls on national

Highways (the safest networks) motorway network are increasing their rates of tolls, forcing users to refer to secondary networks (RN and RD) most accident ... These increases are inconsistent with the safety objectives road. Other projects to introduce tolls on national roads are also under consideration.

If elected (e) MP (e), would you be willing to legislate to limit rate increases and end the privatization of road network contrary to the objectives of reducing accidents?

Question 5: the Zapa

In 2012, eight cities in France (Paris, St. Denis, Lyon, Bordeaux, Clermont-Ferrand, Nice, Aix-en-Provence and Grenoble) and 22 areas will be provided then the experimentation of the ZAPA (Zones priority action for air). The ZAPA are expected to contribute to a limitation of emissions generated by road traffic. The pollutants covered are essentially the "fines" and nitrogen oxides released by diesel engines, particularly those of heavy vehicles in high traffic areas of road freight.

Against all logic, the two-wheeled motorized vehicles put into circulation before 2004 will be prohibited in these areas while there is no 2WD diesel engines, 2WD that participate in reducing congestion and that their use contributes to the reduction car traffic in commuting employees.

In addition, these areas constitute a real discrimination vis-à-vis the most disadvantaged populations, and an attack on freedom of movement in general. We believe that the project developed under the Fillon government is not adequate to economic and social realities present and future, without effects on pollution.

If elected (e) MP (e), you commit yourself to revise the system ZAPA taking into account implemented by our European neighbors (where 2WD are not affected by movement restrictions)?

2012年5月7日星期一

The Bastille ignites again


This is where May 10, 1981 had left the celebrated François Mitterrand, the first socialist elected president under the Fifth Republic: Sunday, 31 years later, she returned to celebrate the victory of Francois Hollande, Place de la Bastille in Paris. 20 hours. Face the winner appears on the giant screen, confirming what everyone subodorait, rumors on social networks are being made increasingly clear in the afternoon. The outcry is huge on a place as black people than the Rue de Solferino, at the Socialist Party headquarters.

When, newly arrived from Tulle, sometimes near the place more than four hours later, 20 to 00 h, it triggers a jubilant crowd in as compact until early evening. All evening, the smoke lit up the Genie de la Bastille, firecrackers crackled, flags were flown. Soon the column was climbed in July, the security gates and strides the crowd pressed toward the stage listening to artists 'friends', Yannick Noah, Ridan, Pep's, Kassav, Yael Naim, Axel Bauer ...

Meanwhile Francois Hollande, the defeated candidate Segolene Royal in 2007 has collected a great success of esteem to the applause, criticizes the "money power" and gets into "Ségolène president". The forefront of assistance very young, the pressure is high, some crowd movements take place, but the atmosphere is good-even if it takes over an hour to travel a few tens of meters.

Sarkozy jeered

"Chairman Holland", "We won! We won!" The crowd chanted. Some waved red roses, others raise and slam his fist as they cheer the loser's lady-killer. "Bye bye Sarko", "Sarko in prison", "Sarko, it's over!" One hears. The intervention of the president is also copiously beaten hoot as the voices on the right Jean-Francois Cope and Nadine Morano. A man, ironically, asked whether the sausages are sold in a booth "halal", a campaign theme developed by Nicolas Sarkozy to the chagrin of the left.

"Holland president, it will change the notion of president," said the actress Josiane Balasko, long-standing support of the Socialists and François Hollande. Clementine Celarie, Guy Bedos, Michel Piccoli is also there. Armel Noisy, Etienne 60 years, came to celebrate "the departure of Nicolas Sarkozy" but also expects that it meets Francois Hollande "he said during the debate in his long tirade: Moi, President ... ". As the crowd demands on the president-elect: "Holland, the change, it really should be now," demanded a placard, "Quick, the Sixth Republic", "Retirement at 60 years full rate, it is now "require other.

In 1981, the party was organized in improvisation, in the afternoon, when the polls did not leave the slightest doubt about the identity of the winner. It was also held in the rain and Mitterrand had not come about. This time it was prepared. Under the eye of cameras placed at the foot of the Opera Bastille, built during the Mitterrand era, supporters had flooded very early before the formalization of the results. "I was already there in 1981, in the rain, and it is important that children see this," says Olivier Guedj, dentist of 44 years came with her children.

La Sarkozie et la politique africaine de la France: ATT, l'indomptable ou l'imprudent?


In Libreville Sarkozy, before Oumar Bongo, wants to embody the break in France's Africa policy, saying loudly that he does not belong to the generation of African independence and that he did not even networks to ensure what we used to call, Françafrique, ie relations also preferred that the dark France has maintained (formally and informally) with its former colonies since the time of De Gaulle and its Mr. Africa, Jacques Foccart.

It is true that Ali Bongo is not Oumar Bongo, Blaise Compaore and ADO do this or not Felix Houphouet Boigny.

Also, Henry Guaino (special advisor to Sarkozy and his pen in many of these including the highly controversial speech in Dakar in 2007) and Claude Gueant, "the best" according to Sarkozy policeman, also a very powerful secretary general at the Elysée (then Interior Minister), the gentleman of impossible missions (like James Bond 007) including the release of Bulgarian nurses by Gaddafi or the release of the French spy Pierre Camatte in northern Mali by AQIM , as influential and effective they are, these two lieutenants Sarkozy, are far from the frame of Jacques Foccart.

But still, African politics of France has in fact been no rupture Sarkozy as its outline was preserved.

The "networks" has informally continued to be supplied by the particular sulfur Bourgi Robert, who learned everything from the thundering Foccart and Patrick Balkany, mayor of Levallois Perret in Upper De-Seine, Sarkozy's personal friend.

The relationships continued to be maintained including Oumar Bongo until his death which could boast of getting fired the secretary of state government cooperation Fillon (Jean Marie Bockel), Denis Sassou-N'Geussou (which even Transparency International can not worry on French soil), Blaise Compaore (the good student), and ADO Ivorian President elected and installed by the Elysee, forcibly, and the nice man contracts for France to Bouygues and Bolloré.

Adversity against any French head of state who is not calibrated for such relationships continued with Gbagbo, Dadis then ATT.

French interests have been defended with vigor and determination that is for the oil (for Total) for Uranium (Areva) for major works (for Bouygues and Bolloré) and services (Orange, Vivendi, Bnp ...) and the arms contracts and transport (Alstom and Dassault) particularly in North Africa.

From this perspective, Gaddafi was received at the Elysée in 2007 with honors (with implantation of tents in the Hotel Marigny and impressive convoys of forty vehicles in Paris for sightseeing of the highlights of the capital by Prince of days) in hopes of being able to sign lucrative contracts to arms-billion euros.

