2012年5月31日星期四
Security: a hotline to denounce police abuse
114 may be called at any time for free, from all telephone networks operating in the DRC. The number operates 24 hours 24 is made available to the public since May 29, to learn about the abuses committed by certain officers of the order. By launching this service, the General Inspectorate of the Congolese National Police (PNC) has recommended to all who live in the country and who will be victims of abuse from a police officer to call at any time and from any network.
However, the population was also warned against the false denunciations. "We must not falsely accuse the police. Do not use it to tell his life, "warned Gen. Constantin Mudekereza who urged people to make good use of this instrument available to him for his safety. He, cons, announced measures to protect the service against misuse. "The population has time to communicate his complaint and it will not abuse it, because we know when we can cut this communication," he warned.
Vice Minister of the Interior and Security, Aegis Kongoso, has, meanwhile, promised exemplary sanctions against PNC refractory to discipline and the laws of the Republic by this service because they are now under close surveillance.
A partnership with the UN mission
This service is a partnership between the PNC and the UN mission in DRC (Monusco). The latter will continue to help, according to officials of the National Police, in the monitoring of all the corners where the police would have behaved badly.
Monusco, by the head of its police, Wafi Abdallah, reaffirmed the desire to support the PNC in the process of reform of the security sector in the DRC.
Recall that another toll on 081 080 0012, had also been commissioned since 2011 by the National Network of organizations defending human rights in the DRC and the Joint United Nations Office for the right of the man to fight against all violations of human rights.
FireMon provides the first comprehensive solution for managing security posture of the industry
FireMon, a leading provider of solutions in terms of risk analysis and security management, today announced the launch of FireMon Security Manager 6.0. This major upgrade is the first solution for managing security policies and postures of the industry that fully integrates the comprehensive risk analysis to configuration management, application and control of network devices such as firewalls firewall, routers, switches and load balancers. This gives businesses, government agencies and providers of managed security services (FSSG) unparalleled visibility to understand the extent of the vulnerability of businesses and prioritize the proactive defense of critical assets, while being assured that their security infrastructure is devoid of human errors and inconsistencies between policies and protection.
The wave of discussion and excitement on the firewall of the new generation (PFNG) and infrastructure security has overshadowed a shocking lack of visibility regarding the domino effect of change - software patches to changes in access through the deployment of new systems - that can create vulnerabilities silent throughout a network. The staff responsible for daily security operations is challenged to understand the interdependencies in a quagmire of complex old and new hardware and software, and the implications and potential errors they represent. For example, last month, Medicaid and Social Security information of 780 000 citizens of Utah were exposed due to misconfiguration and access control ineffective.
Even for companies that have implemented some level of management policies / configurations, the deluge of data and the ability to trace the paths and assets at risk remains a challenge for many. The solution lies in the ability to identify, assess and address automatically change impact or a misconfiguration on controls and security policies in real time, and combine this with mechanisms that incorporate a comprehensive risk analysis to provide quantifiable and actionable information in order to focus on the most critical issues.
FireMon Security Manager provides policy management and configuration, as well as enforcement and monitoring of network devices including firewalls, routers, switches and load balancers while monitoring and alerting in case of configuration changes. Security Manager also assesses the current configuration settings and controls by comparing them with best practices and compliance standards - and offers extensive options to address configuration problems.
With the addition of a new patented motor Risk Analysis, Security Manager can now analyze the accessibility of any vulnerability to sources of threats, by measuring the impact, depth and the risk of a potential attack . The?? Integration enables Security Manager to evaluate, visualize and simulate attack paths across the network to help security teams to quantify risks and prioritize remediation. In addition to the vulnerabilities detected by traditional scanners Vulnerability Assessment (VA) conventional, Security Manager can also incorporate the results of penetration testing with Metasploit Rapid7 and proven performance to factors in its risk rating. Engine technology risk analysis, obtained through the acquisition in April 2011 the young company MIT Lincoln Labs, Saperix Technologies, is deployed for over a decade, is used in demanding areas of civil and Defense and technology is automated risk analysis fastest and most flexible on the market today.
Change management of firewall
The combination of new applications and new users, network evolution and new threats are a source of many evils for IT staff and security. How these teams should they then work together to eliminate the risk in environments in constant change?
By Mark Henry Guy, Regional Director EMEA AlgoSec.
"Our only security is our ability to change," wrote John Lilly, the American philosopher and physician. But talk to a security manager under pressure or a CIO, and they will tell you they gladly accept much less change if they got more security.
In other areas of IT, such as that of integrated enterprise resource systems, will continue to operate effectively, without major intervention for long periods of time. But security, each new hire, each patch or software upgrade and update each of the network open a security hole and increase the risk exposure of the organization. This situation becomes even more complicated in large organizations, which may have a mixed field of security including firewalls traditional firewall and next generation of virtual firewalls provided by different suppliers, all with hundreds of Thousands of policies and rules.
Then there is the rapid and unexpected, often requested by members of the Executive Committee to access resources or specific functions. In some cases, these changes are made in haste (after all, who can refuse a request for a supervisor because he wants to access, immediately, to the network with its new Tablet PC?), Without sufficient analysis of whether the change is authorized under the existing security policies, or creates a new source of exposure to risk.
If we add to these concerns the internal growing number of external threats, malware, social engineering exploits and hackers, it is not surprising that IT and security teams believe the change, although that inevitable, their launches many more challenges than they would like.
So how IT and security teams should they work together to manage change and better control the security issues associated with it? How should they deal with updating their infrastructure and their complex security policies to ensure simultaneously a better system availability and better security?
In the same boat
The first step is to ensure that IT teams and those of security work in harmony with each other. In many large companies, operational and administrative tasks can be performed routinely by different teams of those who deal with security risks and tasks. Although both teams generally tend towards the same objectives, the decisions of one can cause problems for the other - as in the previous example, the executive who wants to add its new Tablet PC to the network. Sometimes these situations can be handled in a hurry to get rid of them, with the intention to treat security issues later. But if the latter is crucial, it can be neglected.
It is therefore useful to recognize that these potential pitfalls exist and to implement measures to improve coordination between different teams. If you can not always predict exactly when users request to add new devices to the network, you can certainly prepare a routine process to meet these requests as and when they occur. Gather the two teams to prepare roadmaps for dealing with such situations - as well as other situations "listed" such as updates to the network, the gels changes, and audits - helps reduce the risk of These changes open up security vulnerabilities.
A clearer
To establish these roadmaps, it is essential to understand the topology of your network, which can be extremely complex enterprise environments in multi-site. Where are the main channels and choke points for traffic flow computer? Where are the potential vulnerabilities? How are configured firewalls on the network, and what policies and safety rules, operating on these devices?
The answers to these questions will help you identify and target areas with potential security holes. However, the pace of infrastructure changes under way - not to mention the speed at which external threats are evolving - means that manual assessments and periodic risk and network are simply more frequent enough to allow staff to arrive to follow.
In addition to being able to visualize your network, you must be able, in near real time, to respond to network problems and quick access to all types of firewalls and to apply changes in a way that is both consistent with security policies and fully verifiable. This requires the automation of these critical tasks consuming labor.
Automation for IT staff
Why automate these tasks? Simply put, organizations can not afford not to automate. In 2011, leaders of the IT and security were interviewed about their * management problems of firewalls. 66% said that human error was the main cause of failure of network security - in other words, simple errors made when evaluating the application or "manual" rules of firewalls or policies.
Respondents also said that it is the management of firewalls that asked the biggest investment of time while causing as many disruptions in the networks. 73% cited a large number of changes as the main reason for their investment of time in the management of security gateways. The survey clearly identified several needs: an overview, dashboards, security issues, information on availability issues and compliance, reduced human error, and prioritized actions for reduce critical risks.
The automation allows teams to take control and not simply fighting fires being tossed between incidents. The right solution can help teams to track traffic or potential connectivity problems. It highlights areas of risk, the current state of compliance with the policies in mixed environments including traditional firewalls, those of the next generation and virtual. It can also automatically identify precisely the features that require changes, and show how to design and implement this change, the safest way.
