<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6270185105133425436</atom:id><lastBuildDate>Fri, 11 Apr 2025 19:07:21 +0000</lastBuildDate><category>News</category><category>hi-tech</category><category>Tecnologia</category><category>Glossario</category><category>sicurezza informatica</category><category>Web</category><category>Microsoft</category><category>Microsoft®</category><category>Internet</category><category>Phishing</category><category>Cybercrime</category><category>privacy</category><category>protezione dati</category><category>spam</category><category>Malware</category><category>Scienza e tecnologia</category><category>trojan</category><category>botnet</category><category>Globalizzazione</category><category>sicurezza</category><category>sicurezza  informatica</category><category>Google</category><category>truffa</category><category>Programmi Freeware</category><category>virus</category><category>biometria</category><category>computer zombie</category><category>studiocelentano.it</category><category>violenza sui bambini</category><category>browser</category><category>copyright</category><category>lotta alla pedofilia</category><category>lotta alla pedopornografia</category><category>risparmio energetico</category><category>software</category><category>tlc</category><category>Ambiente</category><category>Commissione europea</category><category>Digital Divide</category><category>Punto Informatico</category><category>aggiornamenti</category><category>download</category><category>indirizzo IP</category><category>GAT</category><category>Microsoft Vista</category><category>Windows</category><category>Windows XP</category><category>antivirus</category><category>computer</category><category>e-mail</category><category>firewall</category><category>spammer</category><category>Spam: il cuore del Cybercrime</category><category>Wi-Fi</category><category>YouTube</category><category>banda larga</category><category>password</category><category>punto-informatico.it</category><category>Blog</category><category>Davide Mancini</category><category>Informatica</category><category>open-source</category><category>software freeware</category><category>www.alground.com</category><category>www.datamanager.it</category><category>Multilanguage</category><category>Provider</category><category>Rootkit</category><category>Sarkozy</category><category>Server</category><category>Tecnopolis-hi</category><category>consumatori</category><category>energia pulita</category><category>furto identità</category><category>pirateria</category><category>ricerca e sviluppo</category><category>telefonia mobile</category><category>www.apogeonline.com</category><category>www.repubblica.it</category><category>DDos</category><category>DNS</category><category>F-Secure</category><category>Google®</category><category>Keylogger</category><category>Roberto Trizio</category><category>aggiornamenti Microsoft® Vista</category><category>alta tecnologia</category><category>eBay</category><category>internet explorer</category><category>paolo attivissimo</category><category>patch</category><category>posta elettronica</category><category>rete</category><category>spyware</category><category>storm worm</category><category>web 2.0</category><category>Agcom</category><category>Antitrust</category><category>Backdoor</category><category>Bollettino Sicurezza</category><category>Consiglio d&#39;Europa</category><category>Costruire un&#39;Europa per e con i bambini</category><category>Flavio Bernardotti</category><category>ICT</category><category>Microsoft® Office</category><category>P2P</category><category>RBN</category><category>Second Life</category><category>Tweaks</category><category>UE</category><category>URL</category><category>Windows Vista</category><category>Windows®</category><category>addon</category><category>aggiornamento protezione</category><category>bloggers</category><category>catene di sant_ antonio</category><category>chain letter</category><category>dominio</category><category>driver</category><category>foto</category><category>fotovoltaico</category><category>guida all&#39;uso</category><category>hardware</category><category>hotfix</category><category>net neutrality</category><category>palmare</category><category>smartphone</category><category>Bill Gates</category><category>Bollettino Sicurezza Microsoft® Febbraio 2008</category><category>Citizen journalism</category><category>FBI</category><category>Flavio Bernadotti</category><category>IBM</category><category>Linux</category><category>Luca Annunziata</category><category>Marco Giuliani</category><category>Microsoft® Vista</category><category>Office® 2003</category><category>PC AL SICURO</category><category>PREVX</category><category>PayPal</category><category>Presidente della Repubblica Italiana- Giorgio Napolitano</category><category>Provider di servizi Internet (ISP)</category><category>SPAMHAUS</category><category>Save The Children</category><category>Science</category><category>Sophos</category><category>Symantec</category><category>Telefono Arcobaleno</category><category>Vinton Cerf</category><category>Windows® Vista</category><category>Windows® XP</category><category>Yahoo</category><category>Yahoo®</category><category>account</category><category>backup</category><category>bootable iso</category><category>cab</category><category>cellulare</category><category>codice maligno</category><category>digitalizzare</category><category>e-learning</category><category>economia</category><category>eventi</category><category>grooming</category><category>marte</category><category>mondo dell&#39;informazione</category><category>multietnica</category><category>multilinguismo</category><category>satellite</category><category>sistemi operativi</category><category>tariffe di terminazione</category><category>telefonia</category><category>theregister.co.uk/</category><category>vLite guida italiano</category><category>www.attivissimo.net</category><category>www.corriere.it</category><category>ADSL</category><category>AIDS</category><category>Alfonso Maruccia</category><category>CD</category><category>CO2</category><category>CPU</category><category>Data Manager</category><category>Europa</category><category>G DATA Security Labs</category><category>GLAST</category><category>Gaia Bottà</category><category>Garante per la privacy</category><category>ICANN</category><category>Information tecnology</category><category>Microsoft® Italia</category><category>Microsoft® Office Web Components</category><category>Nasa</category><category>Netscape</category><category>Olivennes</category><category>Opera</category><category>PDF</category><category>Phoenix</category><category>Polizia Postale</category><category>Pubblica Amministrazione</category><category>SMS</category><category>San Valentino</category><category>Semantic Web</category><category>Social Network</category><category>Software Libero</category><category>TCP/IP</category><category>Vista</category><category>Windows Server 2003</category><category>Windows® 7</category><category>Word 2003</category><category>aggiornamenti Microsoft Vista</category><category>aggiornamenti office 2003</category><category>antibufala</category><category>antispyware</category><category>bluetooth</category><category>carta di credito</category><category>chat</category><category>clima</category><category>collasso Internet</category><category>colonnello Umberto Rapetto</category><category>concorso</category><category>criminali informatici</category><category>criptazione</category><category>database</category><category>dvd</category><category>effetti 3d</category><category>estensione Noscript di Firefox</category><category>gps</category><category>grafica tridimensionale</category><category>hacker</category><category>hard disk</category><category>interoperabilità</category><category>kernel</category><category>motore di ricerca</category><category>mp3</category><category>musica</category><category>nLite</category><category>open source</category><category>senatrice Rita Levi Montalcini</category><category>sharing</category><category>vLite</category><category>video</category><category>videogames</category><category>virtuale</category><category>vulnerabilità</category><category>vulnerabilità XSS</category><category>wireless</category><category>www</category><category>www.bernardotti.it</category><category>www.i-dome.com</category><category>www.quirinale.it/</category><category>zombie</category><category>2008</category><category>2008 Anno europeo del dialogo interculturale</category><category>22 Aprile &quot;Earth Day&quot; yes I care ....</category><category>8 marzo</category><category>AICA</category><category>AIE</category><category>ATT</category><category>Altroconsumo</category><category>Angela Merkel</category><category>Ansa</category><category>Antonio Troise</category><category>Aol</category><category>Apple</category><category>Autorità per le Garanzie nelle Comunicazioni</category><category>BIT</category><category>BitTorrent</category><category>Blackberry</category><category>Blue Coat</category><category>Bollettino Sicurezza Microsoft® Marzo 2008</category><category>Braille</category><category>CNET</category><category>CNR</category><category>Cassazione</category><category>Cina</category><category>Commodore 64</category><category>Community</category><category>Dario Bonacina</category><category>Documento Programmatico sulla Sicurezza</category><category>Emanuela Di Pasqua</category><category>Enrico Franceschini</category><category>Exchange Server 2007</category><category>Expert System</category><category>Explorer</category><category>Firefox</category><category>Foggia</category><category>Foneros</category><category>Gamma Ray</category><category>Giappone</category><category>Google Calendar</category><category>Google Maps</category><category>Guida</category><category>H3G</category><category>Hewlett-Packard</category><category>Hijacker</category><category>IE8</category><category>IPv4</category><category>IPv6</category><category>ISP</category><category>IT</category><category>Image Spam</category><category>Internet Point</category><category>Internet Service Provider</category><category>Internet® Explorer 8</category><category>Italia</category><category>Javascript</category><category>Le Scienze</category><category>Levysoft</category><category>Major</category><category>Marco Valerio Principato</category><category>Margherita Rosciano</category><category>McAfee</category><category>Microsoft Office 2007</category><category>Microsoft Office 2007 Enterprise Edition®</category><category>Microsoft Surface™</category><category>Mozilla Firefox</category><category>Msn</category><category>Neapolis.blog della Rai</category><category>Network</category><category>Newbbie</category><category>Nobel</category><category>Office</category><category>Office Communications Server®</category><category>Oled</category><category>One laptop per child</category><category>Optical tempest</category><category>PLIO</category><category>Papa Benedetto XVI</category><category>Plain Language</category><category>Playstation</category><category>Policy</category><category>Polizia di Stato</category><category>PopUp</category><category>Postepay</category><category>Reuters</category><category>Ryanair</category><category>SP1</category><category>SQL Injection</category><category>SQL Server 2008</category><category>Sardegna</category><category>Screen</category><category>Search Engine</category><category>SecurityLabs Trend Micro</category><category>Service Pack 1</category><category>Social Networking</category><category>Stati Uniti</category><category>Symbian</category><category>Telecom-Italia</category><category>The Pirate Bay</category><category>Together in Diversity</category><category>Top Level Domain</category><category>UAV</category><category>UK</category><category>Update</category><category>Viacom</category><category>VisionPost</category><category>Viviane Reding</category><category>Vodafone</category><category>WEBSENSE</category><category>WIRED</category><category>Washingtonpost</category><category>Web Trend Map</category><category>Wii</category><category>WinPenPack</category><category>Windows Server 2008</category><category>Windows ® Vista</category><category>Windows® Vista SP1</category><category>access point</category><category>acronimo</category><category>adware</category><category>aggiornamento protezione S.O.</category><category>antirootkit</category><category>antispam</category><category>archiviazione</category><category>atti notarili</category><category>attivissimo.blogspot.com</category><category>bambini</category><category>bancomat</category><category>binario</category><category>broadband</category><category>bullismo</category><category>captcha</category><category>cellulari</category><category>cervello</category><category>chiavetta USB</category><category>cluster</category><category>codice HTML</category><category>codice penale</category><category>condivisione file</category><category>contenuti on line</category><category>corsi e seminari</category><category>darwin-online.org.uk</category><category>dialer</category><category>disabilità</category><category>disco rigido</category><category>dispositivi mobili</category><category>domini fake</category><category>driver Sata</category><category>email</category><category>email fraudolenta</category><category>emissioni di anidride carbonica</category><category>exploit</category><category>fibra ottica</category><category>file</category><category>film</category><category>frequenze</category><category>gestori telefonici</category><category>gioco on line</category><category>happy-2008.exe</category><category>iPod</category><category>identità</category><category>incendio</category><category>information and Communication Technology</category><category>intercettare</category><category>ipovedenti</category><category>laptop</category><category>link</category><category>login</category><category>mail spazzatura</category><category>master boot record</category><category>mobile</category><category>moddare</category><category>motherboard</category><category>multimedia</category><category>nLite Guida</category><category>neapolis.blog.rai.it</category><category>neuroscienze</category><category>nick</category><category>online</category><category>peer-to-peer</category><category>petizione</category><category>phisher</category><category>pirateria informatica</category><category>preservativo</category><category>prevenzione</category><category>proxy server</category><category>radio web</category><category>release</category><category>reti</category><category>riciclaggio denaro sporco</category><category>robotica</category><category>router La Fonera</category><category>script</category><category>scuola</category><category>servizio antispam</category><category>sistemi di cifratura</category><category>social engineering</category><category>software COGITO</category><category>spamhaus.org</category><category>spamming</category><category>spot</category><category>stand-by</category><category>tariffario spammer</category><category>tastiera</category><category>trattamento dati</category><category>utenti</category><category>utility</category><category>vLite Final</category><category>vulnerabilita</category><category>web browser</category><category>web semantico</category><category>worm</category><category>www.coe.int</category><category>www.interculturaldialogue2008.eu</category><category>www.lastampa.it.