Digest of Jamariya had the audacity and arrogance of not honoring that commitment was firm and yet received a dented the country's image "of human rights" that Rama Yade (then Secretary of bubbling French state for human rights) has not failed to remind him in one of the hard words which she has the secret.

In early 2011, diplomacy Alliot-Marie, at Quai D'Orsay, roundly mistaken on Tunisia and early spring Arab, as it brings to the French National Assembly, without complex, its support for the regime Ben Ali and Trabelsi .

Michelle Alliot-Marie, head of French diplomacy then, is itself involved in a compromising trip to Tabarka in Tunisia, to be spending his Christmas holidays in 2010 at the expense of close to Ben Ali and all with private jet.

Bad time for French diplomacy with the Arab world in early 2011 to the extent that this is Christine Lagarde (the epitome of class and elegance to the French), however, Minister of Economy and Finance the time, which will make the trip to Tunis to attempt reconciliation with Tunisian after the fall of Ben Ali instead of Michele Aliot-Marie.

So when the wave of Arab Spring arrives in Libya, Sarkozy has an unexpected opportunity to "skin" to Gaddafi and give him the money in his room for his affront to 2007 while redorant the crest of the French diplomacy and leadership on internationally and gain height, so, on the internal political scene, by boosting its popularity was seriously damaged with record unpopularity because of the crisis since 2007.

The philosopher "to his shirt open" (to quote the New York Times), Bernard Henry Levy, VRP is the root of the Elysee in the Libyan case, it is responsible to contact members of the French CNT, National Council of Transition Libya in its stronghold of Benghazi, through endless trips between Paris and Benghazi.

Sarkozy, is active, but Gaddafi and his "mercenary" resist and even reverse the steam and are on the verge of taking Benghazi and "rats", the epicenter of protest against his regime.

In extremis, French diplomacy comes to vote at the Security Council of the UN, the controversial resolution 1973 of fly zones in Libya to prevent that NATO planes of the Gaddafi regime to bomb the Libyan people.

The rest is history.

Most Francophone African leaders supported France in its "crusade" (in the words of Claude Gueant) in Libya, but not ATT, worse it does not recognize the CNT as all its neighbors except Algeria.

ATT even became very good friends with Jacob Zuma, very back against Sarkozy in the implementation of resolution 1973, by NATO to the point where he curtly declined the invitation of Sarkozy at a summit in Paris on Libya with countries members of the contact group to which the African Union was invited.

The irritation at the Elysée and the Quai d'Orsay was at its height, especially as there are troublesome precedents Koulouba with the tenant.

It did not bother to sign agreements with France on immigration chosen (candidate's campaign promise of Sarkozy in 2007) nor with Hortefeux, nor with Eric Besson, nor with Claude Gueant, the great gentlemen "numbers" of "deportation" of governments instead Beauvau Sarkozy in Paris.

On oil exploration in northern Mali, Sonatrach (Algeria) and Eni (Italy) are the front line for a first exploration drilling was planned in this year 2012 (research and non-operating, I specify) Total all to shame ( France) with envy for anyone who knows the potential of four sedimentary basins divided into 25 blocks of northern Mali, part of which are the subject of exploration contracts and operating agreements with ATT by the governments of the countries of multinational corporations often emerging in the nose and beard Paris and Total.

Worse, ATT does not want French military bases on Malian soil, and "not doing enough" in the fight against AQIM has declared war on France because of its campaign in Afghanistan and its law "anti -burqa "by engaging in the taking of French hostages in the Sahel and transformed easily into northern Mali sanctuary to sabotage French interests in the region.

Paris is small, powerless, to make unexpected and sporadic actions with the Mauritanian armed Nigerian and every hostage-taking French because of the cooperation agreements between both countries and Mali, which gave them rights to sue on their respective soils .

So how do you tame the untamable ATT or unwise?
There remains the question Touareg.

That's good because France is home to the Tuareg MNLA.

Contacts are made by officials of the Quai d'Orsay, discreetly, in France and Switzerland.

And curiously Tuareg fighters abandon Gaddafi and return laden with impressive convoys of heavy weapons to Mali.

RFI and France 24, the formidable machinery of communication at the Quai D'Orsay in Africa, providing the communications department of the "deal Tuareg" where fighters are carefully distinguished MNLA of AQIM and its allies Ansar Dine Iyad Ag Ghali and their war crimes, even though they fight all the same Malian army in the same territory without ever fight each other.

Curious!

And the new head of French diplomacy, Alain Juppe, "the rebels had significant military success" before the fall of Tessalit.

And for him, when he came to see ATT Koulouba "there is no military solution" to the conflict in northern Mali.

But after the defeat of the Malian army, when the superiority of Ansar Dine and AQIM on the strengths of MNLA has become obvious, yet it is French diplomacy which alert on "Islamic danger" to the UN and provides support to ECOWAS for a possible military intervention in the north while turning its sub-regional networks in Mauritania, Burkina for a chance to bargain with the MNLA and give his violins with Algeria "essential partner" in the case of northern Mali.

So I do not know if it is in diplomacy with variable geometry, but "the best of us" according to Jacques Chirac, Juppe what we must explain how "there are no military solution" and simultaneously support a possible involvement of ECOWAS.

RFI for the outpourings of women in Kati, and the violence that followed in Bamako to denounce the management of the war by ATT, "It would be very difficult for ATT to face two fronts simultaneously" north and south .

Curious announcement, when we know the risks "of new Tuareg rebellion" in northern Mali have been announced by the same Rfi since November 2011, more than two months before hostilities began on 01/17/2012.

The ambassador of France in Bamako was among the first to make the trip to Kati, after March 22, 2012 to meet Captain Sanogo.

Again curious approach and a symbol for the representative of a country that has championed democracy in Côte d'Ivoire a sudden bombing helicopters.

My dear friends and was, Sarkozy's Africa policy during his only five years, the Sarkosie.

Shock wave to electro


They suffer from electro-hypersensitivity and found refuge in Fontenois, one of the few white areas in northern France. Unable to buy the house they rented, they will soon find themselves exposed to the (bad) wave of the modern world.

"Uh, you are sure of turning off your mobile? Because I do not feel very well here ... "The hand on the belly, Christine Duchateau almost apologizes for asking this question. And without even looking, the Belgian demonstrates the outset that it is a real wave detector. At 42, she had to leave husband and children to live away from these programs which are rotting his daily (see box).

Like her, they are a handful to have found refuge in a large house Fontenois, a hamlet of Saint-Pierremont. All are electro. They say they are allergic to WiFi, the phone and sometimes the electric current that trigger their headaches, dizziness or irregular heartbeat ...

To escape these bad vibes, some lived in caves, caravans or even a tent.
It took nearly five years Eric Els Bulsman for tracking down this haven of peace. The Dutch had started his cross country in search of white areas (1).
In vain. Then it was Belgium. "There were a few small spaces but little to sell and it was mostly too expensive."