An automated solution enables easier management and more predictable change firewalls in large environments with multiple teams. Because it is the solution itself that does the most work, it also frees up time to manage security tasks more strategic as well as compliance. An additional advantage comes from optimizing the performance of firewalls and gateways. Remember that firewalls generally treat their sets of rules sequentially until they find one that matches the traffic. How many rules have been added to your firewall during these years? Extending the number of sets of rules degrades performance. By cleaning up unused rules of your firewall, and prioritizing rules that are most frequently used, you reduce the amount of processing that the device should do.
Thus, the constant changes should not be a nightmare for IT staff and for those of security. The ability to better manage change afforded by automation can make a real difference to the security of a company.
Certificate in Cyber networks at the Polytechnic
Increase in attacks against government sites and industrial intrusions, hacking, viruses, Trojan horses ... more and more threats on computer networks today.
Identify, prevent these hazards, provide knowledge and develop skills to handle these events are the objectives ducertificat cybersecurity computer networks that the Centre for Continuing Education will offer Polytechnique Montreal in the fall of 2012.
Advanced investigative techniques to the legal aspects through specific risks related to telecommunications, smart phones and prototypes of the future, training will cover a broad spectrum of this emerging field.
The program is open to stakeholders from the private and public who wish to preserve network security of their organization.
Courses will be offered online, which will serve clients located outside of Montreal.
More details here.
The security of personal data concerned 86% of social network users
An overwhelming majority of Internet fears for the safety of their personal data left on social networks, according to a study of Avira, unveiled Wednesday, May 30 The survey reveals that 86% of users of this antivirus solution fear that their personal information may be stolen or misused on Facebook, or Twitter + Google.
It shows that 40% of respondents have confidence in any social network in terms of data security and information available online. It should be added to the group of skeptics who consider 25% as the Facebook social network is most vulnerable to theft or misuse of data, like the 19% who most fear Google + and 2% who are not trust Twitter.
Finally, only 14% of respondents rely on all social networks.
This survey was conducted in January and February 2012, with 2,710 users of the antivirus Avira.
2012年5月26日星期六
Dell would buy Quest Software, a specialist in network security
In March the private fund Insight Venture Partners has agreed to acquire Quest Software for $ 2 billion. According to Bloomberg Magazine, Dell would be part of one of the companies currently in talks to buy the publisher.
Past two years, Dell has made more than fifteen acquisitions to strengthen its portfolio of professional services. The last of them dated to the early redemption of SonyWALL. Last year, revenues from Quest totaled $ 887 million with net profits of about $ 44 million.
The company specializes in systems management applications for companies. Among the solutions offered by Quest Software, Toad and we find SharePlex, to automate some tasks on a database like Oracle or replicating it.
The editor also has management tools for Microsoft Sharepoint and Exchange. Other potential buyers, analysts had counted on logically Oracle, Microsoft. Quest Software is the company now valued at 2.12 billion.
Past two years, Dell has made more than fifteen acquisitions to strengthen its portfolio of professional services. The last of them dated to the early redemption of SonyWALL. Last year, revenues from Quest totaled $ 887 million with net profits of about $ 44 million.
The company specializes in systems management applications for companies. Among the solutions offered by Quest Software, Toad and we find SharePlex, to automate some tasks on a database like Oracle or replicating it.
The editor also has management tools for Microsoft Sharepoint and Exchange. Other potential buyers, analysts had counted on logically Oracle, Microsoft. Quest Software is the company now valued at 2.12 billion.
Open Forum: Security Challenges with IPv6
There is no doubt that the imminent worldwide launch of IPv6 June 6, 2012 heralds a new era of Internet infrastructure worldwide, both in terms of evolution and widespread adoption.
The world has already had a taste of the new protocol last June, when the IPv6 World Day.
Led by the Internet Society, more than 1,000 websites, high-tech companies and ISPs have been encouraged to shift to IPv6 collectively for a period of 24 hours to "test" the protocol and try to anticipate technical problems that might occur during the official launch.
June 6, 2012, key organizations and high-tech leaders like Google Web, Facebook and Yahoo, among others, will switch to the new Internet protocol during official global launch.
And the transition becomes increasingly necessary. The current protocol IPv4, which supports about 3.7 billion addresses, was simply exhausted the stock of available addresses, in part due to the explosion of mobile devices.
But IPv6, in turn, has an unlimited capacity of addresses, which allows it to adapt to a mobile infrastructure and growing Internet world.
However, with the imminent launch of the Global IPv6 protocol, researchers and IT professionals anticipate some challenges, especially in security.
The novelty and lack of knowledge relating to IPv6 as there will inevitably configuration errors, compatibility issues and other blunders implementation.
There is no institutional knowledge about IPv6 that was on IPv4, which has been used for decades and offers a broad knowledge base.
But perhaps the most important security challenge is that many network security appliances are able to transfer IPv6 traffic, but not to inspect it.
And as IPv6 is enabled by default on many platforms current network - such as Windows 7 - these systems are already installed on the network.
The further deterioration of the S & P: The safety outweighs the numbers
And besides, he had perfectly foreseen. The strong cash infusions could not prime the pump in the manner hoped for recovery. GDP has plunged into recession and whatever the approach of analysts, at constant prices to current prices or whatever, the result at the end of 2011 closed at -1.8% to -2.2% and one for other. Meanwhile, the prime minister has just spoken by 1.2% in the first quarter of 2012, during negotiations with the UGTT, whereas today, half of the year, the economic program barely started.
Can we put everything on the back of the current governance?
Not really, because the new administration has taken the hand in the last days of last year. And therefore, the numbers (BB) as Standard &; Poor's advanced should not be attributed solely to the new governance. Or even the old, because it has ruled that seven months, but still managed to cushion the blow, the consequences could continue at the pace of first quarter 2011, which had already declined by -8%. It is fitting that after a revolution, to which is added one, related to Libya, there is a slump.
But already by lowering the sovereign rating of our country, S & P, who shoots anything that moves, did not miss the opportunity to "run", already a first time to relapse in late summer 2011 and now we finish we finish in posting a grade "speculative" on international financial center. In reality, donors, observing in the early summer the figures announced with slow growth, may have other reasons to fear the Tunisian site. Attempt an explanation.
On the one hand, the beginnings of recovery since the beginning of 2012 do not seem entirely convincing.
Neither the CBT nor the INS had released to date figures on what really weighs (at constant prices) GDP at end-March and late April if possible. Because, by reading the notes in reverse that publishes the OWA, we see indeed that our trade deficit continues to widen because of Europe, itself, dilapidated. Is that our foreign reserves, which should cover the normal six months of imports, are currently on the red limit of 100 days of import. Moreover, by dint of injecting dinars into a brand new economy seized up, it eventually led to exacerbate inflation. This is already double what it was to end in December 2011 and is already at about 6%.
Working for several sectors are still struggling export and tourism that seems to make an effort, also remains at the stage of chugging along despite the high-dose amphetamine prescribed to him ... Provided the real reason lies elsewhere. Is that the social and political approach to tolerable limits.
Security and stability first
In a report from the U.S. embassy in mid-April, which was widely distributed on networks, social, reads in part: "the political protests, work stoppages, roadblocks and other public disturbances continue to occur. Demonstrations turned violent on several occasions in violent clashes between police and demonstrators, causing deaths, injuries and property damage "..." U.S. citizens are urged to remain alert to developments and local safety be vigilant about their personal safety "... "The Interior Ministry has confirmed ... that the group had links with Al-Qaeda in the Islamic Maghreb and arms traffickers known".
A month later, the U.S. Ambassador, he was doing a tour in the south, has seen firsthand that the situation remains precarious, since it almost got itself was attacked.
But such facts and reports fall inevitably into the hands of U.S. analysts and primarily S & P whose mission is to inform the sovereign risk in all states where U.S. investors put their savings, especially through the famous "investment funds" , they are expected to grow, to serve particular social pensions for "retirees".