</category><category>www.mediamente.rai.it</category><category>www.prevx.com</category><category>xenofobia</category><category>&quot;COMUNICARE SICURI&quot;</category><category>11 settembre</category><category>16° anniversario strage di Capaci</category><category>2 Giugno Festa Nazionale della Repubblica</category><category>2 coccodrilli</category><category>20 ottobre 2008</category><category>2000</category><category>2003</category><category>2007</category><category>25 Aprile</category><category>32bit</category><category>3d</category><category>60 anni della Carta Costituzionale</category><category>64bit</category><category>899</category><category>9 maggio &quot;Giorno della memoria&quot; delle vittime del terrorismo e delle stragi</category><category>937287</category><category>949358</category><category>ABUSE</category><category>ALU</category><category>ATM</category><category>AUP</category><category>AVG Anti-Virus Free 8.0</category><category>Abruzzo</category><category>Academic Entrepreneurs Award 2008</category><category>Accenture</category><category>Acer</category><category>ActiveX</category><category>Adriano Albano</category><category>Africa</category><category>Agenzia Europea dell&#39;Ambiente (AEA)</category><category>Agenzia Spaziale Europea</category><category>Agenzia delle Entrate</category><category>Agorà</category><category>Ajax</category><category>Al Gore</category><category>Alan Ralsky</category><category>Albert</category><category>Alcatel-Lucent</category><category>Alessandro Fadini</category><category>Alessandro Longo</category><category>Alto Adige</category><category>American Academy of Arts and Letters</category><category>Amiga 500</category><category>Amnesty International</category><category>Andrea Monti</category><category>Annalisa Spedicato</category><category>Antifraud Command Center</category><category>Antiphishing Working Group</category><category>Antonello Venditti</category><category>Application Programming InterfaceAPI</category><category>Arezzo</category><category>Ariane-5</category><category>Asociazione anti digital divide</category><category>Assicurazioni Generali</category><category>Atkinson</category><category>Atom 8GB</category><category>Atti DISCOVER</category><category>Australia</category><category>Australian Airlines</category><category>Avv. Valentina Frediani</category><category>Avviso di vulnerabilità</category><category>BBC</category><category>BIOS</category><category>BKDR_SINOWAL.CF</category><category>BPI</category><category>Backdoor:W32/Agent.CTH</category><category>Backdoor:W32/Agent.CVU</category><category>Banca Fideuram</category><category>Bari</category><category>Barry Mendelow</category><category>Basic Input - Output System</category><category>Basilicata</category><category>Benazir Bhutto</category><category>Benzoy</category><category>Berkeley</category><category>BigG</category><category>Biofisica</category><category>Bleu Med</category><category>Boeing</category><category>Bollettino Sicurezza Microsoft Gennaio 2008</category><category>Bollettino Sicurezza Microsoft® 23 Gennaio 2008</category><category>Bollettino Sicurezza Microsoft® Maggio 2008</category><category>Bono U2</category><category>Borse di Studio</category><category>Bra</category><category>British Columbia</category><category>British Institutes di Foggia</category><category>British Telecom</category><category>Brute Force Attack</category><category>Bruxelles</category><category>Business Software Alliance</category><category>CEST</category><category>CETS: sistema di tracciamento contro la pedopornografia</category><category>CIE</category><category>CIO</category><category>CNIPA</category><category>CNN</category><category>CORECOM</category><category>CREDITO D&#39;IMPOSTA</category><category>CRS4 dei Laboratori di Sardegna DistrICT</category><category>Calabria</category><category>Camera di Commercio di Milano</category><category>Campania</category><category>Canada</category><category>Cape Canaveral</category><category>Carola Eppink</category><category>Caterpillar</category><category>Cc</category><category>Ccn</category><category>Chad</category><category>Chamois</category><category>Charles Darwin</category><category>CharmingBurka</category><category>China&#39;s &quot;lotus feet&quot;women crippled for beauty&quot;</category><category>Cicli di Clock</category><category>Cina: le donne dai piedi di loto</category><category>Cisco Visual Networking Index (VNI)</category><category>Claudia Fusani</category><category>Cliff Kushler</category><category>Codex Sinaiticus</category><category>Colombia</category><category>Comcast</category><category>Come rimuovere i graffi dai cd e dvd</category><category>Come sei bella Roma</category><category>Comitato Europeo</category><category>Commodore 4040</category><category>Computer Crime Research Center</category><category>Computer(at)Donna</category><category>Computeronlineworld</category><category>Computerword</category><category>Confindustria</category><category>Consortium Garr</category><category>Consulentelegaleinformatico.it</category><category>Consulentelegaleprivacy.it</category><category>Convenzione mondiale Onu</category><category>Corso di Alta Formazione</category><category>Corte dei Conti</category><category>Corte di Giustizia Europea</category><category>Cosmo SkyMed</category><category>Costituzione della Repubblica Italiana</category><category>Croce Rossa Italiana</category><category>Cross-site scripting (XSS)</category><category>Cryzip</category><category>CurrPorts</category><category>CyberLover</category><category>CyberLover.ru</category><category>D.L. n.196</category><category>DHS USA</category><category>DIVERSITY: Culture_ Gender and Math</category><category>DMCA</category><category>DNS Checker</category><category>DPS</category><category>DRAM</category><category>DRM</category><category>Daniel Nocera</category><category>Danimarca</category><category>Data Hijacking</category><category>Debian</category><category>Dell</category><category>Device</category><category>Devil Mountain Software</category><category>Didael</category><category>Digital Divide hi-tech</category><category>Dipartimento di Fisica Università di Bari</category><category>Distretto di Columbia</category><category>Distributed Denial of Service</category><category>Dizionario informatico</category><category>DoQui Acta</category><category>DoS</category><category>Domain Name System</category><category>Domini di Weiss</category><category>Dominio di terzo livello</category><category>Doubleclick</category><category>Download Statusbar</category><category>Dreamspark</category><category>Drive Max</category><category>Ducati</category><category>Ducati Corse</category><category>E-stop</category><category>EA Games. Will Writh</category><category>ECDL</category><category>EFF</category><category>ERUNT e NTREGOPT</category><category>EULA</category><category>Edward Davidson</category><category>Egitto</category><category>Egolab</category><category>Elementi per la vita</category><category>Elitel</category><category>Ema</category><category>Email-Worm:W32/Zhelatin.TQ</category><category>Emergency</category><category>Energy Globe 2008</category><category>Enrico Gregori</category><category>Eric Ly</category><category>Ericsson</category><category>Esa</category><category>Esof 2008</category><category>Euroscience Open Forum</category><category>Eutelsat</category><category>Excel</category><category>Exchange</category><category>Extended Validation Secure Sockets Layer (EV SSL)</category><category>FAA</category><category>FCC</category><category>FTP</category><category>Fakeale Trojan</category><category>Fandango Film</category><category>Fast Flux</category><category>Femidom</category><category>Festival Creatività</category><category>Fidelity Card</category><category>Fight the Fog</category><category>Finmeccanica</category><category>Firefox®</category><category>Flash</category><category>Flickr</category><category>FlightStats</category><category>Flooder</category><category>Florence Nightingale</category><category>Forefront (CodeName Stirling)</category><category>Forrester Consulting</category><category>Forum PA 2008</category><category>Foxit Reader 2.3 Build 2825</category><category>FragFinn</category><category>Franca Rame</category><category>Francesco Celentano</category><category>Francia</category><category>Free Software Foundation</category><category>Freebase</category><category>Frequenze la nuova competizione</category><category>GPCode</category><category>Gabriella Mira Marq</category><category>Galileonet.it</category><category>Gamma-ray</category><category>Gammina.AG</category><category>Gat Safe Online</category><category>Gender</category><category>Geo-Browsing di immagini</category><category>GeoEye-1</category><category>Gerard Hodgkinson</category><category>Ggoal</category><category>Gianni Rodari</category><category>Giochi Olimpici di Pechino</category><category>Giurista di impresa</category><category>Give One-Get One</category><category>Global Voices Online a Budapest</category><category>Google Earth</category><category>Google Italia</category><category>Google Ricerca libri</category><category>Google Sky</category><category>Google Toolbar</category><category>Google adwords</category><category>Goolag</category><category>Gordon Brown</category><category>Governo</category><category>Grande Fratello</category><category>Greasemonkey</category><category>Greenpeace</category><category>Grisoft</category><category>Gromozon</category><category>Gsm/Umts</category><category>Guardia di Finanza</category><category>Guida alla distribuzione</category><category>H-city</category><category>H-play</category><category>H-umus</category><category>HDD</category><category>HIV</category><category>HMRC</category><category>HP</category><category>HP Italia</category><category>HTC Caspertech criptofonino P3450</category><category>HTML</category><category>Harvard</category><category>Hello.com</category><category>Honeywell</category><category>Hotmail</category><category>Hyundai-Kia</category><category>I bambini non si toccano</category><category>I giovani e le scienze 2008</category><category>I-doser</category><category>IE7</category><category>IEBlog</category><category>IFPI</category><category>IGF</category><category>IIA</category><category>IIS</category><category>IMHO</category><category>IP</category><category>IPS</category><category>ISS</category><category>IT-Academy</category><category>ITPRO</category><category>ITU</category><category>ITU (International Telecomunication Union)</category><category>ITU Council 2008</category><category>Ian Fischer</category><category>Ifpi Internet. Major P2P</category><category>Il mondo di Loki</category><category>Imagine Cup</category><category>Imation Atom Flash Drive</category><category>Industrial Designers of America</category><category>Information Technology</category><category>Infosec</category><category>Infosecurity</category><category>Infratel</category><category>Innovazioni Tecnologiche</category><category>Insieme nella diversità</category><category>Internet Explorer7</category><category>Internet Watch Foundation</category><category>Internet bill of rights</category><category>Internet e Diritto</category><category>Intesa Sanpaolo e Unioncamere</category><category>Iomega eGo Camo Portable Hard Drive USB 2.0 250GB</category><category>Iraq</category><category>It eco-compatibile</category><category>Italia.it</category><category>Italy</category><category>JS_AFIR.A</category><category>JS_AGENT.AEVE</category><category>JS_SMALL.QT</category><category>Java</category><category>Jeremy Jaynes</category><category>JetBlue</category><category>JoomlaDay italiano</category><category>José Manuel  Barroso</category><category>Jules Verne</category><category>June 21st 1948</category><category>Just You</category><category>KaZaA</category><category>Kaspersky Lab</category><category>Kazunari Sugimitsu</category><category>Know-how</category><category>L&#39;arca di Noè</category><category>L&#39;origine delle specie per opera della selezione naturale</category><category>LEXID</category><category>LG</category><category>LG Chem</category><category>LILA</category><category>LOL</category><category>La Stampa</category><category>Lady Swinfen</category><category>Landing Zone</category><category>Large Area Space Telescope</category><category>Larry Page</category><category>Laser</category><category>Learnissimo</category><category>LetMe Type</category><category>Life Trust Foundation</category><category>Light Way</category><category>Linden dollar</category><category>LinkedIn</category><category>Linux mobile</category><category>Live Documents</category><category>Live Search Maps</category><category>Live Search Virtual Earth™</category><category>Lobster Eye X-ray Imaging Device</category><category>Los Angeles 2008</category><category>Love Rose</category><category>Luca Chittaro</category><category>Lucio Stanca</category><category>Luxor</category><category>M&#39;illumino di meno 2008</category><category>MAAWG</category><category>MAV</category><category>MBR</category><category>MBR-rootkit</category><category>MClips</category><category>MIT(Massachusetts institute of technology)</category><category>MMS</category><category>MPack</category><category>MS07-030</category><category>MS07-06</category><category>MS07-065</category><category>MS07-61</category><category>MSN Messenger</category><category>MSNLOCK</category><category>MSRC</category><category>MUX/UCR</category><category>Mac OSX</category><category>Mac OS®</category><category>MacOS X</category><category>Mafe de Baggis</category><category>Mailbox Exchange</category><category>Marco Consoli</category><category>Markus Kison</category><category>Matrix</category><category>Maurer</category><category>Mauro Ferrari</category><category>Max Donelan</category><category>McAfee Avert Labs</category><category>Me/2000/XP/2003/Vista/Windows mobile</category><category>Mebroot</category><category>Medici senza Frontiere</category><category>Megalab.it</category><category>Messaging Anti-Abuse Working Group</category><category>Miami</category><category>Microsoft Expression 2</category><category>Microsoft Live OneCare</category><category>Microsoft Office</category><category>Microsoft Office Communicator</category><category>Microsoft Office Live Workspace</category><category>Microsoft Publisher</category><category>Microsoft Windows Defender</category><category>Microsoft Windows XP Service Pack 2</category><category>Microsoft ®</category><category>Microsoft: come vaccinare il Pc</category><category>Microsoft® Excel</category><category>Microsoft® Office 2007</category><category>Microsoft® Office 2007 System</category><category>Microsoft® Office Excel 2007</category><category>Microsoft® Outlook</category><category>Microsoft® Vista SP1</category><category>Mike Kernell</category><category>Milano 23 aprile 2008</category><category>Mimique Android concept phone</category><category>Ministero della Difesa</category><category>Ministero della Pubblica Istruzione</category><category>Ministro On. Paolo Gentiloni</category><category>Missing Children Europe</category><category>Mobile Devices</category><category>Modena</category><category>Molise</category><category>Momenta</category><category>Monster.com</category><category>More than Zero</category><category>Motorola EDA MC75</category><category>Mountain View</category><category>Multi-touch</category><category>Multi-user</category><category>NESTA</category><category>NGN</category><category>NIST</category><category>NORAD</category><category>NSA</category><category>Nat Geo Music</category><category>Nat Geo Wild</category><category>Natale</category><category>National Institute of Standards and Technology</category><category>Nature</category><category>Neil Stinchcombe</category><category>Nel 2048 l&#39;appartamento virtuale per i nonni</category><category>NetConsulting</category><category>New York Times</category><category>News Aggregator</category><category>Next generation network</category><category>Next-Gen PC Design Competition</category><category>Nicholas G. Carr</category><category>Nicholas Negroponte</category><category>Nicole Kidman</category><category>Nielsen</category><category>Nielsen Online</category><category>NineMillion.org</category><category>Nintendo</category><category>Nintendo DS</category><category>Nobel per la pace</category><category>Nokia</category><category>Nucleo Speciale Frodi Telematiche della Guardia di Finanza</category><category>Nuwar-E</category><category>Nòva100</category><category>OBEX</category><category>OCSE</category><category>ODF</category><category>OECD</category><category>OEM</category><category>ONU</category><category>OS</category><category>OSI</category><category>Ocr</category><category>Office 2007</category><category>Office® System 2007</category><category>Ogg Vorbis</category><category>Olimpiadi