Eric will fall back on the north of France and discover LA gem. An old cottage in the heart of planted eight acres of parkland. Away from power lines, masts and even a hypothetical WiFi box.

"It was the perfect place, explains Christine. Surveys conducted show that there is almost no radiation. Which is very rare. In addition, there is plenty of space, it was for sale and it was located between Brussels, Paris and Utrecht. "
For these electro northern Europe, this discovery is unexpected.

Gas leak Republic Square


So he dug up the Republic with an earthmover, for the installation of sewerage systems, the driver of a vehicle was inadvertently clipped a gas line on Friday morning.

The security services were immediately alerted. 30 to 11 h, the local police brigade reinforced by those of Capelle and firefighters have established a security perimeter. Local residents were confined to their homes. In school holiday period, there was not the outputs of the normal schools of that place. Children attending the leisure center are output from the street Lavisse.
Around noon and a half, a team of GRDF dispatched to remedy this problem stopped the leak before repairing the network. Local residents were not evacuated, the leak located remote from any dwelling. A distance considered reasonable.

St. Clair worthily welcome the Tour of the Channel


The sun was part of Thursday for the start of the 48th Tour de la Manche given 13 h 30. With 144 riders at the start, this event mobilizes significant logistics around organizing committee, its officials and commissioners, the security officials, team leaders and many vehicles.

Jean-Claude Braud councilor and cycling enthusiast and Maryvonne Raimbeault, Mayor, have missed the opportunity that presented itself to them to organize their departure in 2012 while the selection of the city to that of 2013 was already . But significant work networks were planned in the borough; "and the first days of January and the streets were crowded dug gear, but the work was completed on time thanks to the mobilization of all and conditions favorable weather, "said Jean-Claude Braud at the welcome party organizers and officials.

Population, associations, traders, artisans and many volunteers were mobilized. Officials of the organizing committee unanimously praised the quality of care and organization with a village shop windows and decorated. Symbol of the involvement of volunteers, Odette Martel came to the podium to explain the departure that she "had 4,500 pink crepe paper."

The cycling champions of yesterday

Former champions came on the start line to greet the runners. Thus the local Raymond Delisle who was champion of France and participated in 12 Tours de France, winning two stages, Serge Pacary which was shortlisted for the Olympic Games in Mexico in 1968 and ran the Run for Peace, Eddy Seigneur winner stage of the Tour Champs Elysees in 1994 and now in charge of a team on the Tour of the Channel.

Road safety: the status quo, it is now


Interviewed by the FFMC, the FFM and Codever (read MNC February 24, 2012), most candidates had provided answers more or less convincing (read MNC from 6 April 2012: the candidates' answers). Like most of its competitors, Francois Hollande had not responded specifically to each item of the questionnaire, a letter preferring rather general and no real commitment to change.

Interior or Transport?

While Nicolas Sarkozy had placed the Road Safety under the responsibility of the Ministry of Interior, showing the repressive side he gave to his policy since 2003 with the proliferation of speed cameras, Francois Hollande did not comment on his reinstatement clearly Ministry of Transport.

The question was relatively simple: "if you are elected (E), will you commit to return to the Road Safety within the Department of Transportation or under the auspices of Prime Minister YES / NO".

Brassard fluorescent

Asked about the mandatory wearing of a "retro-reflecting device" on a motorcycle, the new president had preferred simply zap the question ("if you are elected (E), will you commit to review the decree in consultation with user associations and in the future to really involve them in decisions that affect them? YES / NO ").

Maintenance and monitoring of compliance

Concerning technical control, Francois Hollande establishes a subtle distinction between a "maintenance and monitoring compliance of vehicles based on networks of dealers and professionals performing maintenance mopeds," which seems preferable to "the creation binding of a technical inspection and expensive for users. "

"It's a question worth, too, to be studied," concludes the new tenant of the Elysee while again, the question was very clear: "If elected (E), you commit able to bury this complicated, expensive for users, and no measurable positive effect on road safety for 2WD YES / NO ".

Francois Hollande's advisers will they listen to more bikers than its predecessors? The road safety policy of the new socialist government does take better account of the specificities of the motorcycle and scooter? The road users (including drivers) they finally cease to be so disempowered and patronized?

Nothing is less certain, since the turn of repression in recent years was initiated in 2001 by Jean-Claude Gayssot, Communist Transportation Minister Jospin government (read MNC including the October 26, 2001: Mr. Gayssot officially installed the National Road Safety) ... A follow-on Motorcycle Net.Com: stay tuned!

2012年5月4日星期五

Testimonials: You and security software


Since Snow Leopard, the words "virus" and "malware" are no longer taboo at Apple. But in your case, you use specialized software Internet security? It was the subject of our last call witnesses. For security applications could be heard to counter the virus and malware or those that attach to monitor communications network, such as Little Snitch and Hands Off!. Not to mention that OS X has some security settings as standard.

Leaves to go against the grain of popular belief, Mac users - at least those who shared their experience - do not sweep all of the back of his hand the problem of security. Can be divided into three main profiles the testimony given. First there are those who defy any protection. Then follow those who are concerned about, but at least, with essentially a firewall installed, this seems to be widespread. Finally the smaller group, which has installed anti-virus or who has established quite drastic procedures vis-à-vis their Internet use.


Guess Trend Micro retains full security for its data center and its client


In order to secure its operations, the famous fashion brand Guess has opted for innovative solutions from Trend Micro Inc.. This choice reflects a desire by IT staff to spend less time to countering the threats. On the other hand, managers can curb the threats upstream into the cloud, while the employees do not have to worry about security and can focus on their heart of business.

Over the past 30 years, Guess has established itself as a world leader in the fashion industry and imposed its brand by designing and marketing a wide range of products: clothing, leather goods, watches, shoes and other products for the general public.

Guess the brand has more than 1,500 outlets worldwide. IT management for the Group, the challenge was: to manage an international multi-site from a centralized data center, to ensure compliance with PCI and curb the existing and emerging threats. If the world of fashion can be complex, the IT department of Guess nevertheless wanted a safe simple and easy to manage. Trend Micro has designed a security architecture tailored specifically répondand to all business needs.

First stage of the project

Trend Micro ™ Threat Management Services has allowed Guess to identify and analyze vulnerabilities and security throughout their infrastructure, to precisely define the necessary improvements to their security tools. This process of discovery and successful collaboration with Trend Micro also encouraged to switch to Guess Trend Micro ™ Enterprise Strategy, a portfolio of products targeted at different security issues:

• Endpoint Security (Trend Micro ™ Enterprise Security for Endpoints, with the flagship Trend Micro ™ OfficeScan ™ to protect workstations and file servers)

• Email Security (Trend Micro ™ ScanMail ™ for Microsoft ® Exchange)

• Firewall (Trend Micro ™ Intrusion Defense Firewall)

• Management and monitoring of security (Trend Micro ™ Control Manager ™)

Second stage of the project

More recently, Guess has deployed Trend Micro ™ Deep Security, a security solution that protects servers, operating systems and data on physical servers, virtualized and cloud. Trend Micro Deep Security provides multiple benefits to Guess:

• Increased confidence in the ability of companies to thwart threats.

