<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3069634593329107485</id><updated>2024-10-06T20:14:44.948-07:00</updated><category term="WiFi Security tips"/><category term="Russia"/><category term="Network Security"/><category term="Censorship"/><category term="WiFi Security videos"/><category term="WiFi Security Software"/><category term="wireless network security"/><category term="ACTA"/><category term="Black lists"/><category term="Citizen Lab"/><category term="Free Download"/><category term="Freedom"/><category term="Gmail"/><category term="Internet operators"/><category term="Iran"/><category term="Moscow"/><category term="Network Security Software"/><category term="Right protectors"/><category term="SOPA"/><category term="Sibal"/><category term="Tajikistan"/><category term="Talk Talk"/><category term="Tencent"/><category term="WEP Wireless Security Stinks – Find Out Why"/><category term="Wi-Fi Security"/><category term="WiFi Security Services"/><category term="blacklist"/><category term="security news"/><category term="unblock"/><category term="wireless network protection"/><title type='text'>WiFi Security</title><subtitle type='html'>Blog about things related to WiFi Security issues. Tips, tricks, settings, software, video and many others.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>30</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-5442984578406220329</id><published>2013-02-11T07:16:00.000-08:00</published><updated>2013-02-11T07:16:02.626-08:00</updated><title type='text'>The fighters with pedophiles starting up “clear Internet”</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
The Russian Internet haven’t used to the work of so called register of prohibited sites yet but the Secure Internet League prepared a new surprise for its users. According to representatives of this very League, they talk with providers of one of the Russian region and they agreed to give their users the access only to those sites that are included to special white list. It means that there will not be any access to sites that are not included in this list.&lt;div&gt;
&lt;img src=&quot;https://lh3.googleusercontent.com/cpYvTEk5jaTnGem1lLYOWggEvP3gTetNCSRNQdA7CgT9GCYdpBx_j--ee-Zg6ozfHmY2NLX9oKI-qyBb6IbqGAD6gTu7hFswMU4N0bNOAWRugfZCtH5NtQaKew&quot; /&gt;&lt;br /&gt;&lt;br /&gt; According to the fact that this is not only the violation of the consumer’s right law but also the 29 article of constitution that is directly prohibit any censorship. By these means it is possible to remove restrictions of some user’s request. &lt;br /&gt;&lt;br /&gt;“If someone wants to watch pornography, scenes of violence, he can inform the communication operator about his decision”, - said the representatives of the League.&lt;br /&gt;&lt;br /&gt;That means that all people who want to use Internet, but not the created by the Secure Internet League local sub-network a priori considered as people who are fond of pornography and scenes of violence and cruelty. Of course there is no any allusion towards the League but id those providers who agreed to participate to take part in these experiment are sane? &lt;br /&gt;Conscientious limitations of given by commercial organization the access to the Internet will lead to the only one consequence - the client will change this company and chose another one that will provide them by access without any limitations and it’ll cost them the same money. &lt;br /&gt;&lt;br /&gt;The Secure Internet League announces that they agreed to introduced the white list with 29 providers of one of the region.  So, it means that these 29 providers will soon withdraw from the market in this market and another 29 more farseeing providers will come on their place. This is called real competition.&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/5442984578406220329/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2013/02/the-fighters-with-pedophiles-starting.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/5442984578406220329'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/5442984578406220329'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2013/02/the-fighters-with-pedophiles-starting.html' title='The fighters with pedophiles starting up “clear Internet”'/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh3.googleusercontent.com/cpYvTEk5jaTnGem1lLYOWggEvP3gTetNCSRNQdA7CgT9GCYdpBx_j--ee-Zg6ozfHmY2NLX9oKI-qyBb6IbqGAD6gTu7hFswMU4N0bNOAWRugfZCtH5NtQaKew=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-8351856474081998096</id><published>2013-01-28T02:14:00.000-08:00</published><updated>2013-01-28T02:14:06.052-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Citizen Lab"/><category scheme="http://www.blogger.com/atom/ns#" term="Right protectors"/><title type='text'>Right protectors accuse American companies in supply of equipment for Internet censorship by authoritarian regime</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