di Informatica 2008</category><category>On. Maurizio Gasparri</category><category>Opa</category><category>Open ID Foundation</category><category>Open Office</category><category>Open Solaris</category><category>OpenContent</category><category>OpenCv</category><category>OpenDNS</category><category>OpenOffice</category><category>OpenOffice.org</category><category>OpenOffice.org 2.3.1</category><category>Opera Mini 4.1.11355</category><category>Operazione Norad Tracks Santa 2007</category><category>Opera®</category><category>Optical Time-Domain Eavesdropping Risks of CRT Displays</category><category>Orkut</category><category>Osservatorio Congiunturale promosso da Anie</category><category>Osservatorio della Ricerca</category><category>Outlook</category><category>Overflow</category><category>Oxford</category><category>PDC</category><category>PDoS</category><category>PM</category><category>PMI</category><category>PUPs</category><category>PanImages</category><category>Panasonic</category><category>Panda Security</category><category>PandaLabs</category><category>Paolo De Andreis</category><category>Parco solare di Grottaglie (TA)</category><category>Pasqua 2008</category><category>Pearl S.Buck</category><category>Permanent Denial-of-service</category><category>Peter Scharr</category><category>Phoenix è atterrato: Prime immagini di Marte da Phoenix</category><category>Physical Optics Corporation</category><category>Piattaforma di Gestione Documentale</category><category>Picasa</category><category>Play4Film.com</category><category>Playstation 3</category><category>Plug  and  play</category><category>Pod</category><category>Polfemo</category><category>Polis</category><category>PornWare</category><category>Posta Elettronica Certificata</category><category>Poste Italiane</category><category>Premio Anipla</category><category>Premio Pulitzer</category><category>Presdo</category><category>Presidente della Repubblica Italiana - Giorgio Napolitano</category><category>Programmi</category><category>Psiphon</category><category>Psiphonodi</category><category>Psiphoris</category><category>Puglia</category><category>Quantenna Communications</category><category>Quick Time</category><category>RAIUtile-Economia</category><category>RAM</category><category>RNA</category><category>ROM</category><category>RSS</category><category>Rainews24</category><category>Random Access Memory</category><category>Read Only Memory</category><category>Recovery</category><category>Redmond</category><category>Regione Piemonte</category><category>Regione Puglia</category><category>Regione Veneto</category><category>Richard Clayton</category><category>Rilasciato Windows XP Service Pack 3 (SP3)</category><category>Risk Analysis</category><category>RiskWare</category><category>Robert Soloway</category><category>Roberto Saia</category><category>Roberto Venturini</category><category>Rockin&#39; Valentine</category><category>Rockphish</category><category>Rodotà</category><category>Rogueware</category><category>Roma Capoccia</category><category>RootkitBuster</category><category>RunOnce</category><category>Rupert Murdoch</category><category>Russia</category><category>Rustock</category><category>S.O. Personalizzato</category><category>SEEWEB</category><category>SKY National Geographic Channel</category><category>SLcamp</category><category>SMAU2008</category><category>SOWM 2008</category><category>SP2</category><category>SPC</category><category>SQL</category><category>STMV</category><category>SUN</category><category>Sacem</category><category>Safari</category><category>Safari®</category><category>Safer Internet Forum 2008</category><category>Santiago de la Mora</category><category>Sarah Palin</category><category>Security Guide Microsoft</category><category>Serena Patierno</category><category>Sergey Brin</category><category>ServicePack2</category><category>ServicePack3</category><category>Sicilia</category><category>Sidney (Australia)</category><category>Silicon Valley</category><category>Sims</category><category>Sinoval</category><category>Sky</category><category>Sky canale 130</category><category>Sky canale 405</category><category>SkyLife</category><category>Small Business Innovation Research</category><category>Small Scale Experimental Machine</category><category>Social Network Orkut</category><category>Software Design</category><category>Sole 24 ore</category><category>Sony</category><category>South Africa National Health Laboratory Service</category><category>Spagna</category><category>Speech-to speech Translator</category><category>Sprite</category><category>Stato delle madri nel Mondo 2008</category><category>Stazione Spaziale</category><category>Steven Sinofsky</category><category>Storage Expo</category><category>Stormworm family</category><category>Summer DistrICT Camp</category><category>Surface™ Computing</category><category>Svizzera</category><category>Swap 2007</category><category>Swiss telecoms</category><category>Swype</category><category>Symbian Installation Source</category><category>Symposium on Usable Privacy and Security</category><category>System Builder</category><category>T9</category><category>TELLME Networks</category><category>TERAHERTZ cosa sono</category><category>TF1</category><category>TIC</category><category>TIM</category><category>TLD</category><category>TOS</category><category>TROJ_AGENT.AFF</category><category>TROJ_ALUREON.AE TROJ_ALUREON.AE</category><category>TROJ_ALUREON.AH TROJ_ALUREON.AH</category><category>TROJ_ALUREON.AI TROJ_ALUREON.AI</category><category>TROJ_DNSCHANG.CS TROJ_DNSCHANG.CS</category><category>TROJ_SINOWAL.CB</category><category>TROJ_SMALL.LDZ</category><category>TechCrunch50</category><category>TechFest 2008</category><category>Tecnopolis</category><category>Telespazio</category><category>Telstra</category><category>Tempest magnetico</category><category>Teredo</category><category>Terres des Hommes</category><category>Test</category><category>Texas</category><category>Text Mining</category><category>Thales Alenia Space</category><category>The Next Web now: tutta l&#39;essenza del web</category><category>The University of Manchester</category><category>TheOpenCD</category><category>Thomson</category><category>Tooway</category><category>Tossico</category><category>Total Immersion</category><category>Trani (Ba)</category><category>Triple-Play</category><category>Troj/Dwnldr-HDG</category><category>Troj/Ransom-A</category><category>Trojan Orkut.AT</category><category>Trojan febbraio</category><category>Trojan horse</category><category>Trojan usa e getta</category><category>Trojan-Dropper:W32/Agent.DYD</category><category>Tutorial</category><category>Tux Typing</category><category>U.S. Department of Commerce</category><category>UDP</category><category>UFC</category><category>UGC</category><category>URI</category><category>USB</category><category>Ulteo</category><category>Umberto Rapetto</category><category>Unicaresoft</category><category>Università di Bari Dipartimento di Informatica</category><category>Università di Cambridge</category><category>Università di Toronto</category><category>Unversal</category><category>Uranium Backup</category><category>Uranium Backup 6.3.0</category><category>UrbanTool</category><category>VPN</category><category>VeriSign</category><category>Videotelefono per i sordi</category><category>Virgin</category><category>Virtual Machine</category><category>Visual Studio 2008</category><category>Vittorio Zucconi</category><category>Vivian Reding</category><category>VoIp</category><category>W32/MSNworm</category><category>WHOIS</category><category>WMA</category><category>WORM_HITAPOP.O</category><category>WS</category><category>WSRI</category><category>Wan</category><category>Warcraft-WoW</category><category>Watercone</category><category>Web Knowledge Company</category><category>Web Trend Map  2007</category><category>Web Trend Map 2008</category><category>Web hosting</category><category>Webmail</category><category>White Organic Light Emitting Diode</category><category>WiMax</category><category>Wideband</category><category>Wiki</category><category>Wikipedia</category><category>Wild Web Wood</category><category>Wind</category><category>Windows 7</category><category>Windows Auto</category><category>Windows Live Messenger</category><category>Windows Live OneCare</category><category>Windows MediaPlayer</category><category>Windows Mobile</category><category>Windows Mobile by E-MOTION</category><category>Windows Vista®</category><category>Windows Vista®  Service Pack 1 (SP1)</category><category>WindowsUpdateAgent30-x86-x64.exe</category><category>Windows® 2000</category><category>Windows® Live SkyDrive</category><category>Windows® Server 2003</category><category>Windows® Server 2008</category><category>Woled</category><category>World Association of Newspapers</category><category>World Economic Forum</category><category>World Information Access (WIA)</category><category>XNA Game Studio</category><category>XP</category><category>XP personalizzato</category><category>Xbox</category><category>XiTi</category><category>ZLOB TROJ_ZLOB.CCW</category><category>Zettabyte</category><category>Zoomlinux</category><category>accordo</category><category>active scan</category><category>add-on</category><category>adesivo COA</category><category>ads</category><category>advisory</category><category>aereo</category><category>aggiornamento</category><category>aiuti umanitari</category><category>algoritmo</category><category>alimentatore</category><category>all-Ip</category><category>allarme</category><category>amministratore di sistema</category><category>anniversario</category><category>anonimo</category><category>ansia</category><category>anti-phishing</category><category>apparecchiature</category><category>appello a favore della libertà di informazione</category><category>appello-bufala</category><category>applicazione</category><category>aragosta</category><category>arstechnica.com</category><category>aste online</category><category>astronomia</category><category>atari</category><category>attacchi</category><category>autenticazione</category><category>autorità giudiziaria</category><category>autovelox</category><category>avatar</category><category>babbo natale</category><category>babele digitale</category><category>back orifice</category><category>background</category><category>backup dati</category><category>banca dati</category><category>banner</category><category>batteria</category><category>beautifulpeople</category><category>beauty.jpg</category><category>beta version</category><category>biglietti aerei online</category><category>biotecnologie industriali</category><category>blog.trendmicro.com</category><category>blogging</category><category>bollettino Sicurezza Aprile 2008</category><category>bookmarks</category><category>brevetti</category><category>broadcast</category><category>buffer di memoria</category><category>bundle</category><category>calcolatore</category><category>calcolatore digitale</category><category>calcolatrice</category><category>campi elettromagnetici</category><category>canale satellitare</category><category>carta d&#39;identità elettronica</category><category>carte fedeltà</category><category>casa digitale</category><category>casella vocale</category><category>catastrofe</category><category>cavi fibrolaser</category><category>cdrom</category><category>censura</category><category>certificazione SGS Reliability Laboratory</category><category>cfm48.com</category><category>chiave di registro</category><category>chiavetta</category><category>chip</category><category>chipset</category><category>cibernetica</category><category>circuiti elettronici</category><category>class action</category><category>clock</category><category>clonare carte di credito</category><category>codec</category><category>codice JavaScript</category><category>codice binario</category><category>codici PIN</category><category>codici maligni</category><category>collegamento internet</category><category>comandi vocali</category><category>computer di famiglia</category><category>computer vision</category><category>computerizzazione</category><category>concorso Juvenes Translatores</category><category>condom</category><category>configurazione</category><category>connettività</category><category>console</category><category>consumo etico e ecocompatibile</category><category>contenuti digitali</category><category>conto corrente</category><category>converter</category><category>copyright criptazione Darknet</category><category>corpo umano</category><category>crach</category><category>crack</category><category>cracker</category><category>crave.cnet.co.uk/</category><category>crime proof</category><category>crimini informatici</category><category>cristallografia</category><category>criteri account</category><category>critero password</category><category>crittografia</category><category>cross-site request forgery (CSRF)</category><category>cui prodest</category><category>cultura</category><category>curia.europa.eu</category><category>cyber</category><category>cyber attacco</category><category>cyberbullismo</category><category>cybercriminali</category><category>cybersquatting</category><category>dada.net</category><category>dati</category><category>deep packet inspection</category><category>desktop</category><category>differenza di genere</category><category>digital life</category><category>digitale terrestre</category><category>diritti</category><category>diritti umani</category><category>diritto delle telecomunicazioni</category><category>disabili</category><category>discomgoogolation</category><category>disturbi neurologici</category><category>docx</category><category>e-Citizen</category><category>e-Crime Congress 2008</category><category>e-Juba</category><category>e-banking</category><category>e-commerce</category><category>eLearning Point 2008</category><category>effetti speciali</category><category>elettricità</category><category>elettroni</category><category>elettronica</category><category>elettronico</category><category>elezioni 13 e 14 aprile 2008</category><category>embeddare</category><category>embedding</category><category>emirati arabi</category><category>energia</category><category>enforcement</category><category>epidemia buona</category><category>epifania</category><category>esciencenews.com</category><category>euro</category><category>europei di calcio 2008</category><category>ex Birmania</category><category>fMRI</category><category>falso scoop</category><category>famiglia cristiana</category><category>far infrared</category><category>fck2009.exe</category><category>feed RSS</category><category>fiaccola olimpica</category><category>fiamme</category><category>filastrocca</category><category>filtering</category><category>filtri</category><category>firma digitale</category><category>firmware</category><category>fisica</category><category>flash memory stick</category><category>flop</category><category>floppy</category><category>focus.it.