• Compliance with PCI, with a ready to use protection, strong multiple security features.

• An easy to manage security, and not burdensome.

• Successful completion of tests particularly harsh.

• Flexibility and ease in changing the rules and levels of protection, to have a security policy in line with the business of the group.

• All the benefits of virtualization within the data center, with a security solution that protects physical and virtual servers.

"Every year we appeal to security experts asking them to test the effectiveness of our security. We migrated the security of our client to Trend Micro OfficeScan, and experts have been impressed with the functional qualities of the solution, "said Scott Forrest, Director of Networks and Infrastructure at Guess. "The second year, these experts already knew OfficeScan, and, again, they highlighted the leadership of this solution in terms of endpoint security. Since we deployed Deep Security, they can no longer be listed on servers protected by the solution, which reassured us still more about the relevance of the solution. "

China: Chen Guangcheng, Ai Weiwei, the ace of political communication


The blind lawyer Chen Guangcheng, as the artist Ai Weiwei, belong to a new generation of Chinese dissidents who became ace of communication in defending their cause with new technologies and provide more of a headache to China.
There are over 20 years, students in the "Beijing Spring" May-June 1989, Wang Dan, Chai Ling and Wuer Kaixi, is époumonaient in their megaphone in Tiananmen Square.

On the night of Thursday to Friday, it was thanks to mobile phones that Chen Guangcheng, from his hospital bed in Beijing, could have a voice directly to the U.S. Congress in Washington, in full hearing on his case, and appeal with the Secretary of State Hillary Clinton.

His phone call to a friend attending the hearing was broadcast and translated, in front of elected officials, journalists and an audience who had never seen that.

"It's unprecedented," notes Willy Lam, Chinese University of Hong Kong. "There will be other attempts to contact dissident politicians, not just the U.S. but in Europe," he predicted.

Meanwhile in Beijing, so a little ridiculous, many Chinese policemen in uniform and plain clothes stood at a distance in front of reporters huddled Chaoyang Hospital to prevent them from trying to talk to Chen Guangcheng, confiscating here or there cards release. Routine.

Already last Friday, fell while the new shock escape of his house very guarded, the blind activist, which only a few accomplices knew where he was, spoke directly - bold snub - Premier Wen Jiabao in a video posted on the Internet.

This 15 minute video, posted on the overseas Chinese website Boxun, then quickly on YouTube, has been seen worldwide. The civil rights activist described the Prime Minister to his ordeal at the hands of the henchmen of the regime, sanctions and demanded security for his family.

"It was the first time we saw a direct communication with senior management, the impact is very strong," Judge Willy Lam.

Chen Guangcheng is emblematic "of its defenders human rights endowed with technology and media" and are "becoming increasingly effective in getting their message across," said Phelim Kine, the organization Human Rights Watch .

"This is the Chinese activism 2.0," said the researcher, referring to the interactive technologies of the Internet.

The first pictures of Chen after he left the Embassy of the United States Wednesday made the "one" of the international press.

Before Chen, the artist touches-on Ai Weiwei has given trouble to the Chinese authorities also extensively using the Internet.

Last month, the eternal thorn in the communist regime had to cut 46 hours after the webcams he had installed at his home in Beijing to deride the constant supervision of which he is subject.

"Ai Weiwei has been the pioneer in this area," said Phelim Kine, "it has a global audience and has great expertise with the technology."

"He showed how one can defy militant, and in some cases thwart the censorship imposed by an authoritarian regime".

Thanks to the internet, he could mobilize 30,000 Chinese, and collect a huge amount requested by the tax after receiving an adjustment, intended by him to punish him for his too great freedom of speech.

Ai Weiwei currently publishes twenty tweets per day.

On Weibo, the Chinese equivalent is the game of cat and mouse between activists
and critics.

Chinese activists of human rights "have become increasingly creative," said Kine. "Social networks like Weibo have made it possible for a new generation of activists to create virtual communities (..) and to defy the censors in a way that was unthinkable before."

Close friend of Chen Guangcheng, Hu Jia and his wife Zeng Jinyan, were among the first to use social networks that have actually taken off the past two years.

It is on Twitter Zeng said Wednesday that his house arrest.
By pushing more and more lines, Chen and Ai Weiwei will certainly inspire other militants.

But "we can not say that the Chinese Government is losing the battle," Kine said, referring to "huge human, financial and techologiques", made by China to clip the wings of the militants.

Chen after the affair to them "lose face, Chinese authorities will strengthen the crackdown on dissidents," predicts Willy Lam.

China will use nanotechnology to improve the security of electricity network


China will accelerate the industrial use of a new material developed using the nanotechnolgie to ensure the safety of its power systems, said a statement issued by the National Center for Nanoscience and Technology (CNNT).
The CNNT said the matter had been tested and extremely strict and technical assessments would be used to solve the problems of flashover (flashover lightning), that are recurring problems on power systems of China.

Other projects on the use of this new material in the research phase and would be implemented on a large scale, has informed the CNNT.

This material was created in 2009 after three years of research by the CNNT, Institute of Process Engineering under the Chinese Academy of Sciences and the Institute for Research on China's electricity.

Volvo employees curious uses of BYOD


Almost nonexistent two years ago, the phenomenon of Bring Your Own Device affects a growing number of companies. Volvo IT, Volvo Group's IT subsidiary has established a policy that meets the success BYOD. Their advice: progress step by step.

With a total estimated at 25,000 mobile laptops out in the automotive group Volvo, Volvo IT - the IT subsidiary of Volvo - decided, for users who wish to implement a policy of BYOD (Bring Your Own Device ).

Volvo users can therefore, if they want, access to the main office type applications the company on their personal mobile device. The system is running IOS, Android or Windows Phone.

Volvo IT supplies IT services to the Volvo Group, which has 82 000 employees. and other clients. Volvo, however, represents the bulk of income of Volvo IT, or 82% of sales. Volvo IT employs 5,500 staff across 35 locations worldwide providing services to over 120,000 users.

Security data and network protection, Volvo IT has set up a connection system which at its first connection to applications, the user chooses a password. This serves to protect access to content on the device. In case of loss or theft of the unit, Volvo IT has the ability to remotely delete data on enterprise applications via a grip applications on the device.