It is perhaps this aspect that has counted most of the Tunisian sovereign risk rating. Since by reading his notes carefully, the agency reports that indirectly under conditions of stability (it considers the upcoming elections), the takeover of all azimuths could bounce economic data, which are an epiphenomenon.
Certainly, many will address the rating agencies because they can push states causing the rise in compensation costs of debt (6% for Spain and Italy, 11% for Portugal and even up 30% for Greece). However, it is highly likely that at some threshold higher compensation costs of debt, the risk of not being able to honor the debts of principal and interest is a mathematical inevitability.
This "club effect" may lead to a default (bankruptcy) for the fragile economies while debt is expected to induce a boost saving in order to generate leverage ... But it's not that slow growth may do so if it does not release enough resources to repay.
This is why the rating agencies take into consideration all other elements, including the country's stability, the quality of political governance and its ability to ensure security without the slightest flaw, the confidence of local investors, etc.., For note the reliability of a State as a whole, even though sovereign, especially in the era of globalization and mobility-volatility of capital ... Between charity and donor must be defined clearly and act accordingly.
Road Safety - The interior minister keeps his hand: The change is not for now
The alternation has sounded in May and now the ambitious slogan of winners is now put to the test of facts. Change, it should be now. Comprehensive program that both the FFM FFMC through Codever had asked to speak in detail of road safety in particular and the bike in general.
About a less repressive approach of the first theme mentioned, the idea of reclaiming the land by the Department of Transportation instead of a monoculture of one minister of the interior had been addressed. And now the President of the Republic seemed to be leaning in this direction by passing through mail response:
"I believe that the policy on road safety should not be reduced to repression. It must involve cross and, in a dynamic inter-as much security as prevention education and transport, sustainable development ... In the same logic of compartmentalization, the establishment of a local consultation on the road I think is important. "
Not bad in theory. And practice? It just fell on Friday with the awarding of Ministers decrees published in the Official Gazette. To discover what? Nothing new under the sun! The interior minister, Manuel Valls, keeps road safety. The change is not for now.
That said, there is still the law. And tireless FMWC resumed their pens to ask five questions to the candidates. Something to be aware while not ever raising the mortgage of the sincerity of those who will have to respond. But their proximity to more pronounced with the voter can also play its role in everyday life.
Questions FMWC candidates for legislative:
Question 1: instead of 2WD
If elected (e) MP (e), will you commit to mandate the inclusion of two-wheelers (2WD) as a legitimate means of transportation and an alternative to "all-car" and to consider their 3 , 8 million users as drivers in their own right: evolution of the Highway Code, 2WD integration in urban transport plans, road infrastructure adapted taking into account the specific evolution of 2WD and vulnerability of their users ?
Question 2: the retro-reflecting device
The decree of January 3, 2012 reveals the ignorance of government officials on the accident of 2WD and needs of their users by punishing a fine of the third class and the withdrawal of two points allowed from 2013 on non -wearing a "retro-reflective device," even in daylight, for users of motorcycles over 125 cm3, then no serious study justifies such a device which is unnecessary, inappropriate and discriminatory. If elected (e) MP (e), will you commit to lobby the government to review the decree in consultation with associations?
Question 3: technical control
Despite studies that show no relationship between technical failure of the vehicle and accident rates of the two wheelers, the government announced its intention to introduce a technical inspection of mopeds. Then the measure was postponed twice.
If elected (e) MP (e), will you commit to abandon this plan complicated, expensive for users and no measurable effect on road safety for 2WD?
Question 4: projects tolls on national
Highways (the safest networks) motorway network are increasing their rates of tolls, forcing users to refer to secondary networks (RN and RD) most accident ... These increases are inconsistent with the safety objectives road. Other projects to introduce tolls on national roads are also under consideration.
If elected (e) MP (e), would you be willing to legislate to limit rate increases and end the privatization of road network contrary to the objectives of reducing accidents?
Question 5: the Zapa
In 2012, eight cities in France (Paris, St. Denis, Lyon, Bordeaux, Clermont-Ferrand, Nice, Aix-en-Provence and Grenoble) and 22 areas will be provided then the experimentation of the ZAPA (Zones priority action for air). The ZAPA are expected to contribute to a limitation of emissions generated by road traffic. The pollutants covered are essentially the "fines" and nitrogen oxides released by diesel engines, particularly those of heavy vehicles in high traffic areas of road freight.
Against all logic, the two-wheeled motorized vehicles put into circulation before 2004 will be prohibited in these areas while there is no 2WD diesel engines, 2WD that participate in reducing congestion and that their use contributes to the reduction car traffic in commuting employees.
In addition, these areas constitute a real discrimination vis-à-vis the most disadvantaged populations, and an attack on freedom of movement in general. We believe that the project developed under the Fillon government is not adequate to economic and social realities present and future, without effects on pollution.
If elected (e) MP (e), you commit yourself to revise the system ZAPA taking into account implemented by our European neighbors (where 2WD are not affected by movement restrictions)?
2012年5月7日星期一
The Bastille ignites again
This is where May 10, 1981 had left the celebrated François Mitterrand, the first socialist elected president under the Fifth Republic: Sunday, 31 years later, she returned to celebrate the victory of Francois Hollande, Place de la Bastille in Paris. 20 hours. Face the winner appears on the giant screen, confirming what everyone subodorait, rumors on social networks are being made increasingly clear in the afternoon. The outcry is huge on a place as black people than the Rue de Solferino, at the Socialist Party headquarters.
When, newly arrived from Tulle, sometimes near the place more than four hours later, 20 to 00 h, it triggers a jubilant crowd in as compact until early evening. All evening, the smoke lit up the Genie de la Bastille, firecrackers crackled, flags were flown. Soon the column was climbed in July, the security gates and strides the crowd pressed toward the stage listening to artists 'friends', Yannick Noah, Ridan, Pep's, Kassav, Yael Naim, Axel Bauer ...
Meanwhile Francois Hollande, the defeated candidate Segolene Royal in 2007 has collected a great success of esteem to the applause, criticizes the "money power" and gets into "Ségolène president". The forefront of assistance very young, the pressure is high, some crowd movements take place, but the atmosphere is good-even if it takes over an hour to travel a few tens of meters.
Sarkozy jeered
"Chairman Holland", "We won! We won!" The crowd chanted. Some waved red roses, others raise and slam his fist as they cheer the loser's lady-killer. "Bye bye Sarko", "Sarko in prison", "Sarko, it's over!" One hears. The intervention of the president is also copiously beaten hoot as the voices on the right Jean-Francois Cope and Nadine Morano. A man, ironically, asked whether the sausages are sold in a booth "halal", a campaign theme developed by Nicolas Sarkozy to the chagrin of the left.
"Holland president, it will change the notion of president," said the actress Josiane Balasko, long-standing support of the Socialists and François Hollande. Clementine Celarie, Guy Bedos, Michel Piccoli is also there. Armel Noisy, Etienne 60 years, came to celebrate "the departure of Nicolas Sarkozy" but also expects that it meets Francois Hollande "he said during the debate in his long tirade: Moi, President ... ". As the crowd demands on the president-elect: "Holland, the change, it really should be now," demanded a placard, "Quick, the Sixth Republic", "Retirement at 60 years full rate, it is now "require other.
In 1981, the party was organized in improvisation, in the afternoon, when the polls did not leave the slightest doubt about the identity of the winner. It was also held in the rain and Mitterrand had not come about. This time it was prepared. Under the eye of cameras placed at the foot of the Opera Bastille, built during the Mitterrand era, supporters had flooded very early before the formalization of the results. "I was already there in 1981, in the rain, and it is important that children see this," says Olivier Guedj, dentist of 44 years came with her children.
La Sarkozie et la politique africaine de la France: ATT, l'indomptable ou l'imprudent?
In Libreville Sarkozy, before Oumar Bongo, wants to embody the break in France's Africa policy, saying loudly that he does not belong to the generation of African independence and that he did not even networks to ensure what we used to call, Françafrique, ie relations also preferred that the dark France has maintained (formally and informally) with its former colonies since the time of De Gaulle and its Mr. Africa, Jacques Foccart.