The Citizen Lab research center operating in the University of Toronto announced that authoritarian regimes around the world use technologies developed by the companies of Silicon Valley for Internet filtering and users’ tracing. &lt;br /&gt;&lt;br /&gt;In particular Canadian e-right protectors said that several countries use equipment developed by famous company Coat Systems as it was informed by  &lt;a href=&quot;http://www.securitylab.ru/news/436511.php&quot;&gt;SecurityLab&lt;/a&gt;. &lt;br /&gt;&lt;img src=&quot;https://lh5.googleusercontent.com/nRkSIpDUUyEWrWJaGCSTv2KZJW3Ycxse5iHNmLnu37QkxpAxI9U8ttYXjYlr0fs792kYC3BXwSONIO7f024Xnfw66Sj0bvwNyHtTXzrJPhzZ8k2v5kkf&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;“The received data confirms the necessity international and national verification of Blue Coat Systems in stated countries  and also to carry out the “dual purpose” and communication technology’s global information spreading observation - according to the report. &lt;br /&gt;&lt;br /&gt;Experts hope that their published report became the reason to observe Blue Coat Systems to be sure that the equipment produced in their company doesn’t use for the violation of human rights.&lt;br /&gt;&lt;br /&gt;During the researches that were caring out this 2 weeks  Citizen Lab’ experts found out the equipment Blue Coat ProxySG in the Net 61 and also 316 complexes of Blue Coat PacketShaper. All these allow filtering and censoring. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The equipment data was founded in Egypt, Kuwait, Arabia, the United Arab Emirates, Afghanistan, Bahrain, China, India, Indonesia, Iraq, Kenya, Lebanon, Malaysia, Nigeria, Russia, Singapore, South Korea, Thailand, Turkey and Venezuela.&lt;br /&gt;&lt;br /&gt;Earlier the  Blue Coat was accused of their equipment using by Syrian authorities fro Internet filtering and monitoring. At that moment the company said that their equipment can’’t be used for such measures and  got there by illegal way. &lt;br /&gt;&lt;br /&gt;Blue Coat Systems company was found at 1996. The company provides the security of Web-communications and release corporate business offers. Hardware-software complexes which allow limiting of unwanted Internet traffic and secure from malicious software&#39;s, undesirable content and other Web-threat and also to speed the work of of Net business application are very famous among those developed by the company. In 2008 the  BlueCoat purchased the Packeteer company specialized in developing, monitoring and traffic controlling. According to  IDC’s estimate is the best in the world in content’s security and application  delivery.&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/8351856474081998096/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/right-protectors-accuse-american.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/8351856474081998096'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/8351856474081998096'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/right-protectors-accuse-american.html' title='Right protectors accuse American companies in supply of equipment for Internet censorship by authoritarian regime'/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh5.googleusercontent.com/nRkSIpDUUyEWrWJaGCSTv2KZJW3Ycxse5iHNmLnu37QkxpAxI9U8ttYXjYlr0fs792kYC3BXwSONIO7f024Xnfw66Sj0bvwNyHtTXzrJPhzZ8k2v5kkf=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-3195279754780978867</id><published>2013-01-24T00:07:00.000-08:00</published><updated>2013-01-24T00:07:01.163-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tencent"/><title type='text'>Tencent Internet-holding denies censorship charge  </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