For now, the terminals can not access the WiFi Company and shall be equipped with an unlimited 3G connection. But a plan to open a dedicated WiFi network to smartphones on each band's website via secure access is in progress.

Employees must apply to access this service, and word-of-mouth is very good. It is thus nearly 12,000 mobile devices that are registered for this service, including personal devices since 8000 in September 2011, date of service launch.

The new Blue Coat PacketShaper is available


Blue Coat Systems, Inc.., Provider of Web security and WAN optimization, today announced the release of version 9 of PacketShaper, the new version of the operating system for appliances Blue Coat ® PacketShaper ®. This solution is the first market to provide visibility and control capabilities at the network, applications and content for "opaque networks' IPv6, so far, worked undetected on corporate networks existing IPv4. In addition, this new software provides a scalable performance up to 8 gigabits per second (Gbps), which can meet the increased demands on their networks, both video and other rich media downloads software for large volume of traffic or other applications on networks.

Visibility and control of opaque networks IPv6

With the proliferation of devices and services for WAN technology IPv6 traffic over IPv4 networks business started well before the deadline for transition plans. This creates new entry points for potential security threats and generates compliance issues. Many companies have already IPv6 access through their ISP. A wide range of content currently available on IPv6 from suppliers such as Netflix, YouTube and through applications Peer-2-Peer (P2P). In parallel, many desktop and mobile terminals (mobile phones or tablets) are fully compatible with IPv6 technology. These terminals are publicly addressable and operate outside of traditional security configurations. Sometimes employees use these opaque networks to share files, download video, accessing pornographic content and conduct other activities on the network that are otherwise prohibited by company policies.

Version 9 adds to the PacketShaper classification engine in real time the most powerful current market visibility into IPv6 applications and content with a granular knowledge of over 700 applications and tens of millions of websites listed in 84 categories content. PacketShaper appliances are tools increasingly valuable to companies allowing them to understand the application traffic on Internet gateways and WAN links, manage application performance on these networks and detect security threats and compliance issues.

Opaque IPv6 networks increase the risks and compliance issues

Without visibility and control of content and applications IPv6, companies face security risks and compliance issues related to unauthorized traffic and new security threats potentially very effective. Cybercriminals begin to use opaque IPv6 networks as a gateway to access the stolen business networks and provide communications links to malware already installed and computers whose security is compromised after being infected with botnets.

PacketShaper version 9 software allows companies to observe the internal and external IPv6 traffic on a granular base and implement specific controls to the application or content. PacketShaper appliances can identify security risks and IPv6 and enable companies to take the necessary precautionary measures to mitigate the potential threats earlier.

The performance offered by this new version doubles the power of PacketShaper appliances with current scalability that meets the new requirements of the networks induced by rapid traffic growth. Deployment of a corporate data center to another can now reach 8 Gbps and deployments of Internet gateways and core corporate WAN can reach 3.5 to 5 Gbps of aggregate throughput. This scalability allows companies to manage policies most advanced quality of service and network monitoring based on the application and the different sites, thus optimizing the use of a PacketShaper appliance to centrally manage virtually the different branches.

The PacketShaper software 9 is also distinguished by a very fast reaction time of the user interface, with an overall increase in reactivity multiplied by 10, making it highly interactive. The new interface integrates better workflows and works with all platforms PacketShaper.

IS security: Barracuda Networks highlights the dangers of "3C"


At the technical conference of Barracuda Networks, which is being held in Munich, representing about 180 security experts from 25 countries, Wieland Alge, general manager for EMEA editor, warned against the main dangers watch Enterprises: Cybercrime, Consolidation and Cloud, ie the "3C".

Since the inception of the Internet has changed the situation. If there was once enough to say that there was not only to connect to does not have a problem, it becomes impossible to do without the Internet today and be content to think that the "bad guys" are only on the other side of the pipe. Wieland Alge also notes that if the spam has declined since 2010, targeted attacks are, they, in constant increase.

It explains the phenomenon by lower revenues from spam and cyber-criminals moving to more lucrative operations. In parallel he sees appear blind optimism of users who think they can manage security risks while feeling super administrators but minimizing the risks they face. Moreover, he believes that this type of defense on the perimeter is totally lost cause. He plans to place elements of control over key points in the network, especially in front of the data, to check application flows and access to applications while maintaining centralized administration. He also sees a part of the answer to avoid the nightmare of BYOD in companies.

The simplification brought by the consolidation and the mirage of the all-in-one UTM as the risk of deadlock. It is estimated that the combined technologies in these appliances are often too remote to be properly integrated.

Cloud asks him different problems including a diffuse anxiety due to his part a bit mysterious in the use of technology. He admits, that like the Internet, that its advent is inevitable, it must be considered carefully, even if it brings new opportunities to deport as servers in environments capable of dealing with powerful attacks Denial of service (DDOS). The other aspect is to force companies to rethink their security processes.

Mobility as the next strategic focus

Faced with these challenges, Barracuda Networks has redesigned its product line. Today the supply is characterized by an expansion of capabilities on land larger than the firewall and intrusion prevention by taking elements of network quality of service (QoS) and control the issuance of application (Application Delivery).

Steve Pao, vice president in charge of product development, confirmed the next steps in the range to take better account of terminals and mobile applications. Paul Judge, head of the research laboratories of Barracuda Networks, said that for an hour spent on the Internet, users spend more than 13 minutes on social networks.

Karachi: declassified documents soon?


Related to the attack in 2002, they could soon be viewed by the judges.

Nothing is yet decided. The Advisory Committee on secret national defense has given a favorable opinion Friday to declassify 65 documents Matignon, Foreign and Defence relating to financial aspects of the court record of the attack in Karachi, May 8, 2002. Eleven French had been killed. Despite this progress, only the relevant ministries decide to declassify-defense on the documents requested by the judges. Europe1.fr an update on the significance of this decision.

What does the defense secret? The term is used to describe a government document or military that involves national security. "May have a secret character of national defense [...] processes, objects, documents, information, computer networks or files concerning national defense that were the subject of protective measures to restrict their release or access", said Article 413-9 of the Penal Code. Access to these items classified by the Elysée, Matignon and other ministries is limited to a few people. Since the Act of July 29, 2009, the defense secret is expanded to twenty locations housing the classified documents, including intelligence and espionage against.

There are several gradations: the confidential defense, defense secrecy and finally the very top secret. Military secrecy itself covers wiretapping, technical specifications of military equipment, special contracts, discussion boards authorizing arms sales.

Who decides the lifting of military secrecy? The Advisory Committee on secret national defense has only advisory. Created by the Act of July 8, 1998, the independent administrative authority is seized by an investigator who wants access to classified documents for his investigation. It decides on requests for waiver of defense secret but only the minister who ordered the ranking may decide to lift it. So far, the CCSDN issued about 180 notices that three-quarters in favor of declassification. They were followed in their nearly all the authorities concerned.