It is true that Ali Bongo is not Oumar Bongo, Blaise Compaore and ADO do this or not Felix Houphouet Boigny.
Also, Henry Guaino (special advisor to Sarkozy and his pen in many of these including the highly controversial speech in Dakar in 2007) and Claude Gueant, "the best" according to Sarkozy policeman, also a very powerful secretary general at the Elysée (then Interior Minister), the gentleman of impossible missions (like James Bond 007) including the release of Bulgarian nurses by Gaddafi or the release of the French spy Pierre Camatte in northern Mali by AQIM , as influential and effective they are, these two lieutenants Sarkozy, are far from the frame of Jacques Foccart.
But still, African politics of France has in fact been no rupture Sarkozy as its outline was preserved.
The "networks" has informally continued to be supplied by the particular sulfur Bourgi Robert, who learned everything from the thundering Foccart and Patrick Balkany, mayor of Levallois Perret in Upper De-Seine, Sarkozy's personal friend.
The relationships continued to be maintained including Oumar Bongo until his death which could boast of getting fired the secretary of state government cooperation Fillon (Jean Marie Bockel), Denis Sassou-N'Geussou (which even Transparency International can not worry on French soil), Blaise Compaore (the good student), and ADO Ivorian President elected and installed by the Elysee, forcibly, and the nice man contracts for France to Bouygues and Bolloré.
Adversity against any French head of state who is not calibrated for such relationships continued with Gbagbo, Dadis then ATT.
French interests have been defended with vigor and determination that is for the oil (for Total) for Uranium (Areva) for major works (for Bouygues and Bolloré) and services (Orange, Vivendi, Bnp ...) and the arms contracts and transport (Alstom and Dassault) particularly in North Africa.
From this perspective, Gaddafi was received at the Elysée in 2007 with honors (with implantation of tents in the Hotel Marigny and impressive convoys of forty vehicles in Paris for sightseeing of the highlights of the capital by Prince of days) in hopes of being able to sign lucrative contracts to arms-billion euros.
Digest of Jamariya had the audacity and arrogance of not honoring that commitment was firm and yet received a dented the country's image "of human rights" that Rama Yade (then Secretary of bubbling French state for human rights) has not failed to remind him in one of the hard words which she has the secret.
In early 2011, diplomacy Alliot-Marie, at Quai D'Orsay, roundly mistaken on Tunisia and early spring Arab, as it brings to the French National Assembly, without complex, its support for the regime Ben Ali and Trabelsi .
Michelle Alliot-Marie, head of French diplomacy then, is itself involved in a compromising trip to Tabarka in Tunisia, to be spending his Christmas holidays in 2010 at the expense of close to Ben Ali and all with private jet.
Bad time for French diplomacy with the Arab world in early 2011 to the extent that this is Christine Lagarde (the epitome of class and elegance to the French), however, Minister of Economy and Finance the time, which will make the trip to Tunis to attempt reconciliation with Tunisian after the fall of Ben Ali instead of Michele Aliot-Marie.
So when the wave of Arab Spring arrives in Libya, Sarkozy has an unexpected opportunity to "skin" to Gaddafi and give him the money in his room for his affront to 2007 while redorant the crest of the French diplomacy and leadership on internationally and gain height, so, on the internal political scene, by boosting its popularity was seriously damaged with record unpopularity because of the crisis since 2007.
The philosopher "to his shirt open" (to quote the New York Times), Bernard Henry Levy, VRP is the root of the Elysee in the Libyan case, it is responsible to contact members of the French CNT, National Council of Transition Libya in its stronghold of Benghazi, through endless trips between Paris and Benghazi.
Sarkozy, is active, but Gaddafi and his "mercenary" resist and even reverse the steam and are on the verge of taking Benghazi and "rats", the epicenter of protest against his regime.
In extremis, French diplomacy comes to vote at the Security Council of the UN, the controversial resolution 1973 of fly zones in Libya to prevent that NATO planes of the Gaddafi regime to bomb the Libyan people.
The rest is history.
Most Francophone African leaders supported France in its "crusade" (in the words of Claude Gueant) in Libya, but not ATT, worse it does not recognize the CNT as all its neighbors except Algeria.
ATT even became very good friends with Jacob Zuma, very back against Sarkozy in the implementation of resolution 1973, by NATO to the point where he curtly declined the invitation of Sarkozy at a summit in Paris on Libya with countries members of the contact group to which the African Union was invited.
The irritation at the Elysée and the Quai d'Orsay was at its height, especially as there are troublesome precedents Koulouba with the tenant.
It did not bother to sign agreements with France on immigration chosen (candidate's campaign promise of Sarkozy in 2007) nor with Hortefeux, nor with Eric Besson, nor with Claude Gueant, the great gentlemen "numbers" of "deportation" of governments instead Beauvau Sarkozy in Paris.
On oil exploration in northern Mali, Sonatrach (Algeria) and Eni (Italy) are the front line for a first exploration drilling was planned in this year 2012 (research and non-operating, I specify) Total all to shame ( France) with envy for anyone who knows the potential of four sedimentary basins divided into 25 blocks of northern Mali, part of which are the subject of exploration contracts and operating agreements with ATT by the governments of the countries of multinational corporations often emerging in the nose and beard Paris and Total.
Worse, ATT does not want French military bases on Malian soil, and "not doing enough" in the fight against AQIM has declared war on France because of its campaign in Afghanistan and its law "anti -burqa "by engaging in the taking of French hostages in the Sahel and transformed easily into northern Mali sanctuary to sabotage French interests in the region.
Paris is small, powerless, to make unexpected and sporadic actions with the Mauritanian armed Nigerian and every hostage-taking French because of the cooperation agreements between both countries and Mali, which gave them rights to sue on their respective soils .
So how do you tame the untamable ATT or unwise?
There remains the question Touareg.
That's good because France is home to the Tuareg MNLA.
Contacts are made by officials of the Quai d'Orsay, discreetly, in France and Switzerland.
And curiously Tuareg fighters abandon Gaddafi and return laden with impressive convoys of heavy weapons to Mali.
RFI and France 24, the formidable machinery of communication at the Quai D'Orsay in Africa, providing the communications department of the "deal Tuareg" where fighters are carefully distinguished MNLA of AQIM and its allies Ansar Dine Iyad Ag Ghali and their war crimes, even though they fight all the same Malian army in the same territory without ever fight each other.
Curious!
And the new head of French diplomacy, Alain Juppe, "the rebels had significant military success" before the fall of Tessalit.
And for him, when he came to see ATT Koulouba "there is no military solution" to the conflict in northern Mali.
But after the defeat of the Malian army, when the superiority of Ansar Dine and AQIM on the strengths of MNLA has become obvious, yet it is French diplomacy which alert on "Islamic danger" to the UN and provides support to ECOWAS for a possible military intervention in the north while turning its sub-regional networks in Mauritania, Burkina for a chance to bargain with the MNLA and give his violins with Algeria "essential partner" in the case of northern Mali.
So I do not know if it is in diplomacy with variable geometry, but "the best of us" according to Jacques Chirac, Juppe what we must explain how "there are no military solution" and simultaneously support a possible involvement of ECOWAS.
RFI for the outpourings of women in Kati, and the violence that followed in Bamako to denounce the management of the war by ATT, "It would be very difficult for ATT to face two fronts simultaneously" north and south .
Curious announcement, when we know the risks "of new Tuareg rebellion" in northern Mali have been announced by the same Rfi since November 2011, more than two months before hostilities began on 01/17/2012.
The ambassador of France in Bamako was among the first to make the trip to Kati, after March 22, 2012 to meet Captain Sanogo.
Again curious approach and a symbol for the representative of a country that has championed democracy in Côte d'Ivoire a sudden bombing helicopters.
My dear friends and was, Sarkozy's Africa policy during his only five years, the Sarkosie.