The biggest Chinese Internet company called Tencent denies all charges of its chat-application WeChat  censoring. According to the word of the company’s representatives the inaccessibility of many types of the content abroad is a technical error not an act of censorship. At the same time many blogs and and West editions report that “technical errors” can appear only if messages of users include any kind of “prohibited words”. &lt;img src=&quot;https://lh4.googleusercontent.com/BhWKORQCDx4gyMoUh9ELKPRpXG4saorTgs2kSheMZEt3bljlppCP41UOBDdeb7zECDodHaNFZFp38cSkTIDkoeMzq3NBnl-PUD-kDIQTCvQhEOAZiWt3&quot; /&gt;In this way according to The Next Web blog’s data the error take place every time a user talks on any of “sensible themas, for example the name of the prohibited Falgulon group or the one of newspaper, the journalists of which openly opposed censorship. Also users massages after stating links of the oppositional blogs are also inaccessible.&lt;br /&gt;&lt;br /&gt;We remind that earlier the Chinese government was repeatedly accused of Internet censorship, however the official Beijing never admitted facts of political blocking, saying that they only block resources with pornography and illegal content.&lt;br /&gt;&lt;br /&gt;Today the Internet-holding published the issue according to which some foreign users cannot get the access to a number of message due to some technical errors. We are taking measures to eliminate this problem and adduce an excuse”, - said Tencent. &lt;br /&gt;&lt;br /&gt;Nowadays Tencent is also the operator of the instant messages service QQ and of the Tencent Weibo blog-platform. The WeChat  numbers nearly 300 million Internet users. &lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/3195279754780978867/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/tencent-internet-holding-denies.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/3195279754780978867'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/3195279754780978867'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/tencent-internet-holding-denies.html' title='Tencent Internet-holding denies censorship charge  '/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh4.googleusercontent.com/BhWKORQCDx4gyMoUh9ELKPRpXG4saorTgs2kSheMZEt3bljlppCP41UOBDdeb7zECDodHaNFZFp38cSkTIDkoeMzq3NBnl-PUD-kDIQTCvQhEOAZiWt3=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-2858306252088773500</id><published>2013-01-20T02:33:00.001-08:00</published><updated>2013-01-20T02:33:59.802-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Sibal"/><title type='text'>Sibal is not the only fighter with the Internet censorship </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
New Delphi:  The Internet knows no boundaries, follows no rules.  It presents us all sides of the story. It is some kind of phenomena for the society.&lt;br /&gt;&lt;br /&gt;Turning the arguments upside down you will get some arguments for censorship or content screening - no freedom is absolute specially if the matter is the whole nation.&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;img src=&quot;http://static3.fjcdn.com/comments/Jesus+H.+Christ.+The+internet+knows+no+bounds+anymore+_4cc12e0721dbdfdc93c8db354b3a7f2c.jpg&quot; /&gt;&lt;br /&gt;&lt;br /&gt;Kapil Sibal telecom minister together with representatives of Facebook, Google and some other sites are having this theory as a base  during their meeting within last two months. There is a belief that Sibal suggests pre-screening of the content that in its turn promotes obscenity and regards some religions. Others consider some cartoons to depict Mrs Gandhi and other socio-political leaders.&lt;br /&gt;&lt;br /&gt;One can represent government’s move that have been a cue Vinay Rai, Aijaz Ashraf Qasmi.&lt;br /&gt;&lt;br /&gt;On December 20th , Qasmi a spokesperson of Deoband filed a civil suit in the capital of India. Delphi’s court demanded removal of blasphemous content and assurance from a certain number of websites that will compulsory host any content in future.&lt;br /&gt;&lt;br /&gt;Founder of fatwaonline.org Qasmi is a highly professional mufti from Deoband. He pursued journalism from the seminary in 2006.&lt;br /&gt;&lt;br /&gt;Qasmi noted the material of a religious character or some other similar sentiments should not be placed in the web site or placed with a special permission. It is some kind of a social bomb because this type of the content produces evidence via sealed envelope if it is possible to say that.&lt;br /&gt;&lt;br /&gt;Earlier on December 16 Rai , a journalist with a national channel of news posted a criminal case in the Patiala House, it was directed to the websites on the same basics. In these statements Rai points out that the freedom of speech is not at all showing and speaking all you want to speak or do. Rai also advices not to attack religion because it may lead to cruel protests and collisions.&lt;br /&gt;&lt;br /&gt;Both these persons are for censorship and for pre-screeing on some searching engines and social nets. According to their statement Ban is neither practical nor intended.