</category><category>formattazione</category><category>forum</category><category>forum Microsoft®</category><category>fullpress.it</category><category>futuroalfemminile</category><category>gap</category><category>geek</category><category>gentiloni.g(at)avvocati-ass.com</category><category>gioco</category><category>greco</category><category>guida all&#39;uso in italiano di Foxit Reader 2.3 Build 2825</category><category>guida interattiva</category><category>hacher</category><category>hachers</category><category>halloween</category><category>happy2008.exe</category><category>happy_2008.exe</category><category>happycards2008.com</category><category>happynewyear.exe</category><category>happynewyear2008.exe</category><category>header</category><category>host providers</category><category>hsdpa</category><category>http</category><category>http://www.uraniumbackup.com/</category><category>https</category><category>human rights</category><category>i-dome network</category><category>iFrame</category><category>iTunes</category><category>il mercato degli angeli</category><category>immagini</category><category>importanza dell&#39;amore per la sopravvivenza umana</category><category>impulsi di clock</category><category>in-the-wild</category><category>incompatibilità</category><category>indicizzare</category><category>indirizzo</category><category>industria</category><category>infomare</category><category>innovazioni</category><category>insegnanti</category><category>integrazione</category><category>interfaccia</category><category>internauta</category><category>internauti</category><category>internet explorer8</category><category>invio telematico</category><category>itu.int/cybersecurity</category><category>jasus</category><category>junk mail</category><category>killare</category><category>lamer</category><category>lart</category><category>lartare</category><category>latino</category><category>laurea Honoris Causa</category><category>laureateci.it</category><category>layout</category><category>led</category><category>leggende metropolitane</category><category>letteratura americana</category><category>liberalizzazione domini</category><category>licenza LGPL</category><category>linguaggi</category><category>linguaggio assembly</category><category>loads.cc</category><category>low cost</category><category>made in Italy</category><category>mail</category><category>mailing list</category><category>manuale di informatica</category><category>manuali per il backup e la compattazione del Registro di Sistema</category><category>marketing</category><category>mash-up</category><category>matematica</category><category>materiale didattico gratuito</category><category>media player</category><category>mediaset</category><category>meeting</category><category>memoria storica</category><category>mercato</category><category>merrychristmasdude.com</category><category>messaggi pubblicitari</category><category>messaggio</category><category>messaggistica</category><category>metropolitana di Torino</category><category>microchip</category><category>microfono laser</category><category>microsoft learnig®</category><category>microspia</category><category>migrazione</category><category>mini-USB</category><category>miniDSLAM</category><category>missione impossibile</category><category>mobile banking</category><category>money mules</category><category>mouse</category><category>msdewey</category><category>msdn</category><category>nLite v.1.4Final</category><category>nLitos</category><category>nanotechnology</category><category>nanotecnologie</category><category>nerdic</category><category>netizen</category><category>new media</category><category>newsletter</category><category>notebook</category><category>numerazioni satellitari</category><category>oneITSecurity</category><category>opcode</category><category>open relay</category><category>openid.net</category><category>operatori di telefonia</category><category>opportunità lavorative</category><category>oubreak</category><category>oxygen 3</category><category>pace</category><category>pagine web</category><category>pakistan</category><category>palmare PALM</category><category>pandalabs.pandasecurity.com</category><category>pandasecurity</category><category>pannelli solari adesivi</category><category>parallelismo</category><category>partizione</category><category>pay-per-click</category><category>pay-tv</category><category>pc</category><category>pcworld.com</category><category>pedopornografia</category><category>pen drive</category><category>penna USB</category><category>periferica</category><category>periferiche</category><category>phising</category><category>phlashing</category><category>piccole imprese</category><category>pinguino</category><category>pipeline</category><category>piramidi</category><category>pixel</category><category>plugin</category><category>politecnico di Torino</category><category>polizia</category><category>porte</category><category>powerpoint</category><category>preferiti</category><category>premio Nobel</category><category>prezzi</category><category>privnote</category><category>problemi sicurezza</category><category>procedura telematica</category><category>processo</category><category>professionisti IT</category><category>progetto 10 alla 100</category><category>programmabilità</category><category>proprietà intellettuale</category><category>protocollo IP</category><category>protocollo Internet</category><category>protocollo dati BIS</category><category>protocollo di Kyoto</category><category>proxy</category><category>pubblicità</category><category>pump-and-dump</category><category>put the reader first</category><category>quando è sera</category><category>radar</category><category>radio guardia costiera</category><category>raimasoft</category><category>ransomware</category><category>real time</category><category>recaptcha.net</category><category>recuperare dati</category><category>recupero dati</category><category>recupero file</category><category>recupero hard disk</category><category>registro IP o PC</category><category>registro dei flag</category><category>registro di sistema</category><category>registry</category><category>remailer</category><category>rendering</category><category>retail</category><category>reti digitali</category><category>reti informatiche</category><category>ricerca-sviluppo-cooperazione</category><category>riconoscimento e gestione comportamenti minacciosi</category><category>riesame</category><category>rifiuti elettronici</category><category>ripristino</category><category>riservatezza personale</category><category>ritardi</category><category>rogito</category><category>rojan</category><category>router</category><category>rtl</category><category>salinità acqua di Marte</category><category>scanner tridimensionale</category><category>scansione</category><category>scheda madre</category><category>scienza</category><category>screensaver demenziali</category><category>script maligno</category><category>scuola primaria</category><category>scuola secondaria</category><category>segnalibri</category><category>selezione</category><category>semantica cerebrale</category><category>semiconduttori</category><category>servizi a valore aggiunto non richiesti</category><category>sex.mp3e love.rm</category><category>shack</category><category>shopgreen.pricegrabber.co.uk</category><category>showreel</category><category>sicurezza IT</category><category>sieropositivo</category><category>silenzio-assenso</category><category>sistema pubblico di connettività</category><category>sistemi IT</category><category>siti curiosi</category><category>skydrive</category><category>slurping</category><category>social bookmarking</category><category>software open source</category><category>software semantico</category><category>software suite</category><category>soggetto giuridico</category><category>space invaders</category><category>sperimentazione</category><category>spoofing</category><category>spore</category><category>stage</category><category>standalone</category><category>stealth</category><category>storage</category><category>streaming gratuito</category><category>stress</category><category>stripshow.exe</category><category>strumenti di amministrazione</category><category>studiocelentano</category><category>suffisso .it</category><category>supercomputer</category><category>sviluppo</category><category>sviluppo siti web</category><category>tag</category><category>tangram</category><category>tecnologie dell’informazione</category><category>telematica</category><category>tempo reale</category><category>terminologia</category><category>terremoto</category><category>testina</category><category>tools</category><category>touch-screen</category><category>touchscreen</category><category>tracciamento spammer</category><category>tracciare</category><category>traduttore</category><category>traffic shaping</category><category>transaction ID</category><category>trojan-spy</category><category>turismo</category><category>tutela minori</category><category>tv</category><category>tv giapponese</category><category>tv on demand</category><category>tv satellitare</category><category>twww.caterueb.rai.it</category><category>typo-squatting</category><category>uhavepostcard.com</category><category>unicode</category><category>unimondo.oneworld.net</category><category>upgrade</category><category>username</category><category>utopia</category><category>vacanze</category><category>valentine.exe</category><category>vettore Delta</category><category>viaggi</category><category>videoconferenza</category><category>videosorveglianza</category><category>violenza alle donne</category><category>virtualizzazione</category><category>virus Netsky</category><category>virus virtuale</category><category>virus writer</category><category>vishing</category><category>wav</category><category>web 3.0</category><category>wep</category><category>world Wide Web</category><category>www.aduc.it</category><category>www.afdigitale.it</category><category>www.avg.com</category><category>www.b2b24.ilsole24ore.com</category><category>www.c-cube.it</category><category>www.commissariatodips.it</category><category>www.daniloamerio.com</category><category>www.darwinday.org</category><category>www.digg.com</category><category>www.eea.europa.eu/</category><category>www.esa.int</category><category>www.estense.com</category><category>www.expobg.it</category><category>www.expobg.it/rollpage</category><category>www.f-secure.com</category><category>www.foxitsoftware.com</category><category>www.futuroalfemminile.it</category><category>www.galileonet.it</category><category>www.ggoal.com</category><category>www.google.it/transit</category><category>www.howgreenareyou.it</category><category>www.ilsole24ore.com</category><category>www.informationweek.com</category><category>www.intoscana.it</category><category>www.junior.rai</category><category>www.lanuovaecologia.it</category><category>www.laptop.org</category><category>www.lefigaro.fr</category><category>www.messagelabs.com</category><category>www.natgeowild.it/</category><category>www.osservatoriosullalegalita.org</category><category>www.pandasecurity.com</category><category>www.pcadvisor.co.uk</category><category>www.poliziadistato.it</category><category>www.primadanoi.it</category><category>www.quirinale.it/costituzione/costituzione.htm</category><category>www.radio.rai.i</category><category>www.radio.rai.it</category><category>www.raiutile.rai.it</category><category>www.sophos.com</category><category>www.sophos.it</category><category>www.spamhaus.org</category><category>www.teche.rai.it</category><category>www.telefonoarcobaleno.org</category><category>www.tellme.com</category><category>www.tiseiconnesso.it</category><category>www.trustedsource.org</category><category>www.tweakness.net</category><category>www.virtualglobaltaskforce.com</category><category>www.visionpost.it</category><category>www.winpenpack.com</category><category>«Baby»</category><category>“certificate.exe”</category><title>Tecnopolis-Hi</title><description></description><link>http://tecnopolis-hi.blogspot.com/</link><managingEditor>noreply@blogger.com (Tecnopolis-Hi)</managingEditor><generator>Blogger</generator><openSearch:totalResults>511</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-7547308462879156612</guid><pubDate>Wed, 24 Dec 2008 08:30:00 +0000</pubDate><atom:updated>2008-12-24T09:36:14.262+01:00</atom:updated><title>Auguri</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimDoSkyrfajAz_N-j8_cpBjcSqlRZCBm_FWGQORoiGlf9SnslbbeZ965hrUaSJCoEnVWY2zBKewlpammSndKCJN59YnN_QA0ohRUn4bx1CjG2GsGJXtEFqv5x7WK9xMD6fJDYLPx5VAzk/s1600-h/natale.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5283272554917095842&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 196px; CURSOR: hand; HEIGHT: 320px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimDoSkyrfajAz_N-j8_cpBjcSqlRZCBm_FWGQORoiGlf9SnslbbeZ965hrUaSJCoEnVWY2zBKewlpammSndKCJN59YnN_QA0ohRUn4bx1CjG2GsGJXtEFqv5x7WK9xMD6fJDYLPx5VAzk/s320/natale.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;&lt;em&gt;Tecnopolis-Hi augura ai suoi lettori &lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;&lt;em&gt;un Sereno Natale&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#333399;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/12/auguri.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimDoSkyrfajAz_N-j8_cpBjcSqlRZCBm_FWGQORoiGlf9SnslbbeZ965hrUaSJCoEnVWY2zBKewlpammSndKCJN59YnN_QA0ohRUn4bx1CjG2GsGJXtEFqv5x7WK9xMD6fJDYLPx5VAzk/s72-c/natale.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-3685069015524727510</guid><pubDate>Thu, 04 Dec 2008 20:23:00 +0000</pubDate><atom:updated>2008-12-04T21:41:46.467+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Dreamspark</category><category domain="http://www.blogger.com/atom/ns#">Imagine Cup</category><category domain="http://www.blogger.com/atom/ns#">Information Technology</category><category domain="http://www.blogger.com/atom/ns#">IT-Academy</category><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><category domain="http://www.blogger.com/atom/ns#">Microsoft Expression 2</category><category domain="http://www.blogger.com/atom/ns#">Software Design</category><category domain="http://www.blogger.com/atom/ns#">SQL Server 2008</category><category domain="http://www.blogger.com/atom/ns#">Windows Server 2008</category><category domain="http://www.blogger.com/atom/ns#">XNA Game Studio</category><title>Microsoft per gli studenti universitari</title><description>&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;/span&gt;&lt;/em&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheSYucZPTgHw5X6qqnP6EscFb6N4WQAtlCT1ZnWG5qS79LeGLcfiArqoTcU7PtTGs0-wn3TymHtDJHNrHVGSHhC9ckZyVjeU0t4I_fvPK7CZhY9c9-naKgDYfWB-H4fLuNrU-5wr-zJU8/s1600-h/footer.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5276033542214431122&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 96px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheSYucZPTgHw5X6qqnP6EscFb6N4WQAtlCT1ZnWG5qS79LeGLcfiArqoTcU7PtTGs0-wn3TymHtDJHNrHVGSHhC9ckZyVjeU0t4I_fvPK7CZhY9c9-naKgDYfWB-H4fLuNrU-5wr-zJU8/s320/footer.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Anche quest&#39;anno Microsoft ha pensato a voi studenti universitari con una serie di iniziative gratuite.&lt;br /&gt;Ecco le principali:&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=10975536&amp;amp;s1=4b110b5b-960f-1fee-333e-c3adda90f018&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Software Microsoft? Gratis e subito con DreamSpark&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Da oggi tutti gli studenti universitari in possesso di un account email universitario posso accedere gratuitamente al download di:&lt;br /&gt;-Microsoft Expression 2 (Sviluppo siti web e interfacce)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;-Windows Server 2008&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;-Visual Studio 2008&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;-SQL Server 2008&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;-XNA Game Studio (Crea games per XBOX360 e PC)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;- IT-Academy (Training Online gratuito)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Non attendere oltre, scarica subito il software &lt;/span&gt;&lt;a href=&quot;http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=10975537&amp;amp;s1=4b110b5b-960f-1fee-333e-c3adda90f018&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;qui&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=10975538&amp;amp;s1=4b110b5b-960f-1fee-333e-c3adda90f018&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Imagine Cup 2009&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Al via la settima edizione di Imagine Cup.Nove categorie, da semplici quiz online, passando per la creazione di games sino allo sviluppo di applicazioni software.Il montepremi supera i 200.000$.&lt;br /&gt;Come procedere?&lt;br /&gt;1- Registrati e scegli le categorie &lt;/span&gt;&lt;a href=&quot;http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=10975539&amp;amp;s1=4b110b5b-960f-1fee-333e-c3adda90f018&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;qui&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;!