Who requested the declassification? The investigating judge Renaud Van Ruymbeke filed these requests to the Prime Minister Francois Fillon, the foreign minister Alain Juppe and Defence Minister Gerard Longuet in March. This judge is charged with Roger Le Loire open information for "misuse of corporate assets, complicity and concealment" about two arms contracts, one of which is linked to the Karachi attack.

What documents are affected? In its first opinion issued Friday, the CCSDN gives a favorable opinion to the declassification of 39 classified documents from the Ministry of Foreign and European Affairs. The second, concerning the Department of Defense, gives a favorable opinion to the declassification of six of the eight documents requested by the magistrate. However, it is unfavorable to the declassification of two sheets of 21 February 1997.
A third opinion, also requested by the defense, ruled for the declassification of sixteen of the seventeen documents submitted to the opinion of the CCSDN and for the partial declassification of a note dated 24 July 1998.
Finally in a fourth one, the CCSDN proposes declassifying four of the seven documents requested by the judge to the Prime Minister. It issues a partially favorable opinion to the declassification of three documents: a memorandum to the Director of the Prime Minister of 26 November 1997, a memorandum to the Prime Minister by the Secretary of National Defense December 22, 1997 as a result of a meeting four days earlier, of the Interministerial Commission for the Study of exports of war materials (CIEEMG), reported on February 18, 1998.

Fifteen have already been given notice by the CCSDN in this folder. Two-thirds were in favor of declassification, the third being partially favorable or unfavorable.

Who is indicted in this financial aspect? Ziad Takieddine, through the Franco-Lebanese arms contracts concluded in 1994, was indicted on three occasions, the last of which dates back to April 24, for "complicity and the misuse of corporate assets" and "money aggravated ".

Thierry Gaubert, the former adviser to Nicolas Sarkozy was indicted Sept. 21 for the misuse of corporate assets.

Nicolas Bazire, Chief of Staff of Edouard Balladur and close to Nicolas Sarkozy was indicted Sept. 22 for complicity in misuse of corporate assets.

Finally, Renaud Donnedieu de Vabres was indicted December 15 for "complicity in misuse of corporate assets".

Now what? The ball is now in the camp of the future government. After the second round of the presidential election, all departmental wallets redistributed. However, only departments with classified documents requested by the Judges may decide to waive the defense secret. If Nicolas Sarkozy was elected Sunday, it will change the government within 48 hours, he said Friday on Europe 1. The decision could therefore be made very quickly. But if Francis Holland wins, the new government will be appointed as mid-May, when he takes office.


Internet safety: attention to public WLAN


Today there are WLAN Hotspots in all urban areas. But no one should surf with confidence, because foreigners can steal data.
Morning at the hotel, be repatriated quickly emails and later coffee, we read his messages on his laptop: thanks to the Wireless Local Area Networks, known by the abbreviation WLAN or WiFi, surfing when you are on the move is no longer a problem. Yet, a WLAN Hotspot urges caution, because data thieves operate there freely.

Caution required

Open to the public network, most of the time, various unknown users are active on a network, either with a smartphone, a netbook or a laptop. Thanks to the radio link, they get all access to the Internet, provided by the operator of the Hotspot. It is easy for hackers to intercept data or access to the mailbox or to the websites of online sales, because the connection is not encrypted, the data is sent in clear text.

What is important for user safety, it's not necessarily that the WLAN is encrypted or open. A network as safe as standard WPA2 protects from hackers, only if they want to enter the network from outside. Instead, all users within the network have received the data access: the vacationer who, at the next table, called home via VoIP, the blogger table below, or young in the corner, who are active on social networks.

2012年5月1日星期二

Unable to go to 192.168.1.1 or 192.168


Hello, I have a problem, I tried to open a port with my router D-Link DI-524 then in the address bar I type 192.168.1.1 (I have firefox) it puts me
A timeout

The server at 192.168.1.1 is taking too long to respond.

The browser has waited too long when connecting to the site and stopped to wait for a response.

* The server may be overloaded or temporarily down? Please try again later.

* Other sites are inaccessible? Verify the network connection of your computer.

How little I know if it is installed? x) what I know is that there are three home computer with Internet.

If they had tried to force me to talk, I let them have said nothing


Reached by telephone, Hu Jia told on Monday morning April 30, Le Monde, the detention of 24 hours between Saturday afternoon and Sunday afternoon, after meeting the previous days, with Chen Guangcheng, the blind dissident refugee at the U.S. Embassy since Thursday. Aged 39, released in June 2011 after three and a half years in prison for "inciting subversion of state power", and always deprived of political rights, but he considers Hu Jia is free to speak, on social networks, or in the media, because it's "constitutional right".

Two intermediate helped Chen in his flight: an intellectual Beijing, Guo Yushan, and activist based in Nanjing, He Peirong. Both are currently unreachable and were arrested. The first anime Transition Institute and the NGO had participated with Chen Guangcheng to investigate the violence of the one-child policy in Linyi (Shandong) in 2005. He has continued to support the dissident is blind and had published in 2011, a petition consists of several video messages of Chinese intellectuals calling for his release.

He Peirong (whose nickname was Pearl on the Internet), a young English teacher in Nanjing has a passion for the cause of the lawyer barefoot. She has traveled several times around the village of Dongshigu, home to Chen and his family, organizing a "web monitor" of his clashes with the guards through the surfers who were harassing the local police to force it to intervene. It was she who went to get Chen to Dongshigu after he scaled the wall of his house Sunday before joining a hiding for several hours. The guards did not notice his escape for several days.

You were arrested for twenty-four hours, how was your detention?

I was taken Saturday to 17 h 30 (on their paper, it says 17 h50), and released at 17 h 50 yesterday afternoon [Sunday]. I was taken to the police office Zhongcang, Dongcheng District in Beijing, but in fact it is the general division of the State Security in charge of the operation (to me they have not said, but I heard their conversation). Their goal is to know when Chen Guangcheng Dongshigu left, how he was found, where he was lodged in Beijing, when he entered the U.S. embassy and when I saw it.

How were you treated?

Initially, they were not very polite. They were two members of the criminal police who interrogated me. They called me for a matter of public safety, but they send police to the criminal! They came up with the arrogant, talking to me like they made me the lesson. I-cons attacked and they calmed down gradually. I have not been tortured, but they have not given me rest when I have cirrhosis and I need to lie. When I learned that the investigation was extended to 24 hours instead of eight hours, I asked for a rest. They were not in agreement. I threw my hat on their desk.