&lt;br /&gt;&lt;br /&gt;You tube is the best example: every video is screened before being uploaded, it does not presuppose its being viewed instantly, other sites have the same norms for existing, their hosts study social and law work at the Lucknow University.&lt;br /&gt;&lt;br /&gt;They additionaly brief Sibal a progress of the court cases. Qasmi assures that he would put much efforts in this matter and aquire more than 1500 people in social net such as Facebook.&lt;br /&gt;&lt;br /&gt;What makes different Internet from media: Internet spreads the information quicker than media and in case of publishing some offensive information in the net before it is noticed it would have been spread to the great number of sites by that moment.&lt;br /&gt;&lt;br /&gt;The speed of information spreading in this case depends on the popularity of the site especially in social web communities.&lt;br /&gt;&lt;br /&gt;The kind of screening the demand is very meaningful in the United States of America and some other Western countries.&lt;br /&gt;&lt;br /&gt;West follows double standards, they does not allow publishing of these materials in their territory, they can propagate such material on Indian websites. People from all over the world congratulate me on the initiative and this is the beginning.&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/2858306252088773500/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/sibal-is-not-only-fighter-with-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/2858306252088773500'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/2858306252088773500'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/sibal-is-not-only-fighter-with-internet.html' title='Sibal is not the only fighter with the Internet censorship '/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-1869500132607971149</id><published>2013-01-17T10:20:00.001-08:00</published><updated>2013-01-17T10:20:25.638-08:00</updated><title type='text'>The tracing-Internet technology is used almost in 20 countries</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Canadian legal organization knew that nearly 20 countries of the world including Russia and China use the technology developed in the USA for Internet censoring and tracing users’ activity, reports New York Times.&amp;nbsp;&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;img src=&quot;https://lh6.googleusercontent.com/8oAAnQl3AbU3Dd9PxOTLZpB2-yqNaP9T9kNxGctV-2DTEfX8IobQ3m7ztbPATQsX1fZaDiBkkStDRzIYJ9JAcWQpQlvgTJ874pw7UQ-_uOsKA4wLmwwT&quot; /&gt;&lt;br /&gt;&lt;br /&gt;The Study Group Citizen Lab which headquarters are situates in the Toronto University could trace features that are typical for Blue Coat Systems ( American Web security provider) with the help of  data gathering servers. &lt;br /&gt;&lt;br /&gt;Citizen Lab found out that this technology is used by the governments of India, China, South Korea, Iraq, Singapore and several more countries. &lt;br /&gt;&lt;br /&gt;Authors of the investigation announces that with the its help they want to attract public attention to the problem of Internet censorship that is becoming more deep. It needs to be noticed that the US State Department allows selling this programme abroad, except several countries including Democratic People&#39;s Republic of Korea, Iran and Syria.&lt;br /&gt;&lt;br /&gt;In 2011 it became known that hardware and soft ware Blue Coat Systems is used by Syrian government for tracing the regime’ opponent. The company denies any  involvement in their technology selling to Syria. But the compone couldn&#39;t comment a new information published by Citizen Lab.&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/1869500132607971149/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/the-tracing-internet-technology-is-used.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/1869500132607971149'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/1869500132607971149'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/the-tracing-internet-technology-is-used.html' title='The tracing-Internet technology is used almost in 20 countries'/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh6.googleusercontent.com/8oAAnQl3AbU3Dd9PxOTLZpB2-yqNaP9T9kNxGctV-2DTEfX8IobQ3m7ztbPATQsX1fZaDiBkkStDRzIYJ9JAcWQpQlvgTJ874pw7UQ-_uOsKA4wLmwwT=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-5054610934579763546</id><published>2013-01-13T06:45:00.001-08:00</published><updated>2013-01-13T06:45:49.550-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Censorship"/><category scheme="http://www.blogger.com/atom/ns#" term="Russia"/><title type='text'>Bloggers arranged a protest against censorship witness for Adagamov</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