&lt;br /&gt;2- &lt;/span&gt;&lt;a href=&quot;http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=10975540&amp;amp;s1=4b110b5b-960f-1fee-333e-c3adda90f018&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Guarda i video&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt; delle precedenti finali italiane della categoria Software Design.&lt;br /&gt;3- Scarica gratuitamente tutto il Software Microsoft per partecipare al concorso.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;a href=&quot;http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=10975542&amp;amp;s1=4b110b5b-960f-1fee-333e-c3adda90f018&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Cerchi lavoro? Student to Business&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Sei uno studente universitario di Information Technology e vuoi mettere in pratica ciò che hai imparato all&#39;Università?&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=10975543&amp;amp;s1=4b110b5b-960f-1fee-333e-c3adda90f018&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Registrati subito sul sito &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;e candidati per le posizioni disponibili.&lt;br /&gt;- Oltre 1.000 Studenti hanno trovato lavoro&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;- Oltre 100 offerte disponibili in questo momento&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;- Oltre 200 aziende Partner di Microsoft hanno aderito all&#39;iniziativa.&lt;/span&gt;&lt;/div&gt;&lt;div&gt; &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;em&gt;&lt;strong&gt;Resize&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/12/microsoft-per-gli-studenti-universitari.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheSYucZPTgHw5X6qqnP6EscFb6N4WQAtlCT1ZnWG5qS79LeGLcfiArqoTcU7PtTGs0-wn3TymHtDJHNrHVGSHhC9ckZyVjeU0t4I_fvPK7CZhY9c9-naKgDYfWB-H4fLuNrU-5wr-zJU8/s72-c/footer.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-6202774733686248099</guid><pubDate>Wed, 03 Dec 2008 18:42:00 +0000</pubDate><atom:updated>2008-12-03T19:47:55.901+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">master boot record</category><category domain="http://www.blogger.com/atom/ns#">MBR</category><category domain="http://www.blogger.com/atom/ns#">Mebroot</category><category domain="http://www.blogger.com/atom/ns#">Sinoval</category><category domain="http://www.blogger.com/atom/ns#">trojan</category><category domain="http://www.blogger.com/atom/ns#">vulnerabilità</category><title>Sinowal Trojan attacca MBR</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3_ZranyZ7DwxRcgR9a27pnP9lGN-a7a4wAmsu_uWiZa94k1VIrDKfbEOBLiB28hhrKjvC8MIeqcSd6AbRWtTMvORXJz-ttca0vJg2NX2w8r3JIVBH02EdxoXn39JiSRVASeQfBmG_RjU/s1600-h/sinowal.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5275636821852837922&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 307px; CURSOR: hand; HEIGHT: 307px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3_ZranyZ7DwxRcgR9a27pnP9lGN-a7a4wAmsu_uWiZa94k1VIrDKfbEOBLiB28hhrKjvC8MIeqcSd6AbRWtTMvORXJz-ttca0vJg2NX2w8r3JIVBH02EdxoXn39JiSRVASeQfBmG_RjU/s320/sinowal.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;em&gt;A distanza di due anni non è ancora stata trovata una soluzione definitiva al Sinowal Trojan, chiamato anche Mebroot. Raccoglie i dati d&#39;accesso di account di servizi bancari e numeri di carte di credito, insediandosi in modalità invisibile (dopo aver modificato le routine di basso livello di Windows) nell&#39;MBR (Master Boot Recorder) del disco fisso, si autoavvia quando si accende il pc prima che venga caricato il sistema operativo. Questo trojan sfrutta le vulnerabilità dei componenti multimediali sul web nonchè le varie vulnerabilità dei browser. Non modifica nulla ma copia il proprio codice e lo inserisce nei settori e nelle tracce libere del disco fisso. &lt;/em&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;em&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/em&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;em&gt;Resize&lt;/em&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/12/sinowal-trojan-attacca-mbr.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3_ZranyZ7DwxRcgR9a27pnP9lGN-a7a4wAmsu_uWiZa94k1VIrDKfbEOBLiB28hhrKjvC8MIeqcSd6AbRWtTMvORXJz-ttca0vJg2NX2w8r3JIVBH02EdxoXn39JiSRVASeQfBmG_RjU/s72-c/sinowal.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-1574499518536367387</guid><pubDate>Thu, 27 Nov 2008 14:11:00 +0000</pubDate><atom:updated>2008-11-27T15:17:30.134+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">chat</category><category domain="http://www.blogger.com/atom/ns#">nick</category><category domain="http://www.blogger.com/atom/ns#">Second Life</category><category domain="http://www.blogger.com/atom/ns#">virtuale</category><category domain="http://www.blogger.com/atom/ns#">Web</category><title>Tradita via web</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiKw13GFqr-IlcZjpMm10IuWvgNTEaNiMJy8yyxx5_NM00_UZ4Foi86qW-polswcf7UzCMr7db0-f120J1SsqsvcFuC16jWlBd4WOpX_5qE_tbrdeWMY-gt_tj1VNeMcapo3vd8jGR6Kc/s1600-h/tradimento.jpg&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5273340806584854050&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 300px; CURSOR: hand; HEIGHT: 219px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiKw13GFqr-IlcZjpMm10IuWvgNTEaNiMJy8yyxx5_NM00_UZ4Foi86qW-polswcf7UzCMr7db0-f120J1SsqsvcFuC16jWlBd4WOpX_5qE_tbrdeWMY-gt_tj1VNeMcapo3vd8jGR6Kc/s320/tradimento.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Se la chat, le vite virtuali, i blog, le web-community stanno pian piano cambiando le relazioni, stanno anche portando con sé nuove dinamiche di coppia, di innamoramento, di amori e tradimenti. E infatti pare che cominci ad essere il problema di coppia del nuovo millennio, tanto che al riguardo sono già state fatte fior fiore di indagini, studi e statistiche: il tradimento via web, è vero tradimento? Per tradimento virtuale si possono intendere una miriade di cose: il fidanzato che fa il &#39;piacione&#39; in chat, quello che si diverte a sedurre sconosciute dai nick names accattivanti, il ragazzo che si costruisce un avatar su Second Life e fa il Dongiovanni (cominciano a circolare molti aneddoti sulle scappatelle virtuali: ad esempio quella coppia che si conosce, si sposa e divorzia virtualmente, ma con tanta passione da finire in tribunale sul serio!). Ma tutto ciò non significa che nella vita reale poi il vostro uomo arriverebbe a sedurre un&#39;altra ragazza. Anzi spesso è proprio l&#39;anonimato a renderlo così audace, mentre voi sapete bene che è un timidone maldestro! Però quella volta che ha lasciato la finestra di chat aperta, e voi non avete resistito a dare una sbirciatina, bam! Un colpo al cuore! Avete letto cose che proprio non potevate neanche immaginare potessero uscire dalla sua bocca (ops, tastiera). Ebbene sì, il vostro fidanzato gioca a fare il seduttore via web, e i toni che usa sono di una malizia sconcertante... nessuna donna può negare che fa male scoprire questi scheletri nell&#39;armadio. Virtuale o no, è sempre una ferita vedere che la persona che amate si &#39;esercita&#39; nell&#39;arte della seduzione con altre ragazze!&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://donne.it.msn.com/relazioni/notizie/articolo.aspx?cp-documentid=11157758&quot;&gt;Fonte&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;em&gt;Resize&lt;/em&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/11/tradita-via-web.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiKw13GFqr-IlcZjpMm10IuWvgNTEaNiMJy8yyxx5_NM00_UZ4Foi86qW-polswcf7UzCMr7db0-f120J1SsqsvcFuC16jWlBd4WOpX_5qE_tbrdeWMY-gt_tj1VNeMcapo3vd8jGR6Kc/s72-c/tradimento.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-3174203382785915564</guid><pubDate>Tue, 25 Nov 2008 18:48:00 +0000</pubDate><atom:updated>2008-11-25T19:58:17.708+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Ansa</category><category domain="http://www.blogger.com/atom/ns#">aste online</category><category domain="http://www.blogger.com/atom/ns#">eBay</category><title>eBay mette in vendita bebe</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlMVFamJVI9K8bGAe06OctrMguytacZpNWaXX87A5-1xKiJNvNW4D5ZWunqwZQvVk6y4cv-qJv0_NmTgP79zwtpQEXy4ghK6qJiwLuqbfQaRRxvL9MfqOBRDZgFNcGdsFuVngkCC7KHnU/s1600-h/bebe.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5272670996611817682&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 172px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlMVFamJVI9K8bGAe06OctrMguytacZpNWaXX87A5-1xKiJNvNW4D5ZWunqwZQvVk6y4cv-qJv0_NmTgP79zwtpQEXy4ghK6qJiwLuqbfQaRRxvL9MfqOBRDZgFNcGdsFuVngkCC7KHnU/s320/bebe.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;em&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;La notizia arriva dall&#39;ANSA e riporta la vendita di un neonato attraverso i canali di eBay, nota piattaforma di aste online. La compravendita, però, ha lasciato una traccia individuata da un giornalista olandese che ne ha fatto prontamente denuncia alle autorità. Al momento il bimbo di 4 mesi è rimasto affidato alla coppia olandese che lo aveva acquistato da una coppia belga.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://temporeale.libero.it/libero/news/2008-11-24_124281546.html&quot;&gt;Fonte&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;em&gt;&lt;strong&gt;Resize&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/11/ebay-mette-in-vendita-bebe.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlMVFamJVI9K8bGAe06OctrMguytacZpNWaXX87A5-1xKiJNvNW4D5ZWunqwZQvVk6y4cv-qJv0_NmTgP79zwtpQEXy4ghK6qJiwLuqbfQaRRxvL9MfqOBRDZgFNcGdsFuVngkCC7KHnU/s72-c/bebe.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-8244260255785712152</guid><pubDate>Sun, 23 Nov 2008 16:05:00 +0000</pubDate><atom:updated>2008-11-23T17:16:43.269+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">IE8</category><category domain="http://www.blogger.com/atom/ns#">IEBlog</category><category domain="http://www.blogger.com/atom/ns#">internet explorer8</category><category domain="http://www.blogger.com/atom/ns#">Microsoft®</category><title>Internet Explorer 8 disponibile solo nel 2009</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiDEoDFGphvC7NxAbxGbQCfhHnPOui7WDd-sGYx725rijOrH91R6cUj4kUE1DYuP7S_W_MKmt7uBE4xFTxRPdfGqrMBGLe4JQfWuqmcjbcqj0cPn8ehQtVuX0__-DObbBtezyhPOjfP7Q/s1600-h/internet_explorer_logo.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5271887172811245602&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 182px; CURSOR: hand; HEIGHT: 177px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiDEoDFGphvC7NxAbxGbQCfhHnPOui7WDd-sGYx725rijOrH91R6cUj4kUE1DYuP7S_W_MKmt7uBE4xFTxRPdfGqrMBGLe4JQfWuqmcjbcqj0cPn8ehQtVuX0__-DObbBtezyhPOjfP7Q/s320/internet_explorer_logo.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Come annunciato da Dean Hachamovitch, General Manager, Internet Explorer, sul IEBlog giorno 19, &lt;/span&gt;&lt;a href=&quot;http://blogs.msdn.com/ie/archive/2008/11/19/ie8-what-s-after-beta-2.aspx&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;http://blogs.msdn.com/ie/archive/2008/11/19/ie8-what-s-after-beta-2.aspx&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;, l&#39;uscita di Internet Explorer 8 Candidate Release, sarà disponibile solo nei primi mesi del 2009. Questo slittamento fa prevedere l&#39;uscita della versione definitiva, tanto attesa per le sue innovazioni, solo dopo il primo semestre del prossimo anno.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000066;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/11/internet-explorer-8-disponibile-solo.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiDEoDFGphvC7NxAbxGbQCfhHnPOui7WDd-sGYx725rijOrH91R6cUj4kUE1DYuP7S_W_MKmt7uBE4xFTxRPdfGqrMBGLe4JQfWuqmcjbcqj0cPn8ehQtVuX0__-DObbBtezyhPOjfP7Q/s72-c/internet_explorer_logo.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-8726067743483997396</guid><pubDate>Fri, 21 Nov 2008 19:35:00 +0000</pubDate><atom:updated>2008-11-21T20:41:56.119+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">AICA</category><category domain="http://www.blogger.com/atom/ns#">computer di famiglia</category><category domain="http://www.blogger.com/atom/ns#">e-Citizen</category><category domain="http://www.blogger.com/atom/ns#">e-learning</category><category domain="http://www.blogger.com/atom/ns#">ECDL</category><category domain="http://www.blogger.com/atom/ns#">famiglia cristiana</category><category domain="http://www.blogger.com/atom/ns#">WS</category><title>WS e Famiglia Cristiana: un nuovo modo per avvicinare le tecnologie quotidiane</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigvWytH3kwmBCtSXHGhjkI_xTsa0R2_Xoj7GJ7OMElJnbmSj3pS9rA6rwJ3C21Vd5M39jXDoSFkBPUqCqXazgU-O2VCvg3h3W_0BA6S-nS_vOtSlcFfPrJqXpYUU8RILc9iXSyykwIH4Q/s1600-h/famiglia_cristiana.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5271197631698629970&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 137px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigvWytH3kwmBCtSXHGhjkI_xTsa0R2_Xoj7GJ7OMElJnbmSj3pS9rA6rwJ3C21Vd5M39jXDoSFkBPUqCqXazgU-O2VCvg3h3W_0BA6S-nS_vOtSlcFfPrJqXpYUU8RILc9iXSyykwIH4Q/s320/famiglia_cristiana.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;E’ in edicola da oggi 20 novembre “Il Computer di Famiglia”, il progetto di Famiglia Cristiana dedicato a chi vorrebbe accrescere le proprie conoscenze e capacità nel mondo del Computer e delle tecnologie quotidiane, coordinato e realizzato da WS e promosso in questi giorni con campagne stampa, tv, radio e on line.“Ideale per chi non sa niente, sorprendente per chi sa tutto”: il pay-off del prodotto ben rappresenta lo spirito che anima il progetto: i contenuti sono stati espressamente pensati per approcciare il ricco universo degli strumenti digitali che tanto ampliano le nostre potenzialità e via via modificano le nostre abitutini e stili di vita. Seguendo i filmati e gli esempi pratici sarà semplice apprendere come inviare e ricevere messaggi e fotografie sul cellulare, scattare fotografie con la macchina fotografica digitale e inviarle ai propri cari con la posta elettronica, trascrivere sul computer le proprie ricette, racconti o documenti per conservarli o inviarli ai propri amici. Inoltre, si imparerà a cercare informazioni comodamente e in modo sicuro da casa via internet, individuare le migliori offerte di prodotti e servizi per focalizzare e migliorare gli acquistied, eventualmente,evitare lunghe code in negozi e uffici pubblici sfruttando i servizi online a disposizione di tutti.La collana è composta da 12 uscite settimanali in abbinamento a Famiglia Cristiana le quali conterranno 12 filmati video da vedere sul televisore di casa, per imparare comodamente insieme a tutta la famiglia, 48 approfondimenti tematici per soddisfare gli utenti più esperti, 360 esercitazioni da fruire tramite il Computer per esercitarsi e verificare quello che si è imparato con prove ed esercizi mirati, 12 manuali cartacei da 48 pagine per avere sempre a disposizione le lezioni su tutti gli argomenti trattati nell’opera e un sito web dedicato (&lt;/span&gt;&lt;a href=&quot;http://www.computerdifamiglia.it/&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;http://www.computerdifamiglia.it/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;) per mantenersi aggiornati e condividere quanto imparato.Il corso di formazione “Il Computer di Famiglia” permette inoltre di acquisire tutte le competenze e le conoscenze necessarie per ottenere la certificazione e-Citizen, un programma di certificazione internazionale sviluppato dalla ECDL Foundation (European Computer Driving Licence Foundation) e gestito per l’Italia da AICA (Associazione Italiana per l’Informatica ed il Calcolo Automatico), che ha patrocinato il progetto.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://www.fullpress.it/articolo.aspx?ID=29702&quot;&gt;Fonte&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000066;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/11/ws-e-famiglia-cristiana-un-nuovo-modo.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigvWytH3kwmBCtSXHGhjkI_xTsa0R2_Xoj7GJ7OMElJnbmSj3pS9rA6rwJ3C21Vd5M39jXDoSFkBPUqCqXazgU-O2VCvg3h3W_0BA6S-nS_vOtSlcFfPrJqXpYUU8RILc9iXSyykwIH4Q/s72-c/famiglia_cristiana.