Shock wave to electro
They suffer from electro-hypersensitivity and found refuge in Fontenois, one of the few white areas in northern France. Unable to buy the house they rented, they will soon find themselves exposed to the (bad) wave of the modern world.
"Uh, you are sure of turning off your mobile? Because I do not feel very well here ... "The hand on the belly, Christine Duchateau almost apologizes for asking this question. And without even looking, the Belgian demonstrates the outset that it is a real wave detector. At 42, she had to leave husband and children to live away from these programs which are rotting his daily (see box).
Like her, they are a handful to have found refuge in a large house Fontenois, a hamlet of Saint-Pierremont. All are electro. They say they are allergic to WiFi, the phone and sometimes the electric current that trigger their headaches, dizziness or irregular heartbeat ...
To escape these bad vibes, some lived in caves, caravans or even a tent.
It took nearly five years Eric Els Bulsman for tracking down this haven of peace. The Dutch had started his cross country in search of white areas (1).
In vain. Then it was Belgium. "There were a few small spaces but little to sell and it was mostly too expensive."
Eric will fall back on the north of France and discover LA gem. An old cottage in the heart of planted eight acres of parkland. Away from power lines, masts and even a hypothetical WiFi box.
"It was the perfect place, explains Christine. Surveys conducted show that there is almost no radiation. Which is very rare. In addition, there is plenty of space, it was for sale and it was located between Brussels, Paris and Utrecht. "
For these electro northern Europe, this discovery is unexpected.
Gas leak Republic Square
So he dug up the Republic with an earthmover, for the installation of sewerage systems, the driver of a vehicle was inadvertently clipped a gas line on Friday morning.
The security services were immediately alerted. 30 to 11 h, the local police brigade reinforced by those of Capelle and firefighters have established a security perimeter. Local residents were confined to their homes. In school holiday period, there was not the outputs of the normal schools of that place. Children attending the leisure center are output from the street Lavisse.
Around noon and a half, a team of GRDF dispatched to remedy this problem stopped the leak before repairing the network. Local residents were not evacuated, the leak located remote from any dwelling. A distance considered reasonable.
St. Clair worthily welcome the Tour of the Channel
The sun was part of Thursday for the start of the 48th Tour de la Manche given 13 h 30. With 144 riders at the start, this event mobilizes significant logistics around organizing committee, its officials and commissioners, the security officials, team leaders and many vehicles.
Jean-Claude Braud councilor and cycling enthusiast and Maryvonne Raimbeault, Mayor, have missed the opportunity that presented itself to them to organize their departure in 2012 while the selection of the city to that of 2013 was already . But significant work networks were planned in the borough; "and the first days of January and the streets were crowded dug gear, but the work was completed on time thanks to the mobilization of all and conditions favorable weather, "said Jean-Claude Braud at the welcome party organizers and officials.
Population, associations, traders, artisans and many volunteers were mobilized. Officials of the organizing committee unanimously praised the quality of care and organization with a village shop windows and decorated. Symbol of the involvement of volunteers, Odette Martel came to the podium to explain the departure that she "had 4,500 pink crepe paper."
The cycling champions of yesterday
Former champions came on the start line to greet the runners. Thus the local Raymond Delisle who was champion of France and participated in 12 Tours de France, winning two stages, Serge Pacary which was shortlisted for the Olympic Games in Mexico in 1968 and ran the Run for Peace, Eddy Seigneur winner stage of the Tour Champs Elysees in 1994 and now in charge of a team on the Tour of the Channel.
Road safety: the status quo, it is now
Interviewed by the FFMC, the FFM and Codever (read MNC February 24, 2012), most candidates had provided answers more or less convincing (read MNC from 6 April 2012: the candidates' answers). Like most of its competitors, Francois Hollande had not responded specifically to each item of the questionnaire, a letter preferring rather general and no real commitment to change.
Interior or Transport?
While Nicolas Sarkozy had placed the Road Safety under the responsibility of the Ministry of Interior, showing the repressive side he gave to his policy since 2003 with the proliferation of speed cameras, Francois Hollande did not comment on his reinstatement clearly Ministry of Transport.
The question was relatively simple: "if you are elected (E), will you commit to return to the Road Safety within the Department of Transportation or under the auspices of Prime Minister YES / NO".
Brassard fluorescent
Asked about the mandatory wearing of a "retro-reflecting device" on a motorcycle, the new president had preferred simply zap the question ("if you are elected (E), will you commit to review the decree in consultation with user associations and in the future to really involve them in decisions that affect them? YES / NO ").
Maintenance and monitoring of compliance
Concerning technical control, Francois Hollande establishes a subtle distinction between a "maintenance and monitoring compliance of vehicles based on networks of dealers and professionals performing maintenance mopeds," which seems preferable to "the creation binding of a technical inspection and expensive for users. "
"It's a question worth, too, to be studied," concludes the new tenant of the Elysee while again, the question was very clear: "If elected (E), you commit able to bury this complicated, expensive for users, and no measurable positive effect on road safety for 2WD YES / NO ".
Francois Hollande's advisers will they listen to more bikers than its predecessors? The road safety policy of the new socialist government does take better account of the specificities of the motorcycle and scooter? The road users (including drivers) they finally cease to be so disempowered and patronized?
Nothing is less certain, since the turn of repression in recent years was initiated in 2001 by Jean-Claude Gayssot, Communist Transportation Minister Jospin government (read MNC including the October 26, 2001: Mr. Gayssot officially installed the National Road Safety) ... A follow-on Motorcycle Net.Com: stay tuned!
2012年5月4日星期五
Testimonials: You and security software
Since Snow Leopard, the words "virus" and "malware" are no longer taboo at Apple. But in your case, you use specialized software Internet security? It was the subject of our last call witnesses. For security applications could be heard to counter the virus and malware or those that attach to monitor communications network, such as Little Snitch and Hands Off!. Not to mention that OS X has some security settings as standard.
Leaves to go against the grain of popular belief, Mac users - at least those who shared their experience - do not sweep all of the back of his hand the problem of security. Can be divided into three main profiles the testimony given. First there are those who defy any protection. Then follow those who are concerned about, but at least, with essentially a firewall installed, this seems to be widespread. Finally the smaller group, which has installed anti-virus or who has established quite drastic procedures vis-à-vis their Internet use.
Guess Trend Micro retains full security for its data center and its client
In order to secure its operations, the famous fashion brand Guess has opted for innovative solutions from Trend Micro Inc.. This choice reflects a desire by IT staff to spend less time to countering the threats. On the other hand, managers can curb the threats upstream into the cloud, while the employees do not have to worry about security and can focus on their heart of business.
Over the past 30 years, Guess has established itself as a world leader in the fashion industry and imposed its brand by designing and marketing a wide range of products: clothing, leather goods, watches, shoes and other products for the general public.
Guess the brand has more than 1,500 outlets worldwide. IT management for the Group, the challenge was: to manage an international multi-site from a centralized data center, to ensure compliance with PCI and curb the existing and emerging threats. If the world of fashion can be complex, the IT department of Guess nevertheless wanted a safe simple and easy to manage. Trend Micro has designed a security architecture tailored specifically répondand to all business needs.
First stage of the project
Trend Micro ™ Threat Management Services has allowed Guess to identify and analyze vulnerabilities and security throughout their infrastructure, to precisely define the necessary improvements to their security tools. This process of discovery and successful collaboration with Trend Micro also encouraged to switch to Guess Trend Micro ™ Enterprise Strategy, a portfolio of products targeted at different security issues:
• Endpoint Security (Trend Micro ™ Enterprise Security for Endpoints, with the flagship Trend Micro ™ OfficeScan ™ to protect workstations and file servers)
• Email Security (Trend Micro ™ ScanMail ™ for Microsoft ® Exchange)
• Firewall (Trend Micro ™ Intrusion Defense Firewall)
• Management and monitoring of security (Trend Micro ™ Control Manager ™)
Second stage of the project
More recently, Guess has deployed Trend Micro ™ Deep Security, a security solution that protects servers, operating systems and data on physical servers, virtualized and cloud. Trend Micro Deep Security provides multiple benefits to Guess:
• Increased confidence in the ability of companies to thwart threats.