Eventually I found a lounge chair in the corridor on which I slept for 3 hours, no more. But it was cold in the hallway, the lights were on, there were many passages, I have not really been able to sleep. This deprivation of the right to rest is also a form of torture. They asked me for the other [the network]. But I immediately said that Chen was a free citizen, just as He and Guo Yushan Peirong [the two other activists who organized the trip to Beijing Chen Guangcheng].

The general division of the State Security also considers that no law was violated since the departure of Chen Guangcheng Shandong until its entry into the U.S. Embassy. The public authority can not intervene in private law. That's why they lacked solid grounds to question me. So they explained that it was for the "intelligence" and "confirmations". Even if they really tried to force me to speak, I could not tell them. And if I was not forced.

A question surprised me is when they asked me "When is that Chen has been the U.S. ambassador Gary Locke?" "Were you present when Chen Guangcheng saw Gary Locke?" I do not know if that means that the security agents have sources who confirm that they have seen, or if it's just false questions to test me. Since Thursday afternoon, Chen has taken refuge in the American Embassy because it was discovered this afternoon there with Guo Yushan. There was even a car chase. I'm just passed the embassy Friday, but without entering it. The police followed me, so they know it, and it's a stupid question.

In principle you are still deprived of political rights since your release from prison in June 2011. What does this mean?

They told me they summon me because I violated the regulations of the period of deprivation of political rights to which I am compelled. I would not be interviewed by foreign media. They told me that I was interviewed by Radio France-Internationale, while I gave at least ten, even twenty interviews.

I told them that this constraint of not being interviewed by foreign media comes from the Criminal Procedure Code and the regulations of the Ministry of Public Security, but that the Constitution states that I have the right to speak, to criticize , to reveal what I want. I have the right to bring to light human rights abuses by the Chinese local government for example.

Do not you fear reprisals if you continue to express yourself?

I spent three and a half years in prison. I did not want to return. But at the same time, after passing through all that, I'm not afraid anymore. Of course I do not feel well physically, but even if they hold me for a fortnight, compared to 277 days that I experienced in prison, that's nothing! What worries me the most is my wife, my daughter and my mother. They are fretting for me for almost ten years.

The day before yesterday, when I was taken, my daughter saw what was happening. She asked, "Where is he going Dad?" My wife told him that I would have fun by the river. She replied: "That's not true!" We can no longer lie to her. When I was in prison, my wife said to him whenever they visited me, that Daddy was in a kindergarten for adults. She replied: "He has only to change clothes. Then he can go with us". No one had explained to him, but she understands herself. I'm really scared to create a shadow on his heart.

How was your meeting with Chen?

The police asked me when I saw Chen Guangcheng. But they were not interested in the content of our conversation. When I saw him, I was so excited that I still tremble at the thought. He hugged me so hard that it lifted off the ground. Despite his illness: he has blood in the stool since 2006 and has not been treated after his release from prison [September 2010], we are all afraid that it turns into cancer. I also saw injuries on her legs and her body. But his mind is still extraordinarily strong and keeps courage.

Have you heard from Yushan Guo and He Peirong, who helped Chen to escape from home?

I have not managed to contact Guo Yushan He neither Peirong. I am very worried about them. To me, they have not violated any law. They [security guards] have no reason to restrict their freedom. I know this is what is worse, of being "disappeared": I tasted the "disappearance" for forty-one days [in 2006]. I was treated very badly during this period.

Peirong He has been missing for 11 h 10 Friday morning, this is already sixty-two hours. I contacted Guo Yushan for the last time to 22 hours Friday night, then he no longer had a sign from him since Saturday morning. Guo Yushan was followed since Thursday afternoon. He lived in hotels do not have any problems. I greatly admire what they did. They are true brothers.

When Peirong He learned that the phone was turned off by Guo Yushan, she sent a tweet Friday morning to take upon herself the whole responsibility for the operation, knowing all the risks it runs. For his part, to protect, Guo Yushan sent messages via friends saying it was he who organized everything, and it had nothing to see inside!

Unable to connect to the address http://192.168.1.1


Question:

I can not connect to the following address http://192.168.1.1

Answer:

Is that your router denies access, in my opinion you should not be in if there is an ethernet driver ethernet problem or misconfiguration of the ethernet card. Made a reset of the router to see. Your router you have you given it an ip address gender 192.168.1.n? This will avoid you to reset to nothing.

2012年4月30日星期一

Online trading, news and of course online trading


Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, has been selected as a finalist in the category "Best contribution to sector R & D for LTE" by the jury of the LTE World Summit. Organized by Informa Telecoms and Media and evaluated by an independent panel of network operators, this award focuses on the major contributions to the advancement of LTE.

This new recognition reaffirms Gemalto's commitment to innovation, with an investment of over 150 million euros in research and development in 2011, drawing on the expertise of 1,500 scientists digital systems that account the company worldwide.

Advanced Connectivity Solution Gemalto for LTE networks is based on its versatile platform LinqUsTM Advanced OTA and its UpTeq LTE subscriber module, integrated software for data retrieval from single secure Gemalto. This feature allows it to perform automatic updates data on the UICC, to guarantee a success rate of 100% of downloads and activation-sensitive applications, including M2M subscriptions, payment applications to NFC scale and login to video content streaming on LTE networks.

The efficiency of carrier-grade OTA platform Gemalto has already proven in the field through several commercial LTE deployments of high-level notammentavec Verizon Wireless and Metro PCS in the United States.


Pb with Inventel Livebox (Orange): 192.168.1.1 = Aol box!


I need your help for a pb I for several days.

I have a Livebox Inventel (Orange).

I had no connection for a week. I called Orange customer service that made me do a lot of manipulations, including going to the 192.168.1.1 page. and the problem is that this is not the home page of the Livebox but it appears that a AOLBOX.

I never subscribed to an offer of this operator and have never installed anything from home!

I went to menu "regedit" and deleted various files without success.

After 2:30 of manipulation with Orange, they made me do a restore which allows me to reconnect to the internet.

Page 192.168.1.1. always displays Aolbox however.

Following the manipulations with Orange, my phone stopped working. I had to phone

Orange again who said that the pb comes from my computer and they can not do anything until I have not fixed that.

I made a good antivirus and I used Spybot Search and Distroy unsuccessfully.
This pb is it already happened to somebody?
What do you suggest I do??

In advance thank you to all who can help me ...

Unable to open the link http://192.168.1.1


Everything is in the title. I click on my shortcut to the LB, the header is displayed (so the link is good) then nothing.

In addition a number of things déconnnent since installing the new firmware: more frequent reboots, the line being busy, etc..

Am I alone in this?

thank you

avt faitre of a factory reset, begins a reboot of the mini by pressing the button in the back.

Again and again and yet again if not always.

Reset as a last resort, last.


2012年4月27日星期五

Facebook improves its security with the best antivirus


More precisely, the number 1 social network has chosen to add to their lists of these blacklists to block links publishers pox.