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-4820600226586365059</guid><pubDate>Wed, 19 Nov 2008 23:25:00 +0000</pubDate><atom:updated>2008-11-20T00:32:58.864+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">antivirus</category><category domain="http://www.blogger.com/atom/ns#">Malware</category><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><category domain="http://www.blogger.com/atom/ns#">Microsoft Live OneCare</category><category domain="http://www.blogger.com/atom/ns#">sicurezza informatica</category><category domain="http://www.blogger.com/atom/ns#">software</category><title>Microsoft: Onecare in pensione, nuovo antivirus sara&#39; gratis</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVoFs68ZnK8llnZN1opx5BLA8iH-d4JNDgGay-0OfN5TEEWlmE8PVk-jgJ883ONnbcH-g0BTifd2UHI8q_z-R2VcvPJ25DeFmIeht7DTQ64Fgznol8QrLm3zQoJK2mF6OFTFyVKLjuIz0/s1600-h/OneCare.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5270514649034338130&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 160px; CURSOR: hand; HEIGHT: 187px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVoFs68ZnK8llnZN1opx5BLA8iH-d4JNDgGay-0OfN5TEEWlmE8PVk-jgJ883ONnbcH-g0BTifd2UHI8q_z-R2VcvPJ25DeFmIeht7DTQ64Fgznol8QrLm3zQoJK2mF6OFTFyVKLjuIz0/s320/OneCare.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;A due anni e mezzo dal lancio, il programma Windows Live Onecare per la sicurezza informatica si prepara ad andare in pensione. Al suo posto Microsoft introdurra&#39;, a partire dalla seconda meta&#39; del 2009, un software antivirus gratuito.&lt;br /&gt;Attivato nel maggio del 2006, OneCare offre, per 50 dollari all&#39;anno, un sistema di protezione contro il malware piu&#39; alcune funzionalita&#39; non strettamente correlate alla sicurezza, come il sistema di ottimizzazione delle risorse del computer.&lt;/span&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://www.studiocelentano.it/d.asp?id=42934&amp;amp;opt=tlc#&quot;&gt;Fonte&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/11/microsoft-onecare-in-pensione-nuovo.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVoFs68ZnK8llnZN1opx5BLA8iH-d4JNDgGay-0OfN5TEEWlmE8PVk-jgJ883ONnbcH-g0BTifd2UHI8q_z-R2VcvPJ25DeFmIeht7DTQ64Fgznol8QrLm3zQoJK2mF6OFTFyVKLjuIz0/s72-c/OneCare.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-1335456833550618430</guid><pubDate>Tue, 18 Nov 2008 21:15:00 +0000</pubDate><atom:updated>2008-11-18T22:24:19.666+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Egolab</category><category domain="http://www.blogger.com/atom/ns#">film</category><category domain="http://www.blogger.com/atom/ns#">Google adwords</category><category domain="http://www.blogger.com/atom/ns#">new media</category><category domain="http://www.blogger.com/atom/ns#">Play4Film.com</category><category domain="http://www.blogger.com/atom/ns#">showreel</category><category domain="http://www.blogger.com/atom/ns#">streaming gratuito</category><title>Play4Film portale per scaricare i film in tutto il mondo</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMd49_gUGcoTKqWQM-heL56glU_uqchgUyKkTH1IANXIm5NprFqufPsMmliU_xcU26QLIBw28rIzxc0ZEsQQV6UgtmfS7O3pLqcntHKGxTagbl_2g8jaQkZejAdAfl-MesvohyBgBo8OM/s1600-h/pellicola.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5270111411434954290&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 225px; CURSOR: hand; HEIGHT: 130px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMd49_gUGcoTKqWQM-heL56glU_uqchgUyKkTH1IANXIm5NprFqufPsMmliU_xcU26QLIBw28rIzxc0ZEsQQV6UgtmfS7O3pLqcntHKGxTagbl_2g8jaQkZejAdAfl-MesvohyBgBo8OM/s320/pellicola.bmp&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Nasce Play4Film.com e sceglie Egolab come agenzia new media&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Egolab, New Media Company firma la campagna advertising above the line e marketing sui nuovi media per Play4Film.com, la prima società italiana a lanciare un portale per scaricare film in tutto il mondo, con l’offerta dello streaming gratuito grazie al sostegno della pubblicità.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Ideato e sviluppato in Egolab lo showreel di 20”, l’art work, ovvero l’elevator doorface signage, le locandine e le brochure per la presentazione del brand all’importante AFM American Film Market di Los Angeles. Affidata all’Agenzia, forte delle sue quattro nuove divisioni, tra cui Next per la consulenza, la ricerca e pianificazione su mezzi e strumenti innovativi; la pianificazione media internazionale, caratterizzata dalla campagna Keyword Advertising multilingua su Google adwords, la creazione e sponsorizzazione del contest UGA e l’attività di buzz marketing e seeding targhettizzato, necessario a stimolare la partecipazione dei vloggers al contest.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;http://www.fullpress.it/articolo.aspx?ID=29601&quot;&gt;Fonte&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/11/play4film-portale-per-scaricare-i-film.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMd49_gUGcoTKqWQM-heL56glU_uqchgUyKkTH1IANXIm5NprFqufPsMmliU_xcU26QLIBw28rIzxc0ZEsQQV6UgtmfS7O3pLqcntHKGxTagbl_2g8jaQkZejAdAfl-MesvohyBgBo8OM/s72-c/pellicola.bmp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-165733706384970887</guid><pubDate>Sat, 15 Nov 2008 14:27:00 +0000</pubDate><atom:updated>2008-11-15T15:35:54.694+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">console</category><category domain="http://www.blogger.com/atom/ns#">Nicole Kidman</category><category domain="http://www.blogger.com/atom/ns#">Nintendo DS</category><category domain="http://www.blogger.com/atom/ns#">Playstation</category><category domain="http://www.blogger.com/atom/ns#">Wii</category><title>Nuove tecnologie: quando l&#39;intrattenimento è di casa</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYHQy1ni_puqM4gAh3SSbXjbSbr9EqTe3yHSEKGijnG1DJbsbRjcPM7VG3JKLaN9H5jlwmfvqSg-zr8FJLhYCElXiBIze59Lg8aZ9Qedm3C1X41ToFJk49Giau4jF-GRLd9JdhToq5tTc/s1600-h/Nintendo+DS.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5268892114850776834&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 197px; CURSOR: hand; HEIGHT: 169px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYHQy1ni_puqM4gAh3SSbXjbSbr9EqTe3yHSEKGijnG1DJbsbRjcPM7VG3JKLaN9H5jlwmfvqSg-zr8FJLhYCElXiBIze59Lg8aZ9Qedm3C1X41ToFJk49Giau4jF-GRLd9JdhToq5tTc/s320/Nintendo+DS.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;La novità non sta tanto nell’aumento delle vendite di questi apparecchi, che peraltro sono diffusi già da tempo come oggetto del desiderio di teenager e appassionati hardcore gamers che cercano magic swap ps2, ma nel diverso approccio con cui ad essi ci si avvicina e quindi nel loro target.&lt;br /&gt;La console di videogiochi è entrata a far parte della vita quotidiana di molte famiglie: non più ragazzini che passano i loro pomeriggi da soli davanti allo schermo ma intere famiglie che trascorrono insieme un po’ di tempo libero sfidandosi a colpi di joypad. In principio era la Playstation, che per marcare la sua apertura ad un nuovo pubblico si era tinta di rosa, una strategia di marketing rivolta ad avvicinare anche le ragazze ad un oggetto tipicamente maschile.&lt;br /&gt;Da allora le case produttrici di videogiochi hanno messo in atto le strategie più disparate per ampliare il loro pubblico, anche attraverso scelte di marketing singolari come avere tra i loro testimonial attori e personaggi dello spettacolo ultracinquantenni. E’ il caso della Nintendo che, oltre a scegliere Nicole Kidman per pubblicizzare la sua console portatile Nintendo DS, ha creato pubblicità dallo sfondo casalingo dove mamma e papà osservavano soddisfatti i loro figli che grazie a questa console si divertivano ad imparare l’inglese e la matematica fino a tarda sera nella loro cameretta.&lt;br /&gt;Per non parlare del successo riscosso dalla Wii, sempre di casa supercard Nintendo: in una delle sue prime pubblicità Giorgio Panariello veniva battuto a tennis dalla nonna, stando semplicemente nel salotto di casa.&lt;/span&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://www.fullpress.it/articolo.aspx?ID=29594&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Fonte&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;em&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Sono stata rapita anch&#39;io da questa console e dai giochini matematici, dai quiz, dalla guida alla cucina. Certo non riuscirei mai ad essere al passo con gli accaniti teenagers ma trovo, alcuni dei &quot;giochi&quot; di questa console un passo più intelligenti e didattici rispetto a quelli attualmente in commercio.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;em&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/em&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/11/nuove-tecnologie-quando.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYHQy1ni_puqM4gAh3SSbXjbSbr9EqTe3yHSEKGijnG1DJbsbRjcPM7VG3JKLaN9H5jlwmfvqSg-zr8FJLhYCElXiBIze59Lg8aZ9Qedm3C1X41ToFJk49Giau4jF-GRLd9JdhToq5tTc/s72-c/Nintendo+DS.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-8942429657490058000</guid><pubDate>Sat, 15 Nov 2008 14:20:00 +0000</pubDate><atom:updated>2008-11-15T15:25:26.731+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">recuperare dati</category><category domain="http://www.blogger.com/atom/ns#">recupero dati</category><category domain="http://www.blogger.com/atom/ns#">recupero file</category><category domain="http://www.blogger.com/atom/ns#">recupero hard disk</category><title>I documenti di office sono i dati più preziosi per gli italiani</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcjru_2mfaiXAdSoMuHyZjWYilTk5K5D911-x02d9UuYqvEzwIr42p98m0gG2BhGKW_KNqtRzrPinHzQmSLS4aTXqlIZRG-_gEPp0eC-wf-r0G39IMN1UMpR7RQxhtkRfzI9hTBT3iXL4/s1600-h/harddisk.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5268890227745310210&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 80px; CURSOR: hand; HEIGHT: 80px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcjru_2mfaiXAdSoMuHyZjWYilTk5K5D911-x02d9UuYqvEzwIr42p98m0gG2BhGKW_KNqtRzrPinHzQmSLS4aTXqlIZRG-_gEPp0eC-wf-r0G39IMN1UMpR7RQxhtkRfzI9hTBT3iXL4/s320/harddisk.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Non c’è dubbio che le informazioni in formato digitale offrano notevoli vantaggi agli utenti, per esempio la comodità al momento di salvarle, la facilità nel realizzare ricerche di dati o la capacità di condividerle con diversi utenti. Ciononostante, possono sorgere anche inconvenienti come una possibile perdita di dati causati da guasti ai dispositivi o da cancellazioni involontarie. In questi casi, gli utenti danno importanza ai dati persi in modo diverso a seconda della nazione di origine.&lt;br /&gt;Recovery Labs, azienda leader nel recupero dati, cancellazione sicura e perizia informatica, ha elaborato uno studio con lo scopo di stabilire quali fossero le informazioni più preziose per i suoi clienti. Più di 1.700 persone tra Italia, Spagna, Portogallo, Francia e Germania hanno partecipato a questo studio e queste sono alcune delle conclusioni elaborate.&lt;br /&gt;Per gli italiani ed i portoghesi i documenti più importanti da recuperare sono i documenti di office, rispettivamente con un 72,78% ed un 62,50%, mentre le fotografie si attestano al secondo posto con un 46,15% in Italia ed un 40% in Portogallo. Al contrario, in Spagna (49,48%), Francia (60,63%) e Germania (68,63%) i dati più importanti da recuperare sono le fotografie piuttosto che i documenti di office.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.fullpress.it/articolo.aspx?ID=29591&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Fonte&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/11/i-documenti-di-office-sono-i-dati-pi.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcjru_2mfaiXAdSoMuHyZjWYilTk5K5D911-x02d9UuYqvEzwIr42p98m0gG2BhGKW_KNqtRzrPinHzQmSLS4aTXqlIZRG-_gEPp0eC-wf-r0G39IMN1UMpR7RQxhtkRfzI9hTBT3iXL4/s72-c/harddisk.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-4539803587540952872</guid><pubDate>Fri, 31 Oct 2008 14:54:00 +0000</pubDate><atom:updated>2008-10-31T20:09:00.559+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">halloween</category><title>Halloween on the web</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5kN2tHroiLCwKGCNw1ZdA_u8_VLBJSavQeaMt8XhqjcVhRqiCUmjApUaKP_py2R34T0_NOwRfgw21t-bqK3W71sD3DVIM0xPUkC7AYcozactvIBNbtGo7qRfqWacPWluCqp_aM0Bhq0Q/s1600-h/Tinkerbell-Happy-Halloween.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5263336032192556354&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 298px; CURSOR: hand; HEIGHT: 320px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5kN2tHroiLCwKGCNw1ZdA_u8_VLBJSavQeaMt8XhqjcVhRqiCUmjApUaKP_py2R34T0_NOwRfgw21t-bqK3W71sD3DVIM0xPUkC7AYcozactvIBNbtGo7qRfqWacPWluCqp_aM0Bhq0Q/s320/Tinkerbell-Happy-Halloween.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;em&gt;Brulicano i preparativi per la grande notte di Halloween, festa di origine irlandese che celebra l&#39;ultimo giorno d&#39;estate. Cappelli a punta, cappe e zucche, capeggiano in tutto il web così come siti che ad essa hanno dedicato pagine testuali e grafiche.&lt;br /&gt;&lt;/em&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Segnalo:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;http://www.dienneti.it/feste/halloween.htm&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://www.dienneti.it/feste/halloween.htm&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;(racconti, fiabe, ricette ed immagini)&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;http://www.filastrocche.it/hallo/hallo.asp&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://www.filastrocche.it/hallo/hallo.asp&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;(filastrocche, ricette e costumi)&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;http://www.halloweenight.it/home.asp&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://www.halloweenight.it/home.asp&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;(storia, giochi e feste)&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;http://www.latelanera.com/halloween/&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://www.latelanera.com/halloween/&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;(decorazioni, scherzi e film)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5263334862228057026&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 210px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7OlRgNc7ax2_s9T_berJ-aad7BKZYNT9OJglk3yITV5IcqTlAqqBUSwrzOuF5fcuRhLOBfSLYgnuNnF5PSCewT9FBungkJmZMY5ZaZCfze92crkCB4fjaNgY9jX_feAYFppSiOA6NPcw/s320/Fall%25209-15-08.gif&quot; border=&quot;0&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/halloween-on-web.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5kN2tHroiLCwKGCNw1ZdA_u8_VLBJSavQeaMt8XhqjcVhRqiCUmjApUaKP_py2R34T0_NOwRfgw21t-bqK3W71sD3DVIM0xPUkC7AYcozactvIBNbtGo7qRfqWacPWluCqp_aM0Bhq0Q/s72-c/Tinkerbell-Happy-Halloween.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-1087379860362628083</guid><pubDate>Tue, 28 Oct 2008 23:34:00 +0000</pubDate><atom:updated>2008-10-29T00:44:58.802+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bancomat</category><category domain="http://www.blogger.com/atom/ns#">Blue Coat</category><category domain="http://www.blogger.com/atom/ns#">cybercriminali</category><category domain="http://www.blogger.com/atom/ns#">feed RSS</category><category domain="http://www.blogger.com/atom/ns#">iFrame</category><category domain="http://www.blogger.com/atom/ns#">internauti</category><category domain="http://www.blogger.com/atom/ns#">Malware</category><category domain="http://www.blogger.com/atom/ns#">mash-up</category><category domain="http://www.blogger.com/atom/ns#">sicurezza IT</category><category domain="http://www.blogger.com/atom/ns#">Social Networking</category><category domain="http://www.blogger.com/atom/ns#">SQL</category><category domain="http://www.blogger.com/atom/ns#">Web</category><category domain="http://www.blogger.com/atom/ns#">web 2.0</category><title>L’epidemia di malware richiede un fronte comune</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirnNtStwzKL5pDa2N4C6iqRmi9T0Cb1M9cODDGCsCHyP9bemYsYo84LQq9NGTTyZPMnzIa3R4hHD7wxOKXTSBQcgMzMrloQyn5dUdRL6M62Rim_VueaQpqMlHAKg1_BVRyvaLkLg06mU4/s1600-h/malware.