• Compliance with PCI, with a ready to use protection, strong multiple security features.
• An easy to manage security, and not burdensome.
• Successful completion of tests particularly harsh.
• Flexibility and ease in changing the rules and levels of protection, to have a security policy in line with the business of the group.
• All the benefits of virtualization within the data center, with a security solution that protects physical and virtual servers.
"Every year we appeal to security experts asking them to test the effectiveness of our security. We migrated the security of our client to Trend Micro OfficeScan, and experts have been impressed with the functional qualities of the solution, "said Scott Forrest, Director of Networks and Infrastructure at Guess. "The second year, these experts already knew OfficeScan, and, again, they highlighted the leadership of this solution in terms of endpoint security. Since we deployed Deep Security, they can no longer be listed on servers protected by the solution, which reassured us still more about the relevance of the solution. "
China: Chen Guangcheng, Ai Weiwei, the ace of political communication
The blind lawyer Chen Guangcheng, as the artist Ai Weiwei, belong to a new generation of Chinese dissidents who became ace of communication in defending their cause with new technologies and provide more of a headache to China.
There are over 20 years, students in the "Beijing Spring" May-June 1989, Wang Dan, Chai Ling and Wuer Kaixi, is époumonaient in their megaphone in Tiananmen Square.
On the night of Thursday to Friday, it was thanks to mobile phones that Chen Guangcheng, from his hospital bed in Beijing, could have a voice directly to the U.S. Congress in Washington, in full hearing on his case, and appeal with the Secretary of State Hillary Clinton.
His phone call to a friend attending the hearing was broadcast and translated, in front of elected officials, journalists and an audience who had never seen that.
"It's unprecedented," notes Willy Lam, Chinese University of Hong Kong. "There will be other attempts to contact dissident politicians, not just the U.S. but in Europe," he predicted.
Meanwhile in Beijing, so a little ridiculous, many Chinese policemen in uniform and plain clothes stood at a distance in front of reporters huddled Chaoyang Hospital to prevent them from trying to talk to Chen Guangcheng, confiscating here or there cards release. Routine.
Already last Friday, fell while the new shock escape of his house very guarded, the blind activist, which only a few accomplices knew where he was, spoke directly - bold snub - Premier Wen Jiabao in a video posted on the Internet.
This 15 minute video, posted on the overseas Chinese website Boxun, then quickly on YouTube, has been seen worldwide. The civil rights activist described the Prime Minister to his ordeal at the hands of the henchmen of the regime, sanctions and demanded security for his family.
"It was the first time we saw a direct communication with senior management, the impact is very strong," Judge Willy Lam.
Chen Guangcheng is emblematic "of its defenders human rights endowed with technology and media" and are "becoming increasingly effective in getting their message across," said Phelim Kine, the organization Human Rights Watch .
"This is the Chinese activism 2.0," said the researcher, referring to the interactive technologies of the Internet.
The first pictures of Chen after he left the Embassy of the United States Wednesday made the "one" of the international press.
Before Chen, the artist touches-on Ai Weiwei has given trouble to the Chinese authorities also extensively using the Internet.
Last month, the eternal thorn in the communist regime had to cut 46 hours after the webcams he had installed at his home in Beijing to deride the constant supervision of which he is subject.
"Ai Weiwei has been the pioneer in this area," said Phelim Kine, "it has a global audience and has great expertise with the technology."
"He showed how one can defy militant, and in some cases thwart the censorship imposed by an authoritarian regime".
Thanks to the internet, he could mobilize 30,000 Chinese, and collect a huge amount requested by the tax after receiving an adjustment, intended by him to punish him for his too great freedom of speech.
Ai Weiwei currently publishes twenty tweets per day.
On Weibo, the Chinese equivalent is the game of cat and mouse between activists
and critics.
Chinese activists of human rights "have become increasingly creative," said Kine. "Social networks like Weibo have made it possible for a new generation of activists to create virtual communities (..) and to defy the censors in a way that was unthinkable before."
Close friend of Chen Guangcheng, Hu Jia and his wife Zeng Jinyan, were among the first to use social networks that have actually taken off the past two years.
It is on Twitter Zeng said Wednesday that his house arrest.
By pushing more and more lines, Chen and Ai Weiwei will certainly inspire other militants.
But "we can not say that the Chinese Government is losing the battle," Kine said, referring to "huge human, financial and techologiques", made by China to clip the wings of the militants.
Chen after the affair to them "lose face, Chinese authorities will strengthen the crackdown on dissidents," predicts Willy Lam.
China will use nanotechnology to improve the security of electricity network
China will accelerate the industrial use of a new material developed using the nanotechnolgie to ensure the safety of its power systems, said a statement issued by the National Center for Nanoscience and Technology (CNNT).
The CNNT said the matter had been tested and extremely strict and technical assessments would be used to solve the problems of flashover (flashover lightning), that are recurring problems on power systems of China.
Other projects on the use of this new material in the research phase and would be implemented on a large scale, has informed the CNNT.
This material was created in 2009 after three years of research by the CNNT, Institute of Process Engineering under the Chinese Academy of Sciences and the Institute for Research on China's electricity.
Volvo employees curious uses of BYOD
Almost nonexistent two years ago, the phenomenon of Bring Your Own Device affects a growing number of companies. Volvo IT, Volvo Group's IT subsidiary has established a policy that meets the success BYOD. Their advice: progress step by step.
With a total estimated at 25,000 mobile laptops out in the automotive group Volvo, Volvo IT - the IT subsidiary of Volvo - decided, for users who wish to implement a policy of BYOD (Bring Your Own Device ).
Volvo users can therefore, if they want, access to the main office type applications the company on their personal mobile device. The system is running IOS, Android or Windows Phone.
Volvo IT supplies IT services to the Volvo Group, which has 82 000 employees. and other clients. Volvo, however, represents the bulk of income of Volvo IT, or 82% of sales. Volvo IT employs 5,500 staff across 35 locations worldwide providing services to over 120,000 users.
Security data and network protection, Volvo IT has set up a connection system which at its first connection to applications, the user chooses a password. This serves to protect access to content on the device. In case of loss or theft of the unit, Volvo IT has the ability to remotely delete data on enterprise applications via a grip applications on the device.
For now, the terminals can not access the WiFi Company and shall be equipped with an unlimited 3G connection. But a plan to open a dedicated WiFi network to smartphones on each band's website via secure access is in progress.
Employees must apply to access this service, and word-of-mouth is very good. It is thus nearly 12,000 mobile devices that are registered for this service, including personal devices since 8000 in September 2011, date of service launch.
The new Blue Coat PacketShaper is available
Blue Coat Systems, Inc.., Provider of Web security and WAN optimization, today announced the release of version 9 of PacketShaper, the new version of the operating system for appliances Blue Coat ® PacketShaper ®. This solution is the first market to provide visibility and control capabilities at the network, applications and content for "opaque networks' IPv6, so far, worked undetected on corporate networks existing IPv4. In addition, this new software provides a scalable performance up to 8 gigabits per second (Gbps), which can meet the increased demands on their networks, both video and other rich media downloads software for large volume of traffic or other applications on networks.
Visibility and control of opaque networks IPv6
With the proliferation of devices and services for WAN technology IPv6 traffic over IPv4 networks business started well before the deadline for transition plans. This creates new entry points for potential security threats and generates compliance issues. Many companies have already IPv6 access through their ISP. A wide range of content currently available on IPv6 from suppliers such as Netflix, YouTube and through applications Peer-2-Peer (P2P). In parallel, many desktop and mobile terminals (mobile phones or tablets) are fully compatible with IPv6 technology. These terminals are publicly addressable and operate outside of traditional security configurations. Sometimes employees use these opaque networks to share files, download video, accessing pornographic content and conduct other activities on the network that are otherwise prohibited by company policies.