On January 11 many popular Russian bloggers published a Rustem Adagamov’s post (a liveJournal user who was dismissed by the order of Roscomnadzor for suicide propaganda).The  at their sites. The aim of this action is the opposition to censorship in Russian Internet.&lt;br /&gt;&lt;br /&gt;The first post was placed by the oppositionistAleksey Navalnyi on his LiveJournal. Some time later Aleksandr Plyushev a journalist of the “Echo Moskvi follow his suit. It was he who announced about the beginning of a centralised action. &lt;br /&gt;&lt;br /&gt;  &lt;img src=&quot;https://lh4.googleusercontent.com/5Zy8A_F4Pg2FscdLuSmupqi-SzHDvlZXi-7dzQaONjIVIZAd-jyvYt4VQ9b02ELA2h_UErpQIGgA3vOuz4muzvK8E8y7PAs4_2kEZvlZwLTlb3x6t5o-&quot; /&gt;&lt;br /&gt;After Plyushev the post of Adagamov was published by Vladimir Varfolomeev, the chief editor of the “Echo Moskvi” on his LiveJournal. All together several tens of blogers participated in the action.&lt;br /&gt;&lt;br /&gt;The Adagamov’s post dated from March, 2012 had been hidden on the Russian territory by the heads of LiveJournal on Friday. By the words of  Iliya Dronov, the head of the server, the Reuters photographic coverage about self-immolation in Tibet was considered by the Roscomnadzor as a prohibited information. &lt;br /&gt;&lt;br /&gt;According to a point of view of many blogers photos, published by Adagamov were devoted to a tragic event, and it is as clear as a day that there is no any suicide propaganda. &lt;br /&gt;&lt;br /&gt;Some action’ participants suggested that Roscomnadzor decision is connected with the scandal in  the center of which was Rustem Agadamov: In the end of December his ex wife accused him of a child molestation. &lt;br /&gt;&lt;br /&gt;However the Roscomnadzor explained that the request to delete his note was not connected with the accusations against Agadamov. And really, according to zapret-info.gov.ru site the post was included in the black list of sites by the Rosconadzor’ order on November 12, 2012. On January 11 the “Izvestia” with a reference to the Roscomnadzor wrote that after blocking the access to this note on the Russian territory the service does not have any claims to Rustem Adagamov’s blog.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/5054610934579763546/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/bloggers-arranged-protest-against.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/5054610934579763546'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/5054610934579763546'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/bloggers-arranged-protest-against.html' title='Bloggers arranged a protest against censorship witness for Adagamov'/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh4.googleusercontent.com/5Zy8A_F4Pg2FscdLuSmupqi-SzHDvlZXi-7dzQaONjIVIZAd-jyvYt4VQ9b02ELA2h_UErpQIGgA3vOuz4muzvK8E8y7PAs4_2kEZvlZwLTlb3x6t5o-=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-6808371869357859841</id><published>2013-01-09T01:21:00.000-08:00</published><updated>2013-01-09T01:21:13.460-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ACTA"/><category scheme="http://www.blogger.com/atom/ns#" term="SOPA"/><title type='text'>Aims for protests of ACTA, SOPA</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
The Operation Black March boycott  is supposedly aimed at stopping online piracy by asking opponents of such policies not to purchase media. It is led by Anonymous aims to protest ACTA, SOPA. The boycott is a coordinated effort by various factions of the Internet that have aligned against the &lt;a href=&quot;http://www.ustr.gov/acta&quot;&gt;Anti-Counterfeiting Trade Agreement&lt;/a&gt;, &lt;a href=&quot;http://www.ibtimes.com/articles/272580/20111225/sopa-bill-2012-things-know-controversial-legislation.htm&quot;&gt;Stop Online Piracy Act&lt;/a&gt;, Protect IP Act, Protecting Children from Internet Pornographers Act and other such measures, and is being headed off by the Anonymous hacktivists.&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://www.vanguardia.com.mx/XStatic/vanguardia/images/espanol/sopa_120112.jpg&quot; /&gt;&lt;br /&gt;&lt;br /&gt;The “Black March” is the latest protests aimed at allowing people from all over the world to come together and to announce their opposition to ACTA and provisions within the treaty that threaten to limit Internet freedom, impose a new censorship regime.