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5262354826630910082&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 222px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirnNtStwzKL5pDa2N4C6iqRmi9T0Cb1M9cODDGCsCHyP9bemYsYo84LQq9NGTTyZPMnzIa3R4hHD7wxOKXTSBQcgMzMrloQyn5dUdRL6M62Rim_VueaQpqMlHAKg1_BVRyvaLkLg06mU4/s320/malware.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;“I cybercriminali si stanno dando un gran daffare in questo periodo: rubano milioni di identità, sottraggono numeri di carte di credito e di bancomat e sferranno una miriade di altri attacchi contro utenti, aziende e siti Web vulnerabili del tutto ignari di ciò che sta accadendo. L’arma preferita di questi criminali è l’iniezione di malware: ogni cinque secondi viene infettata una pagina Web, il triplo rispetto al 2007. I più vulnerabili sono i siti più conosciuti e legittimi, e anche i più remunerativi per i cybercriminali, visto l’enorme numero di visite da parte degli internauti, che presentano vulnerabilità senza patch” spiega Davide Carlesi, Country Manager Blue Coat Italia, e prosegue “All’incirca a metà del 2007, il malware iniettato attraverso iFrame e SQL ha iniziato ad infettare siti Web legittimi e il pubbllico ha cominciato a prestare attenzione agli avvisi di analisti ed esperti della sicurezza IT il cui tono risultava pacato, ma inequivocabile: il Web 2.0 e le sue peculiari caratteristiche come il social networking, i feed RSS, la dinamicità, i contenuti generati dall’utente, le applicazioni mash-up avrebbero rappresentato nuove opportunità per i cybercriminali.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.fullpress.it/articolo.aspx?ID=29293&quot;&gt;Fonte&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/lepidemia-di-malware-richiede-un-fronte.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirnNtStwzKL5pDa2N4C6iqRmi9T0Cb1M9cODDGCsCHyP9bemYsYo84LQq9NGTTyZPMnzIa3R4hHD7wxOKXTSBQcgMzMrloQyn5dUdRL6M62Rim_VueaQpqMlHAKg1_BVRyvaLkLg06mU4/s72-c/malware.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-7532951200556468886</guid><pubDate>Tue, 28 Oct 2008 12:43:00 +0000</pubDate><atom:updated>2008-10-28T13:52:09.874+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">criminali informatici</category><category domain="http://www.blogger.com/atom/ns#">Cybercrime</category><category domain="http://www.blogger.com/atom/ns#">G DATA Security Labs</category><category domain="http://www.blogger.com/atom/ns#">Malware</category><category domain="http://www.blogger.com/atom/ns#">spammer</category><title>Cybercriminali sfruttano la crisi mondiale</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk7JqFHjcORUdkV7Wn_R2mEpLAVhFCu9Lta_4NRK2EgmUtbwfnxqqxys6Mc2VPpCjiIK2caprUJwjsXR_lr59rtSNkxq_vsBSRgU8-3U8j2h1rpQQQGP3sUB2H8DKRtuXoA1awjIV0IZE/s1600-h/cybercrime.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5262186116965909922&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 229px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk7JqFHjcORUdkV7Wn_R2mEpLAVhFCu9Lta_4NRK2EgmUtbwfnxqqxys6Mc2VPpCjiIK2caprUJwjsXR_lr59rtSNkxq_vsBSRgU8-3U8j2h1rpQQQGP3sUB2H8DKRtuXoA1awjIV0IZE/s320/cybercrime.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;La crisi finanziaria globale ha ormai raggiunto dimensioni enormi. I mercati finanziari stanno trattenendo il respiro mentre, secondo quanto stimato da G DATA Security Labs, Spammer e ladri di dati si stanno organizzando per approfittare della situazione.&lt;br /&gt;In quest’ultimo periodo segnato da una congiuntura negativa a livello mondiale gli esperti di G DATA hanno evidenziato un sensibile aumento per quanto riguarda le mail di spam e phishing caratterizzate da un chiaro riferimento alla crisi bancaria. L’obiettivo dei criminali online si presenta vario ed articolato spaziando da truffe per piani di ammortizzazione debiti e clausole dedicate per crediti o prestiti fino ad arrivare al classico furto di dati personali attraverso pagine web infettate da malware. Tra le varie opportunità offerte all’ignaro utente figurano quelle che offrono prestiti fino a 50.000 euro grazie al (presunto) supporto di banche dell’Est Europa che mirerebbero ad espandersi nel Vecchio Continente con offerte particolarmente vantaggiose, proponendo ad esempio, un tasso di interesse pari al 5,5%. Anche le procedure per ottenere tali prestiti risulterebbero estremamente agili e semplificate al fine di invogliare privati, famiglie o società a sottoscrivere un contratto rimandando, spesso e volentieri, a un sito internet fasullo infettato da malware.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://www.fullpress.it/articolo.aspx?ID=29265&quot;&gt;Fonte&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/cybercriminali-sfruttano-la-crisi.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk7JqFHjcORUdkV7Wn_R2mEpLAVhFCu9Lta_4NRK2EgmUtbwfnxqqxys6Mc2VPpCjiIK2caprUJwjsXR_lr59rtSNkxq_vsBSRgU8-3U8j2h1rpQQQGP3sUB2H8DKRtuXoA1awjIV0IZE/s72-c/cybercrime.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-2201783780460607415</guid><pubDate>Mon, 27 Oct 2008 23:58:00 +0000</pubDate><atom:updated>2008-10-28T01:02:18.487+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><category domain="http://www.blogger.com/atom/ns#">online</category><category domain="http://www.blogger.com/atom/ns#">Second Life</category><title>Second Life: omicidio con arresto</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp-70TUI-iwLr1R7Di_5cgExVfUdNAFDNPqWJjf4F4Gp1aIRqoJMlMUbRjcOBQLaGv2y86pGJhn7Zihd56i5EhMGqHwaGM3yghqCaU4sE85J01Ye1pBO_Gl5JLcXMMdwrrE1E1kBZ_fV8/s1600-h/second_life_270605.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5261987941270887202&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 211px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp-70TUI-iwLr1R7Di_5cgExVfUdNAFDNPqWJjf4F4Gp1aIRqoJMlMUbRjcOBQLaGv2y86pGJhn7Zihd56i5EhMGqHwaGM3yghqCaU4sE85J01Ye1pBO_Gl5JLcXMMdwrrE1E1kBZ_fV8/s320/second_life_270605.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Si sposa, ma poi viene lasciata dal marito che ne chiede il divorzio. Lei si infuria, lo uccide e viene arrestata e ora aspetta il processo.&lt;br /&gt;Detta così, potrebbe essere una delle tante ( purtroppo! ) storie di cronache reali che si sentono ogni giorno in Italia e nel mondo.&lt;br /&gt;Ma in questo c&#39;è una particolarità e non indifferente: il matrimonio, il divorzio e l&#39;omicidio del marito sono tutte avvenute online su Internet precisamente su Second Life e hanno visto come unici protagonisti gli avatar dietro cui vi erano realmenente un uomo e una donna che vivevano negli Stati Uniti ad oltre 1000 km di distanza.&lt;br /&gt;Tutto è avvenuto su Internet, tranne il fatto che la moglie tradita, Mayumi Tomari di 43 anni è stata realmente arrestata e aspetta un processo reale che potrebbe condannarla ad una pesante multa di 5000 mila dollari e fino a 5 anni di carcere in quanto la donna avrebbe commesso un reato federale entrando in Second Life con le sembianze dell&#39;ex-marito rubando le relative login e password decidendo poi di distruggere &quot;l&#39;alter-ego vituale&quot; del suo compagno online.&lt;br /&gt;Da sottolineare che sia il matrimonio in Second Life e casi che avvengono nel mondo virtuale che poi vengono portati sotto il controllo e il giudizio della polizia e della magistratura reale non sono rari sopratttutto negli Usa e in Giappone.&lt;br /&gt;E vi sono state,già, delle condanne, come nel caso di due ragazze che avevano rubato in Second Life ed erano state condannate dal giudice a lavori sociali per espiare la propria colpa di un fatto avvenuto in un mondo virtuale nel mondo reale.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.webmasterpoint.org/news/uccide-e-cancella-avatar-su-secon-life-che-aveva-sposata-arrestata-rischia-5-anni-di-galera_p32857.html&quot;&gt;Fonte&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/second-life-omicidio-con-arresto.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp-70TUI-iwLr1R7Di_5cgExVfUdNAFDNPqWJjf4F4Gp1aIRqoJMlMUbRjcOBQLaGv2y86pGJhn7Zihd56i5EhMGqHwaGM3yghqCaU4sE85J01Ye1pBO_Gl5JLcXMMdwrrE1E1kBZ_fV8/s72-c/second_life_270605.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-940042780084145641</guid><pubDate>Mon, 27 Oct 2008 08:46:00 +0000</pubDate><atom:updated>2008-10-27T09:50:33.807+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">access point</category><category domain="http://www.blogger.com/atom/ns#">chipset</category><category domain="http://www.blogger.com/atom/ns#">Quantenna Communications</category><category domain="http://www.blogger.com/atom/ns#">Triple-Play</category><category domain="http://www.blogger.com/atom/ns#">Wi-Fi</category><title>Wireless fino a 1 Gbps</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Sunnyvale, CA –- Quantenna Communications ha risolto i problemi più frustranti legati all&#39;utilizzo delle reti Wi-Fi negli uffici e nelle abitazioni, ovvero punti morti, portata limitata e larghezza di banda non prevedibile. Presentata dopo ben due anni di impegnative attività di test e di sviluppo, la famiglia di chipset Quantenna High Speed (QHS) supera le problematiche di qualità e affidabilità che tradizionalmente compromettono le prestazioni delle reti Wi-Fi. La capacità dei chip Quantenna di garantire un’ampiezza di banda wireless certa permette ai carrier di erogare servizi Triple-Play incluse trasmissioni HDTV su rete wireless in qualsiasi punto dell&#39;ambiente domestico. Oltre che per il mercato Telco, i chipset QHS sono stati progettati anche per access point WiFi, infrastrutture di networking, ed elettronica di consumo. Il footprint limitato – è della dimensione di una scatola di fiammiferi - rende le soluzioni Quantenna estremamente attraenti per i produttori che progettano strumenti di elettronica di consumo di piccole dimensioni – dai DVR, Tv al plasma e console per videogame fino ai piccoli access point o router. Fino ad oggi, in tutto il mondo, le reti aziendali e quelle residenziali presentavano potenziali punti morti, larghezza di banda non garantita, scarsa copertura e interferenze sul segnale.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Fonte: &lt;/span&gt;&lt;a href=&quot;http://www.fullpress.it/&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;http://www.fullpress.it&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/wireless-fino-1-gbps.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-4256880957089614036</guid><pubDate>Sat, 25 Oct 2008 15:36:00 +0000</pubDate><atom:updated>2008-10-29T17:56:51.685+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Boeing</category><category domain="http://www.blogger.com/atom/ns#">Cosmo SkyMed</category><category domain="http://www.blogger.com/atom/ns#">Finmeccanica</category><category domain="http://www.blogger.com/atom/ns#">Ministero della Difesa</category><category domain="http://www.blogger.com/atom/ns#">radar</category><category domain="http://www.blogger.com/atom/ns#">satellite</category><category domain="http://www.blogger.com/atom/ns#">Telespazio</category><category domain="http://www.blogger.com/atom/ns#">Thales Alenia Space</category><category domain="http://www.blogger.com/atom/ns#">vettore Delta</category><title>Cosmo Skymed il satellite-radar tutto italiano</title><description>&lt;em&gt;&lt;/em&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhul5Uy0sF4MtpkK4VS33uoYZRPis71ZvKNsYx4Urjzf-1xy2Zbk2tcqi75r_tK7X0aaL4h-0rD3Jn-MYhxVvNSurRtM8UbeZ9ccxm-1e80Eh6yKux2uc9r0mqZfEoXPUDCKTsbVyBPzyM/s1600-h/cosmo_skymed.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5261119078765716322&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 320px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhul5Uy0sF4MtpkK4VS33uoYZRPis71ZvKNsYx4Urjzf-1xy2Zbk2tcqi75r_tK7X0aaL4h-0rD3Jn-MYhxVvNSurRtM8UbeZ9ccxm-1e80Eh6yKux2uc9r0mqZfEoXPUDCKTsbVyBPzyM/s320/cosmo_skymed.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;em&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;E&#39; decollato regolarmente dalla base spaziale americana di Vandeneberg, in California, il terzo satellite facente parte del programma Cosmo SkyMed tutto italiano, infatti è stato realizzato da Thales Alenia Space e Telespazio. Finmeccanica controlla il 33% di Thales Alenia Space ed il 67% di Telespazio.Il lancio, avvenuto grazie al vettore Delta di proprietà del colosso aerospaziale americano Boeing, darà la possibilità di offrire servizi di osservazione della terra a clienti pubblici e privati. Il radar lanciato scandaglierà la superficie terrestre restituendo immagini ricche di informazioni anche in presenza di nuvole o durante le ore notturne. Al programma Cosmo SkyMed partecipa anche il nostro Ministero della Difesa.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/cosmo-skymed-il-satellite-radar-tutti.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhul5Uy0sF4MtpkK4VS33uoYZRPis71ZvKNsYx4Urjzf-1xy2Zbk2tcqi75r_tK7X0aaL4h-0rD3Jn-MYhxVvNSurRtM8UbeZ9ccxm-1e80Eh6yKux2uc9r0mqZfEoXPUDCKTsbVyBPzyM/s72-c/cosmo_skymed.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-2546831196295584732</guid><pubDate>Thu, 23 Oct 2008 14:59:00 +0000</pubDate><atom:updated>2008-10-23T17:12:18.750+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">2000</category><category domain="http://www.blogger.com/atom/ns#">2003</category><category domain="http://www.blogger.com/atom/ns#">2008</category><category domain="http://www.blogger.com/atom/ns#">aggiornamento</category><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><category domain="http://www.blogger.com/atom/ns#">patch</category><category domain="http://www.blogger.com/atom/ns#">sicurezza</category><category domain="http://www.blogger.com/atom/ns#">Tecnologia</category><category domain="http://www.blogger.com/atom/ns#">Vista</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><category domain="http://www.blogger.com/atom/ns#">XP</category><title>Extra patch per Windows</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg88JFjpEbgALEVBURU0mRqpYqsHre9pi_x2kAVIRbxVZn6ns95zWRbx51cCtlp-kybFD_rLTXWZCy52HkIuBoSfTw0qxWrXPs9Y1nj1PIoJmab4WU57BghNcMmZgJc3T78aLudu0RtrtQ/s1600-h/microsoft.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5260367268751501970&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 222px; CURSOR: hand; HEIGHT: 172px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg88JFjpEbgALEVBURU0mRqpYqsHre9pi_x2kAVIRbxVZn6ns95zWRbx51cCtlp-kybFD_rLTXWZCy52HkIuBoSfTw0qxWrXPs9Y1nj1PIoJmab4WU57BghNcMmZgJc3T78aLudu0RtrtQ/s320/microsoft.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;E gli straordinari si fanno anche in casa Microsoft che ha rilasciato un aggiornamento &quot;non programmato&quot; e definito di livello critico, per i suoi sistemi operativi:&lt;/span&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Microsoft Windows 2000 Service Pack 4&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Windows XP Service Pack 2 e Windows XP Service Pack 3&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Windows Vista and Windows Vista Service Pack 1&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Windows Server 2008 32-bit e x64&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;La vulnerabilità riscontrata riguarda l&#39;esecuzione di un codice remoto.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Maggiori info ai link:&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms08-oct.mspx&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;http://www.microsoft.com/technet/security/bulletin/ms08-oct.mspx&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://blogs.technet.com/msrc/archive/2008/10/22/advance-notification-for-out-of-band-release.aspx&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;http://blogs.technet.com/msrc/archive/2008/10/22/advance-notification-for-out-of-band-release.aspx&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/extra-patch-per-windows.