Specifically, the links are shared on Facebook screened a database that includes thousands of sites to better protect its syphilitic some 900 million members.

Alongside this announcement, and its agreements, Facebook launched Marketplace, which offers an AV to download trial versions of antivirus partner publishers.

In PS, the battle of "Valls" cons "Rebs" Indoor


No luck. Moving in Moselle, Francois Rebsamen, head of the security division in the team of Francois Hollande, could not attend the meeting between the applicant and representatives of PS police unions, Thursday, April 26. Claude Bartolone, President of the General Council of Seine-Saint-Denis, and Manuel Valls, they have not missed the call. The communications director of Francois Hollande was sitting right next to the candidate, who consulted regularly.

What was the communications director in a meeting with the police? "We must not see malice," says Mr. Valls. He swears, he led the meeting in all loyalty and "related Rebs" who prepared the event, while conceding: "I have some expertise in this area ..."

"Valls" cons "Rebs" although Mr. Bartolone has not abdicated, the struggle to don the uniform of the first cop of France, between those two, takes a turn more intense. Both men have long shared a safe fiber reinforced by their experience as a local.

"NETWORKS JOXE"

Both are great connoisseurs of police networks. But not the same. Despite the involvement of all the moments alongside the candidate, Mr. Valls still occurred very recently, after the first round, union officers and senior members of the gendarmerie. He toured all organizations except Alliance, the second union of peacekeepers as being too tied to Nicolas Sarkozy. Former chief of staff of Pierre Joxe, M. Rebsamen, for its part remains close to Joaquin Masanet, former Secretary General of UNSA-Police, the former CEO of the National Police and Patrice Bergougnoux "Joxe networks" that now consider some less operative than in the past.

What annoys the highest degree the president of the PS group in the Senate. "It is very unpleasant to hear as well from someone who has left the image of a large interior minister who has modernized the national police. But between the alleged" Joxe networks "and" networks Bauer "I chose," he tackled in an interview at the agency specialized FEA Security, Thursday, April 19. A thinly veiled allusion to the proximity between Manuel Valls and criminologist Alain Bauer, the godfather of one of his children.

To prevail, the image and reputation count. The question of confidence, for this sensitive position, will also be decisive. Mr. Rebsamen is an old friend of Francois Hollande. But he had left to support Ségolène Royal, before returning to him. Mr. Valls, after playing the role of free electron for years, has become one of the key men of the presidential equipped.

"The campaign reveals," warned Francois Hollande. From this perspective, the mayor of Dijon has not necessarily scored points by proposing three days before the first round, to transform "the offense of cannabis in contravention". The measurement started from a good intention, that of reducing the number of procedures and ease the work of police officers. But was curtly rejected by the candidate.

Two agencies to regulate Tic


So far, based on the law of 14 July 1998 and the Decree on organization and functioning of the Telecommunications Regulatory Agency of September 8, 1998, Art was responsible for the enforcement of laws and regulations in the field of telecommunications.
She also played the role of arbiter on disputes in this sector. Since April 20, 2012, the agency will now perform the same work in the field of information technology and communication. The president signed a new decree on the organization and operation of the Telecommunications Regulatory Agency April 20, 2012.

Under this decree, the missions of Art are reinforced. Section 4 of the Decree provides that "the Agency provides on behalf of the State, regulation, control and monitor the activities of operators, network operators and providers of electronic communications services. It also ensures compliance with the principle of equal treatment of users in all enterprises of electronic communications. " By electronic communication, means any emission, transmission or reception of signs, signals, writings, images or sounds, electromagnetically.

Among its new missions, Art will ensure the implementation of laws and regulations regarding Telecommunications and ICT; ensure fair and healthy competition in the telecommunications sector and Tic; submit to the government, any proposals and recommendations designed to expand and modernize the telecommunications sector and Tic or to exercise any other public interest mission as assigned by the government in the area of ​​telecommunications and ICT.

To carry out its activities, the decree said it must work with the State Agency for Information Technology and Communication (Antic), under the regulation of activities related to network security electronic communications and information systems, in accordance with Article 7 of the Act on cybersecurity and cybercrime in Cameroon.

But on April 10, Paul Biya signed another decree on organization and functioning of the Antic. Under section 5 of this decree, the Antic, now under the tutelage of MINPOSTEL and Minfi instead of the Presidency of the Republic, is also responsible for "regulating information technology, communication and Internet ". Moreover, the Antic "ensures on behalf of the state regulation, control and monitoring activities related to security of information systems and electronic communications networks and the electronic certification, in collaboration with Art. "

Coercion
Regarding the powers of each agency, to Art, it is mentioned in Article 5 that "the Agency has the powers of regulation, control, investigation, injunction, enforcement and sanctions ". Antic's side, it is noted that it "has the powers of surveillance, investigation, injunction, enforcement and sanctions."

The Ministry of Posts and Telecommunications, is explained as the development of ICT, and Antic Art must work together: "The Antic takes care of the advantage of internet access providers (Isp) and their license. Complexity in Art is that it was she who gives the license for telecommunications, mobile telephony, for example. But today on the terminal, there is the telephone and the Internet. That is why the two are forced to work together. There is no risk of conflict of jurisdiction. "

Worksite safety: GrDF and Waters of Normandy slaughter their cards ...


Not a day without aggression! This is what emerges from the statistics provided by Gas Distribution Network France (GrDF) and Waters of Normandy. Each business day, pipelines are damaged or gutted on the networks of two operators at intervention sites. For reaching the target Zero, an agreement between the two operators has been signed. Cooperation, training and common sense ...
Aggression! Is a strong word, but this term sums up the feelings of the two operators in damage to the works under their management. Attacks which are not the result of incivility but of irresponsibility professionals uninformed or unconcerned about the regulation. "Once a company has to do road work, it must ensure that there is no network in the vicinity of any manager whatsoever. Then, just before starting its work, it must send to each manager identified a DICT (Declaration of Intent to commencement of work). This is what the law says, but in fact this is not always respected. With, the key to all the risks that we know, "said Bruno Gasquy, director of the Gas Network Unit Normandy.

"The first argument used by these companies is the lack of time". A false debate, said Jean-Christophe Famel, deputy CEO of Waters of Normandy, in terms of lost time and the risks it poses to the property and people not respecting the regulations. "Especially since there are specialized websites for these applications ..." says Jean-Christophe Famel.

This is evoking these common issues that the two companies decided to think together about how to reduce drastically, these inconveniences are not without consequences for investment. Thus, each month, GrDF spends a whopping $ 1 million only for those aspects of prevention and safety facilities (10,726 km network in Normandy, 300 employees, 7,580 km of monitored by 2 vehicles "sniffers").