&lt;br /&gt;&lt;br /&gt;The flier declares that the message of the boycott as: Copyrighted media won&#39;t be allowed while Internet is being censored, then went into a longer discussion of its goals, and how people can participate in the act of civil disobedience:&lt;br /&gt;&lt;br /&gt;Why? Due to the continuous campaigns and suits concerning Internet Censorship such as SOPA, PIPA and ACTA and others we MUST take actions against Film, Music, Book and Magazine Companies and other media companies, the flier reads. &lt;br /&gt;&lt;br /&gt;How? Don&#39;t buy any magazine, newspaper, DON&#39;T download ANY song  DON&#39;T watch any movie at the cinema, DON&#39;T buy ANY DVD or videogame and DON&#39;T buy any book. &lt;br /&gt;&lt;br /&gt;The flier is black with stark white writing, and it features a watermark bearing an Anonymous insignia in the bottom-right corner.&lt;br /&gt;&lt;br /&gt;With the continuing campaigns for Internet-censoring litigation such as SOPA and PIPA, and the closure of sites such as Megaupload the time has come to take a stand against music, film and media companies&#39; lobbyists, the site reads. The only way to hit their profit margins.  This means do not buy a single record, DVD, videogame, a single book or magazine in the stores. Do not go to see a single film in cinemas, or download a copy.&lt;br /&gt;&lt;br /&gt;The protests have had varying degrees of success. In January a coordinated &lt;a href=&quot;http://au.ibtimes.com/articles/283144/20120118/sopa-blackout-list-jan-18-google-wikipedia.htm&quot;&gt;anti-SOPA internet blackout&lt;/a&gt; led to the bill being &lt;a href=&quot;http://lifehacker.com/5877993/sopa-and-pipa-have-been-pulled-for-now&quot;&gt;shelved&lt;/a&gt; last week by the &lt;a href=&quot;http://www.house.gov/&quot;&gt;U.S. Congress&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt;And on Feb. 11, the world is coming together to protest ACTA in cities from New York to Budapest to Melbourne.&lt;br /&gt;&lt;br /&gt;ACTA &lt;a href=&quot;http://www.mofa.go.jp/policy/economy/i_property/pdfs/acta1105_en.pdf&quot;&gt;would set up&lt;/a&gt; an international legal framework to deal with issues of counterfeiting, piracy and other crimes. Instead of dealing with national laws regarding these issues, these nations would be able to adjudicate alleged crimes in a new governing body that would exist outside of the purview of the &lt;a href=&quot;http://www.un.org/&quot;&gt;United Nations&lt;/a&gt; and other international institutions.&lt;br /&gt;&lt;br /&gt;The opponents are worrying that ACTA would create a new regime of Internet censorship and criminalization of commonplace online activities so that is why they have taken to the streets and the Web to voice their concerns, which appear to be gaining some traction with international leaders tasked with negotiating the treaty, which its supporters hope to have in place by June.&lt;br /&gt;&lt;br /&gt;The Operation Black March boycott is going to be another source of pressure on the world&#39;s leaders to rethink their approach the Internet, and its impacts will be interesting to follow as its full scope is realized.&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/6808371869357859841/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/aims-for-protests-of-acta-sopa.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/6808371869357859841'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/6808371869357859841'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2013/01/aims-for-protests-of-acta-sopa.html' title='Aims for protests of ACTA, SOPA'/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-8650434734132982075</id><published>2012-12-30T05:02:00.001-08:00</published><updated>2012-12-30T05:02:32.776-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="blacklist"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet operators"/><category scheme="http://www.blogger.com/atom/ns#" term="Moscow"/><category scheme="http://www.blogger.com/atom/ns#" term="Russia"/><title type='text'>RAEC is preparing changes in the “blacklist” decree</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Changes are agreed with the Federal Service for Supervision in the Sphere of Telecom, Information Technologies and Mass Communications (ROSKOMNADZOR) and the Internet operators, and are aimed at reducing deficits.&amp;nbsp;&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;img src=&quot;http://telegraf.by/img2/newsmain/2011-11/voh13_w465h262.jpg?r=4&quot; /&gt;&lt;br /&gt;&lt;br /&gt;Moscow, December 17 - “RIA NOVOSTY”. Russian Association of Electronic Communications (RAEC) send an offer to change the government statement № 1101 about the functioning of the order of the “blacklist” of sites , as it is said in the RAEC report. The offered changes are agreed with the Roscomnadzor and the Internet operators and are aimed at reducing deficits. &lt;br /&gt;&lt;br /&gt;“We hope that procedures are sufficiently studied and efficient, and that offers will be realized as an amendment to the Statement № 1101” - said RAEC. &lt;br /&gt;&lt;br /&gt;The RAEC representatives offer to make possible sending notifications about the ‘blacklist” functioning right to the sites owners, who gave their contacts to the ROSCOMNADZOR.