Version 9 adds to the PacketShaper classification engine in real time the most powerful current market visibility into IPv6 applications and content with a granular knowledge of over 700 applications and tens of millions of websites listed in 84 categories content. PacketShaper appliances are tools increasingly valuable to companies allowing them to understand the application traffic on Internet gateways and WAN links, manage application performance on these networks and detect security threats and compliance issues.
Opaque IPv6 networks increase the risks and compliance issues
Without visibility and control of content and applications IPv6, companies face security risks and compliance issues related to unauthorized traffic and new security threats potentially very effective. Cybercriminals begin to use opaque IPv6 networks as a gateway to access the stolen business networks and provide communications links to malware already installed and computers whose security is compromised after being infected with botnets.
PacketShaper version 9 software allows companies to observe the internal and external IPv6 traffic on a granular base and implement specific controls to the application or content. PacketShaper appliances can identify security risks and IPv6 and enable companies to take the necessary precautionary measures to mitigate the potential threats earlier.
The performance offered by this new version doubles the power of PacketShaper appliances with current scalability that meets the new requirements of the networks induced by rapid traffic growth. Deployment of a corporate data center to another can now reach 8 Gbps and deployments of Internet gateways and core corporate WAN can reach 3.5 to 5 Gbps of aggregate throughput. This scalability allows companies to manage policies most advanced quality of service and network monitoring based on the application and the different sites, thus optimizing the use of a PacketShaper appliance to centrally manage virtually the different branches.
The PacketShaper software 9 is also distinguished by a very fast reaction time of the user interface, with an overall increase in reactivity multiplied by 10, making it highly interactive. The new interface integrates better workflows and works with all platforms PacketShaper.
IS security: Barracuda Networks highlights the dangers of "3C"
At the technical conference of Barracuda Networks, which is being held in Munich, representing about 180 security experts from 25 countries, Wieland Alge, general manager for EMEA editor, warned against the main dangers watch Enterprises: Cybercrime, Consolidation and Cloud, ie the "3C".
Since the inception of the Internet has changed the situation. If there was once enough to say that there was not only to connect to does not have a problem, it becomes impossible to do without the Internet today and be content to think that the "bad guys" are only on the other side of the pipe. Wieland Alge also notes that if the spam has declined since 2010, targeted attacks are, they, in constant increase.
It explains the phenomenon by lower revenues from spam and cyber-criminals moving to more lucrative operations. In parallel he sees appear blind optimism of users who think they can manage security risks while feeling super administrators but minimizing the risks they face. Moreover, he believes that this type of defense on the perimeter is totally lost cause. He plans to place elements of control over key points in the network, especially in front of the data, to check application flows and access to applications while maintaining centralized administration. He also sees a part of the answer to avoid the nightmare of BYOD in companies.
The simplification brought by the consolidation and the mirage of the all-in-one UTM as the risk of deadlock. It is estimated that the combined technologies in these appliances are often too remote to be properly integrated.
Cloud asks him different problems including a diffuse anxiety due to his part a bit mysterious in the use of technology. He admits, that like the Internet, that its advent is inevitable, it must be considered carefully, even if it brings new opportunities to deport as servers in environments capable of dealing with powerful attacks Denial of service (DDOS). The other aspect is to force companies to rethink their security processes.
Mobility as the next strategic focus
Faced with these challenges, Barracuda Networks has redesigned its product line. Today the supply is characterized by an expansion of capabilities on land larger than the firewall and intrusion prevention by taking elements of network quality of service (QoS) and control the issuance of application (Application Delivery).
Steve Pao, vice president in charge of product development, confirmed the next steps in the range to take better account of terminals and mobile applications. Paul Judge, head of the research laboratories of Barracuda Networks, said that for an hour spent on the Internet, users spend more than 13 minutes on social networks.
Karachi: declassified documents soon?
Related to the attack in 2002, they could soon be viewed by the judges.
Nothing is yet decided. The Advisory Committee on secret national defense has given a favorable opinion Friday to declassify 65 documents Matignon, Foreign and Defence relating to financial aspects of the court record of the attack in Karachi, May 8, 2002. Eleven French had been killed. Despite this progress, only the relevant ministries decide to declassify-defense on the documents requested by the judges. Europe1.fr an update on the significance of this decision.
What does the defense secret? The term is used to describe a government document or military that involves national security. "May have a secret character of national defense [...] processes, objects, documents, information, computer networks or files concerning national defense that were the subject of protective measures to restrict their release or access", said Article 413-9 of the Penal Code. Access to these items classified by the Elysée, Matignon and other ministries is limited to a few people. Since the Act of July 29, 2009, the defense secret is expanded to twenty locations housing the classified documents, including intelligence and espionage against.
There are several gradations: the confidential defense, defense secrecy and finally the very top secret. Military secrecy itself covers wiretapping, technical specifications of military equipment, special contracts, discussion boards authorizing arms sales.
Who decides the lifting of military secrecy? The Advisory Committee on secret national defense has only advisory. Created by the Act of July 8, 1998, the independent administrative authority is seized by an investigator who wants access to classified documents for his investigation. It decides on requests for waiver of defense secret but only the minister who ordered the ranking may decide to lift it. So far, the CCSDN issued about 180 notices that three-quarters in favor of declassification. They were followed in their nearly all the authorities concerned.
Who requested the declassification? The investigating judge Renaud Van Ruymbeke filed these requests to the Prime Minister Francois Fillon, the foreign minister Alain Juppe and Defence Minister Gerard Longuet in March. This judge is charged with Roger Le Loire open information for "misuse of corporate assets, complicity and concealment" about two arms contracts, one of which is linked to the Karachi attack.
What documents are affected? In its first opinion issued Friday, the CCSDN gives a favorable opinion to the declassification of 39 classified documents from the Ministry of Foreign and European Affairs. The second, concerning the Department of Defense, gives a favorable opinion to the declassification of six of the eight documents requested by the magistrate. However, it is unfavorable to the declassification of two sheets of 21 February 1997.
A third opinion, also requested by the defense, ruled for the declassification of sixteen of the seventeen documents submitted to the opinion of the CCSDN and for the partial declassification of a note dated 24 July 1998.
Finally in a fourth one, the CCSDN proposes declassifying four of the seven documents requested by the judge to the Prime Minister. It issues a partially favorable opinion to the declassification of three documents: a memorandum to the Director of the Prime Minister of 26 November 1997, a memorandum to the Prime Minister by the Secretary of National Defense December 22, 1997 as a result of a meeting four days earlier, of the Interministerial Commission for the Study of exports of war materials (CIEEMG), reported on February 18, 1998.
Fifteen have already been given notice by the CCSDN in this folder. Two-thirds were in favor of declassification, the third being partially favorable or unfavorable.
Who is indicted in this financial aspect? Ziad Takieddine, through the Franco-Lebanese arms contracts concluded in 1994, was indicted on three occasions, the last of which dates back to April 24, for "complicity and the misuse of corporate assets" and "money aggravated ".
Thierry Gaubert, the former adviser to Nicolas Sarkozy was indicted Sept. 21 for the misuse of corporate assets.
Nicolas Bazire, Chief of Staff of Edouard Balladur and close to Nicolas Sarkozy was indicted Sept. 22 for complicity in misuse of corporate assets.
Finally, Renaud Donnedieu de Vabres was indicted December 15 for "complicity in misuse of corporate assets".
Now what? The ball is now in the camp of the future government. After the second round of the presidential election, all departmental wallets redistributed. However, only departments with classified documents requested by the Judges may decide to waive the defense secret. If Nicolas Sarkozy was elected Sunday, it will change the government within 48 hours, he said Friday on Europe 1. The decision could therefore be made very quickly. But if Francis Holland wins, the new government will be appointed as mid-May, when he takes office.
Internet safety: attention to public WLAN
Today there are WLAN Hotspots in all urban areas. But no one should surf with confidence, because foreigners can steal data.
Morning at the hotel, be repatriated quickly emails and later coffee, we read his messages on his laptop: thanks to the Wireless Local Area Networks, known by the abbreviation WLAN or WiFi, surfing when you are on the move is no longer a problem. Yet, a WLAN Hotspot urges caution, because data thieves operate there freely.