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg88JFjpEbgALEVBURU0mRqpYqsHre9pi_x2kAVIRbxVZn6ns95zWRbx51cCtlp-kybFD_rLTXWZCy52HkIuBoSfTw0qxWrXPs9Y1nj1PIoJmab4WU57BghNcMmZgJc3T78aLudu0RtrtQ/s72-c/microsoft.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-4843373778590670912</guid><pubDate>Thu, 23 Oct 2008 09:01:00 +0000</pubDate><atom:updated>2008-10-23T11:07:13.735+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Atkinson</category><category domain="http://www.blogger.com/atom/ns#">botnet</category><category domain="http://www.blogger.com/atom/ns#">pirateria informatica</category><category domain="http://www.blogger.com/atom/ns#">Sophos</category><category domain="http://www.blogger.com/atom/ns#">spam</category><category domain="http://www.blogger.com/atom/ns#">SPAMHAUS</category><category domain="http://www.blogger.com/atom/ns#">spammer</category><category domain="http://www.blogger.com/atom/ns#">www</category><title>Spammer ricercato dalla polizia americana</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyP9IadXbwi4czp_7SOQpOnOPkzBABkOVCius9D3B_e7X-bl111NBGlhIGd-i6SQolfZsMVxSSjH-JCzAlSMmbEBFWgEFeq4hf4RtmW2ylQQT4w5aT7ymE-qlhl2V3xKqXsuGSKKKOypM/s1600-h/spammer.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5260273313895455634&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 212px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyP9IadXbwi4czp_7SOQpOnOPkzBABkOVCius9D3B_e7X-bl111NBGlhIGd-i6SQolfZsMVxSSjH-JCzAlSMmbEBFWgEFeq4hf4RtmW2ylQQT4w5aT7ymE-qlhl2V3xKqXsuGSKKKOypM/s320/spammer.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Alla fine lo hanno individuato, rintracciandolo pochi giorni fa a Pelican Waters nel Queensland, zona nord ovest dell&#39;Australia. Si tratta di Lance Atkinson, di appena 26 anni e originario della Nuova Zelanda. Stando alla Federal Trade Commission statunitense sarebbe il più pericoloso pirata informatico in circolazione, capace di inviare ben 10 miliardi di mail indesiderate al giorno. Il che significa 115 mila e 741 messaggi al secondo. Tanti, anzi tantissimi. E ora una società di ricerca che da anni analizza il fenomeno, la SpamHaus, sostiene che da Atkinson proveniva un terzo di tutte le mail spazzatura in circolazione su Internet. &lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://www.repubblica.it/2005/b/sezioni/scienza_e_tecnologia/sicurezzaweb/re-spazzatura/re-spazzatura.html&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Continua&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/spammer-ricercato-dalla-polizia.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyP9IadXbwi4czp_7SOQpOnOPkzBABkOVCius9D3B_e7X-bl111NBGlhIGd-i6SQolfZsMVxSSjH-JCzAlSMmbEBFWgEFeq4hf4RtmW2ylQQT4w5aT7ymE-qlhl2V3xKqXsuGSKKKOypM/s72-c/spammer.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-3244043204450310697</guid><pubDate>Sat, 18 Oct 2008 10:37:00 +0000</pubDate><atom:updated>2008-10-18T12:54:20.362+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Innovazioni Tecnologiche</category><category domain="http://www.blogger.com/atom/ns#">Italia</category><category domain="http://www.blogger.com/atom/ns#">Lucio Stanca</category><category domain="http://www.blogger.com/atom/ns#">SMAU2008</category><title>Lucio Stanca:Innovazione Tecnologia italiana in discesa</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWqhdALtBOwh5feKUSjmPGjt4N_5EepAiUkkxAeZqlnALNiEBx0WwlC4O5HDOMzm7-3TIsIRTr7fPNpIsbMlFAgl3rop6uR6gT4aKfIVhky9DT4OP30AMr1z_v9pXtl-cmrVz3IgfpUu0/s1600-h/Smau2008_logo_103x131.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5258445195195877650&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWqhdALtBOwh5feKUSjmPGjt4N_5EepAiUkkxAeZqlnALNiEBx0WwlC4O5HDOMzm7-3TIsIRTr7fPNpIsbMlFAgl3rop6uR6gT4aKfIVhky9DT4OP30AMr1z_v9pXtl-cmrVz3IgfpUu0/s320/Smau2008_logo_103x131.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Il Ministro Lucio Stanca, che alla 45a edizione dello SMAU a Milano, ha affermato che &quot;L&#39;innovazione tecnologica è scesa molto in basso nelle priorità dell&#39;Agenda Italia. E&#39; vero, c&#39;è una contingenza economica che catalizza l&#39;attenzione in altre direzioni, però di innovazione tecnologica si parla sempre meno. E questa è miopia, perchè il motore della crescita della competitività è l&#39;innovazione&quot;. &lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;http://www.01net.it/01NET/HP/0,1254,0_ART_92922,00.html?lw=10000;1&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Continua&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/lucio-stancainnovazione-tecnologia.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWqhdALtBOwh5feKUSjmPGjt4N_5EepAiUkkxAeZqlnALNiEBx0WwlC4O5HDOMzm7-3TIsIRTr7fPNpIsbMlFAgl3rop6uR6gT4aKfIVhky9DT4OP30AMr1z_v9pXtl-cmrVz3IgfpUu0/s72-c/Smau2008_logo_103x131.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-1766525303976100644</guid><pubDate>Sat, 18 Oct 2008 10:00:00 +0000</pubDate><atom:updated>2008-10-18T12:14:35.310+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">http</category><category domain="http://www.blogger.com/atom/ns#">leggende metropolitane</category><category domain="http://www.blogger.com/atom/ns#">siti curiosi</category><category domain="http://www.blogger.com/atom/ns#">Web</category><title>Siti curiosi</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCciIRlcVzBR0k16-Q_5OUQbqe7DefShJ3qbxMPoYmdQj0nH81SHfLQ96ecruANmdUPWWAbU2nlA7NGS3JyKJQlOB4FIx7L1cstK_vJIXaehZfRUWkz4nFCD7Q5tZ0I1ZjfllUpB16FwY/s1600-h/http.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5258434745699134626&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCciIRlcVzBR0k16-Q_5OUQbqe7DefShJ3qbxMPoYmdQj0nH81SHfLQ96ecruANmdUPWWAbU2nlA7NGS3JyKJQlOB4FIx7L1cstK_vJIXaehZfRUWkz4nFCD7Q5tZ0I1ZjfllUpB16FwY/s320/http.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;em&gt;La macchina del tempo del web per vedere come erano prima i siti, Leggende metropolitane, Errori nei film sono solo alcuni dei titoli offerti dal sito&lt;/em&gt; &lt;/span&gt;&lt;a href=&quot;http://www.arezzocitta.com/Curiosi.htm&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;http://www.arezzocitta.com/Curiosi.htm&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt; .&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;em&gt;Siti curiosi ma anche interessanti come quello del Museo di scienze planetarie o quello della più Grande Enciclopedia Ittica online.&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/siti-curiosi.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCciIRlcVzBR0k16-Q_5OUQbqe7DefShJ3qbxMPoYmdQj0nH81SHfLQ96ecruANmdUPWWAbU2nlA7NGS3JyKJQlOB4FIx7L1cstK_vJIXaehZfRUWkz4nFCD7Q5tZ0I1ZjfllUpB16FwY/s72-c/http.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-4695210070674588940</guid><pubDate>Mon, 13 Oct 2008 17:59:00 +0000</pubDate><atom:updated>2008-10-13T20:12:05.686+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">download</category><category domain="http://www.blogger.com/atom/ns#">microspia</category><category domain="http://www.blogger.com/atom/ns#">Polfemo</category><category domain="http://www.blogger.com/atom/ns#">SMS</category><category domain="http://www.blogger.com/atom/ns#">Symbian</category><category domain="http://www.blogger.com/atom/ns#">trojan</category><title>Il cellulare diventa microspia</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYixls23clZU5b9O0LsAZL2ilnYHFvjyrNUs7BMr-cGYImqJLQ9IK03RoP667UpqWYx_uqXmisO_MOgur5rD52dvwdVC3r76V6524HAoDV0WZ9B7P-r7LZir-MhJmYXQgiYMWHxuIgk14/s1600-h/viruscellulare.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5256702590101602082&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYixls23clZU5b9O0LsAZL2ilnYHFvjyrNUs7BMr-cGYImqJLQ9IK03RoP667UpqWYx_uqXmisO_MOgur5rD52dvwdVC3r76V6524HAoDV0WZ9B7P-r7LZir-MhJmYXQgiYMWHxuIgk14/s320/viruscellulare.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;em&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Un sms permetterebbe il download di un virus trojan capace di trasformare, all&#39;insaputa del proprietario, il suo cellulare in microspia. Questa è la dinamica utilizzata e scoperta a dopo un inchiesta condotta dalla PolPosta di Napoli a seguito delle ripetute denunce pervenute da parte di persone che si sentivano molestate e spiate. Il trojan &quot;Polfemo&quot;, questo è il suo nome, sarebbe in grado di localizzare anche l&#39;apparecchio cellulare ed attaccherebbe i sistemi Symbian.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;em&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Attenzione, quindi, agli sms ed a cancellare quelli sospetti.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;em&gt;&lt;strong&gt;Resize&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/il-cellulare-diventa-microspia.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYixls23clZU5b9O0LsAZL2ilnYHFvjyrNUs7BMr-cGYImqJLQ9IK03RoP667UpqWYx_uqXmisO_MOgur5rD52dvwdVC3r76V6524HAoDV0WZ9B7P-r7LZir-MhJmYXQgiYMWHxuIgk14/s72-c/viruscellulare.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-6848446723830862160</guid><pubDate>Thu, 09 Oct 2008 14:39:00 +0000</pubDate><atom:updated>2008-10-09T16:49:06.309+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hardware</category><category domain="http://www.blogger.com/atom/ns#">mouse</category><category domain="http://www.blogger.com/atom/ns#">periferiche</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Mouse: che passione!</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE779AvfktJavyfwGAqBjlKiHNUsFH7iAt5-K6La0HADEwbNBDlMiU0jKmwMJwMmBoR0l90JJnMa85__gkKgsTsxejIXgr-3bLPSheAfnOrUPyRcnLzeHtyM8L4DhzLW1WwHO1MeiFKp0/s1600-h/mouse_luminosi.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5255165992575029122&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE779AvfktJavyfwGAqBjlKiHNUsFH7iAt5-K6La0HADEwbNBDlMiU0jKmwMJwMmBoR0l90JJnMa85__gkKgsTsxejIXgr-3bLPSheAfnOrUPyRcnLzeHtyM8L4DhzLW1WwHO1MeiFKp0/s320/mouse_luminosi.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;em&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;em&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Chi utilizza il computer come strumento di lavoro è sempre alla ricerca di periferiche ed accessori che per forma, dimensione e funzionità si integrino perfettamente con noi stessi.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;em&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Il mouse lo definirei lo strumento del quale ormai non riusciamo a fare a meno. Ho sempre pensato di essere una delle poche persone sempre alla ricerca di mouse performanti e nel contempo esteticamente gradevoli ed allegri ma, con mia somma gioia e stupore, ho scoperto che in molti hanno le mie stesse esigenze.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;em&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Segnalo un sito informativo che ne contiene davvero tanti e, scorrendo le pagine, ho trovati diversi modelli di mouse che ho in passato acquistato ed utilizzato.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;http://www.slipperybrick.com/category/mice/&quot;&gt;http://www.slipperybrick.com/category/mice/&lt;/a&gt;&lt;/div&gt;&lt;div&gt; &lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/mouse-che-passione.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE779AvfktJavyfwGAqBjlKiHNUsFH7iAt5-K6La0HADEwbNBDlMiU0jKmwMJwMmBoR0l90JJnMa85__gkKgsTsxejIXgr-3bLPSheAfnOrUPyRcnLzeHtyM8L4DhzLW1WwHO1MeiFKp0/s72-c/mouse_luminosi.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-7668869133802080430</guid><pubDate>Thu, 09 Oct 2008 07:21:00 +0000</pubDate><atom:updated>2008-10-09T09:25:16.384+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Festival Creatività</category><category domain="http://www.blogger.com/atom/ns#">Second Life</category><category domain="http://www.blogger.com/atom/ns#">SLcamp</category><category domain="http://www.blogger.com/atom/ns#">studiocelentano.it</category><category domain="http://www.blogger.com/atom/ns#">web 2.0</category><category domain="http://www.blogger.com/atom/ns#">Wiki</category><title>Second Life e&#39; morto? Se ne discute in un barcamp a Firenze</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDhCf2yQM08VgPu4C2zuJ-AAVhlziidNXjdi5nmjMGkO1sBINpr1RP13G7Jvz3bNTysBvQmHmE7ptNLrI0qmeNSXbfPC3XOXVvCcb2Cz2rQS1slQLlbfhQ8rTmWF7Uak3EB7HSkvAcM00/s1600-h/secondlife.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5255051860700399410&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDhCf2yQM08VgPu4C2zuJ-AAVhlziidNXjdi5nmjMGkO1sBINpr1RP13G7Jvz3bNTysBvQmHmE7ptNLrI0qmeNSXbfPC3XOXVvCcb2Cz2rQS1slQLlbfhQ8rTmWF7Uak3EB7HSkvAcM00/s320/secondlife.bmp&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Firenze - Con l&#39;avvento del web 2.0 forse arrivera&#39; anche Second Life 2.0. Per scoprire la nuova Second Life il prossimo 25 ottobre a Firenze, nel corso del Festival della Creativita&#39;, si terra&#39; il barcamp SLcamp 2.0, incontro in cui tutti i partecipanti possono dare il proprio apporto con una presenza attiva, facendo conoscere il proprio punto di vista. L&#39;iscrizione e&#39; gratuita sul wiki all&#39;indirizzo: &lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://barcamp.org/SecondLifeCampItaly&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;http://barcamp.org/SecondLifeCampItaly&lt;/span&gt;&lt;/a&gt; &lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;http://studiocelentano.it/d.asp?id=32132&amp;amp;opt=ict#&quot;&gt;Fonte&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/second-life-e-morto-se-ne-discute-in-un.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDhCf2yQM08VgPu4C2zuJ-AAVhlziidNXjdi5nmjMGkO1sBINpr1RP13G7Jvz3bNTysBvQmHmE7ptNLrI0qmeNSXbfPC3XOXVvCcb2Cz2rQS1slQLlbfhQ8rTmWF7Uak3EB7HSkvAcM00/s72-c/secondlife.bmp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6270185105133425436.post-7095921930150252158</guid><pubDate>Tue, 07 Oct 2008 13:22:00 +0000</pubDate><atom:updated>2008-10-07T15:30:59.006+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">adware</category><category domain="http://www.blogger.com/atom/ns#">DoS</category><category domain="http://www.blogger.com/atom/ns#">exploit</category><category domain="http://www.blogger.com/atom/ns#">Flooder</category><category domain="http://www.blogger.com/atom/ns#">Kaspersky Lab</category><category domain="http://www.blogger.com/atom/ns#">PornWare</category><category domain="http://www.blogger.com/atom/ns#">PUPs</category><category domain="http://www.blogger.com/atom/ns#">RiskWare</category><category domain="http://www.blogger.com/atom/ns#">sicurezza</category><category domain="http://www.blogger.com/atom/ns#">virus</category><category domain="http://www.blogger.com/atom/ns#">virus writer</category><title>Kaspersky Lab: consuntivo semestrale delle minacce IT</title><description>&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;Giochi online e smartphone sono sempre più a rischio.&lt;br /&gt;Questo è quanto affermato dal Kaspersky Lab che ha pubblicato il suo rapporto semestrale sulle minacce informatiche.&lt;br /&gt;Nelle conclusioni si legge che l&#39;evoluzione delle minacce nella prima metà del 2008 ha seguito le tendenze del 2007: i virus writer continuano ad impiegare tecnologie non sofisticate, preferendo affidarsi alla quantità piuttosto che alla qualità dei programmi maligni. Il numero delle nuove minacce segue una progressione geometrica. Questo processo è accompagnato da una riduzione della durata di vita media delle minacce rilevate “in the wild”. Su 1000 nuovi Trojan identificati ogni giorno, solo alcune decine continuano a rappresentare una minaccia per gli utenti una settimana o un mese più tardi.&lt;br /&gt;La relazione completa è localizzata qui:&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://www.kaspersky.com/it/reading_room?chapter=207716706&quot;&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;http://www.kaspersky.com/it/reading_room?chapter=207716706&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:georgia;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Resize&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;</description><link>http://tecnopolis-hi.blogspot.com/2008/10/kaspersky-lab-consuntivo-semestrale.html</link><author>noreply@blogger.com (Tecnopolis-Hi)</author><thr:total>0</thr:total></item></channel></rss>