Caution required
Open to the public network, most of the time, various unknown users are active on a network, either with a smartphone, a netbook or a laptop. Thanks to the radio link, they get all access to the Internet, provided by the operator of the Hotspot. It is easy for hackers to intercept data or access to the mailbox or to the websites of online sales, because the connection is not encrypted, the data is sent in clear text.
What is important for user safety, it's not necessarily that the WLAN is encrypted or open. A network as safe as standard WPA2 protects from hackers, only if they want to enter the network from outside. Instead, all users within the network have received the data access: the vacationer who, at the next table, called home via VoIP, the blogger table below, or young in the corner, who are active on social networks.
2012年5月1日星期二
Unable to go to 192.168.1.1 or 192.168
Hello, I have a problem, I tried to open a port with my router D-Link DI-524 then in the address bar I type 192.168.1.1 (I have firefox) it puts me
A timeout
The server at 192.168.1.1 is taking too long to respond.
The browser has waited too long when connecting to the site and stopped to wait for a response.
* The server may be overloaded or temporarily down? Please try again later.
* Other sites are inaccessible? Verify the network connection of your computer.
How little I know if it is installed? x) what I know is that there are three home computer with Internet.
If they had tried to force me to talk, I let them have said nothing
Reached by telephone, Hu Jia told on Monday morning April 30, Le Monde, the detention of 24 hours between Saturday afternoon and Sunday afternoon, after meeting the previous days, with Chen Guangcheng, the blind dissident refugee at the U.S. Embassy since Thursday. Aged 39, released in June 2011 after three and a half years in prison for "inciting subversion of state power", and always deprived of political rights, but he considers Hu Jia is free to speak, on social networks, or in the media, because it's "constitutional right".
Two intermediate helped Chen in his flight: an intellectual Beijing, Guo Yushan, and activist based in Nanjing, He Peirong. Both are currently unreachable and were arrested. The first anime Transition Institute and the NGO had participated with Chen Guangcheng to investigate the violence of the one-child policy in Linyi (Shandong) in 2005. He has continued to support the dissident is blind and had published in 2011, a petition consists of several video messages of Chinese intellectuals calling for his release.
He Peirong (whose nickname was Pearl on the Internet), a young English teacher in Nanjing has a passion for the cause of the lawyer barefoot. She has traveled several times around the village of Dongshigu, home to Chen and his family, organizing a "web monitor" of his clashes with the guards through the surfers who were harassing the local police to force it to intervene. It was she who went to get Chen to Dongshigu after he scaled the wall of his house Sunday before joining a hiding for several hours. The guards did not notice his escape for several days.
You were arrested for twenty-four hours, how was your detention?
I was taken Saturday to 17 h 30 (on their paper, it says 17 h50), and released at 17 h 50 yesterday afternoon [Sunday]. I was taken to the police office Zhongcang, Dongcheng District in Beijing, but in fact it is the general division of the State Security in charge of the operation (to me they have not said, but I heard their conversation). Their goal is to know when Chen Guangcheng Dongshigu left, how he was found, where he was lodged in Beijing, when he entered the U.S. embassy and when I saw it.
How were you treated?
Initially, they were not very polite. They were two members of the criminal police who interrogated me. They called me for a matter of public safety, but they send police to the criminal! They came up with the arrogant, talking to me like they made me the lesson. I-cons attacked and they calmed down gradually. I have not been tortured, but they have not given me rest when I have cirrhosis and I need to lie. When I learned that the investigation was extended to 24 hours instead of eight hours, I asked for a rest. They were not in agreement. I threw my hat on their desk.
Eventually I found a lounge chair in the corridor on which I slept for 3 hours, no more. But it was cold in the hallway, the lights were on, there were many passages, I have not really been able to sleep. This deprivation of the right to rest is also a form of torture. They asked me for the other [the network]. But I immediately said that Chen was a free citizen, just as He and Guo Yushan Peirong [the two other activists who organized the trip to Beijing Chen Guangcheng].
The general division of the State Security also considers that no law was violated since the departure of Chen Guangcheng Shandong until its entry into the U.S. Embassy. The public authority can not intervene in private law. That's why they lacked solid grounds to question me. So they explained that it was for the "intelligence" and "confirmations". Even if they really tried to force me to speak, I could not tell them. And if I was not forced.
A question surprised me is when they asked me "When is that Chen has been the U.S. ambassador Gary Locke?" "Were you present when Chen Guangcheng saw Gary Locke?" I do not know if that means that the security agents have sources who confirm that they have seen, or if it's just false questions to test me. Since Thursday afternoon, Chen has taken refuge in the American Embassy because it was discovered this afternoon there with Guo Yushan. There was even a car chase. I'm just passed the embassy Friday, but without entering it. The police followed me, so they know it, and it's a stupid question.
In principle you are still deprived of political rights since your release from prison in June 2011. What does this mean?
They told me they summon me because I violated the regulations of the period of deprivation of political rights to which I am compelled. I would not be interviewed by foreign media. They told me that I was interviewed by Radio France-Internationale, while I gave at least ten, even twenty interviews.
I told them that this constraint of not being interviewed by foreign media comes from the Criminal Procedure Code and the regulations of the Ministry of Public Security, but that the Constitution states that I have the right to speak, to criticize , to reveal what I want. I have the right to bring to light human rights abuses by the Chinese local government for example.
Do not you fear reprisals if you continue to express yourself?
I spent three and a half years in prison. I did not want to return. But at the same time, after passing through all that, I'm not afraid anymore. Of course I do not feel well physically, but even if they hold me for a fortnight, compared to 277 days that I experienced in prison, that's nothing! What worries me the most is my wife, my daughter and my mother. They are fretting for me for almost ten years.
The day before yesterday, when I was taken, my daughter saw what was happening. She asked, "Where is he going Dad?" My wife told him that I would have fun by the river. She replied: "That's not true!" We can no longer lie to her. When I was in prison, my wife said to him whenever they visited me, that Daddy was in a kindergarten for adults. She replied: "He has only to change clothes. Then he can go with us". No one had explained to him, but she understands herself. I'm really scared to create a shadow on his heart.
How was your meeting with Chen?
The police asked me when I saw Chen Guangcheng. But they were not interested in the content of our conversation. When I saw him, I was so excited that I still tremble at the thought. He hugged me so hard that it lifted off the ground. Despite his illness: he has blood in the stool since 2006 and has not been treated after his release from prison [September 2010], we are all afraid that it turns into cancer. I also saw injuries on her legs and her body. But his mind is still extraordinarily strong and keeps courage.
Have you heard from Yushan Guo and He Peirong, who helped Chen to escape from home?
I have not managed to contact Guo Yushan He neither Peirong. I am very worried about them. To me, they have not violated any law. They [security guards] have no reason to restrict their freedom. I know this is what is worse, of being "disappeared": I tasted the "disappearance" for forty-one days [in 2006]. I was treated very badly during this period.
Peirong He has been missing for 11 h 10 Friday morning, this is already sixty-two hours. I contacted Guo Yushan for the last time to 22 hours Friday night, then he no longer had a sign from him since Saturday morning. Guo Yushan was followed since Thursday afternoon. He lived in hotels do not have any problems. I greatly admire what they did. They are true brothers.
When Peirong He learned that the phone was turned off by Guo Yushan, she sent a tweet Friday morning to take upon herself the whole responsibility for the operation, knowing all the risks it runs. For his part, to protect, Guo Yushan sent messages via friends saying it was he who organized everything, and it had nothing to see inside!
Unable to connect to the address http://192.168.1.1
Question:
I can not connect to the following address http://192.168.1.1
Answer:
Is that your router denies access, in my opinion you should not be in if there is an ethernet driver ethernet problem or misconfiguration of the ethernet card. Made a reset of the router to see. Your router you have you given it an ip address gender 192.168.1.n? This will avoid you to reset to nothing.
订阅:
博文 (Atom)