&lt;br /&gt;&lt;br /&gt;The law concerning “ the protection of the child from information and material injurious to his or her  health and development” is expecting the creation of automatized informational system that includes a register of URLs, domain names, and IP addresses of websites and web-pages  containing any information which had been prohibited for distribution in Russia by court decision”. It was launched on November 1, 2012. &lt;br /&gt;&lt;br /&gt; It concerns firstly child pornography, suicide and drug making instructions. In such cases it is allowed to block sites without a court decision. &lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/8650434734132982075/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2012/12/raec-is-preparing-changes-in-blacklist.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/8650434734132982075'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/8650434734132982075'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2012/12/raec-is-preparing-changes-in-blacklist.html' title='RAEC is preparing changes in the “blacklist” decree'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-2900405253721183993</id><published>2012-12-27T23:45:00.001-08:00</published><updated>2012-12-27T23:45:53.305-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Black lists"/><title type='text'>Black lists of sites are bringed to light. It is possible to prohibit sites in the Internet</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.13743827980943024&quot; style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-left: -1pt; margin-top: 0pt;&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.13743827980943024&quot; style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In the end of July the amendments to a “law about the Information”, which the Internet department consider as an attempt to introduce censor in Russian Internet came into a force. Within several months such popular sites as Lurkmore, Rutracker and Google were included in the black list and then temporary closed due to a spreading of an illegal content. The law should be improved because some innocent sites without any prohibited information was punished. &lt;/span&gt;&lt;span style=&quot;background-color: white; color: #666666; font-family: Arial; font-size: 12px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-left: -1pt; margin-top: 0pt;&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.13743827980943024&quot; style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;background-color: white; color: #666666; font-family: Arial; font-size: 12px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;img height=&quot;293&quot; src=&quot;http://www.google.ru/url?source=imglanding&amp;amp;ct=img&amp;amp;q=http://appraisalnewsonline.typepad.com/photos/uncategorized/2008/10/17/blacklist_3.jpg&amp;amp;sa=X&amp;amp;ei=-E3dUOSkI4Tk4QTS-IGIAw&amp;amp;ved=0CAkQ8wc&amp;amp;usg=AFQjCNE4BWgUDUxx72z998uVMR_TrfAgmA&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b id=&quot;internal-source-marker_0.13743827980943024&quot; style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In June it became known about the amendments to the “about the information, informational technologies and information security” law. This information includes: child pornography, drug’s propaganda and the information stimulated childes to a suicide or injure. The League for Secure Internet that is headed by Konstantin Malafeev (a founder of the Marshall Capital told that the main aim is to create a register as a method to fight with an illegal content. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Of course nobody was doubt about the good aims of this law, but the question is about the offered blocking mechanism. The scheme is: As soon as a site, according to a point of view of the Ministry of Internal affairs, Federal Drug Control service and The Russian Federal Surveillance Service for Mass Media and Communications (Roscomnadzor) decide that this site should be included in the black list the provider is obliges to block the access to this site within a one day. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The problem is that blocking in by the domain names and IP addresses can cause closing of such resources which do not contain any prohibited information. Such huge Internet companies and rights&#39;s protectors came out with a sharp critic according to this law, which in their opinion will lead to the Internet censorship. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;It is impossible to avoid a situation when the right of the innocent owners of the Internet resources, who&#39;s sites were blocked are outraged in practise, said experts of the Russian Association of Electronic Communications (RAEC). So as a result such sites as unofficial encyclopedia Lurkmore, a file share Rutracker, Google services were blocked. According to data of the ROSCOMNADZOR the blacklist includes more than 3000 sites which do not contain any prohibited information and this number is equalled to 97 % of all the resources in the register.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; Also the blacklist creation contradicts with a stated in the law “search, getting, sending, development and spreading of the information by all legal ways” principle states RAEC. &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/2900405253721183993/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2012/12/black-lists-of-sites-are-bringed-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/2900405253721183993'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/2900405253721183993'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2012/12/black-lists-of-sites-are-bringed-to.html' title='Black lists of sites are bringed to light. It is possible to prohibit sites in the Internet'/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-8596550672319213993</id><published>2012-12-26T05:31:00.002-08:00</published><updated>2012-12-26T05:31:35.028-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Censorship"/><category scheme="http://www.blogger.com/atom/ns#" term="Tajikistan"/><title type='text'>The access to social networks will be blocked for Tajikistan citizens  </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.7957271237391979&quot; style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Tajikistan authorities intend to toughen up censorship in the Internet by banning a number of popular sites and social networks. It is probably that their number will reach 131. This was reported by the Tajikistan service “ Radio Svoboda” (“The Freedom Radio”) with a reference to Assomidians Atoeva, the Head of the Internet Service Providers Association.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;img src=&quot;http://www.google.ru/url?source=imglanding&amp;amp;ct=img&amp;amp;q=http://www.tdgnews.it/en/wp-content/uploads/2009/09/Tajikistan.jpg&amp;amp;sa=X&amp;amp;ei=GfzaUIH8Oe374QTUyoDIBg&amp;amp;ved=0CAsQ8wc&amp;amp;usg=AFQjCNGj7-IGaD0szEV9HcBSYB505-n58w&quot; /&gt;&lt;b style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 17.77777862548828px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;According to Mr. Attoev&#39;s words companies-dealers of the Internet services have already got certain lists of sites that will be blocked. Among them are Vkontakte, Odnoklassniki, Twitter, mail.ru and also tjknews.tj, topvideo.tj, politicforum.ru, youtubemusic and tojnews.tj.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;It is fail to get any official comments from the Tajikistan Communication Service.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;On the last Friday Russian Mass Media have reported that the companies-providers in Tajikistan had been told to block the user’s access to 131 sites of social implication.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Earlier by the authority&#39;s order the Facebook activity was limited, and its blocking continued from November 26 till December 7. This step caused a sharp criticism from the USA, EU and &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The International Freedom of Expression Exchange&lt;/span&gt;&lt;span style=&quot;background-color: white; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;(IFEX)&lt;/span&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Experts connects this pressure on the Mass Media in Tajikistan and straightening the censorship with the forthcoming presidential elections in Autumn, because of which the criticism in the Internet against the main persons of the country became stronger.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 13px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/8596550672319213993/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2012/12/the-access-to-social-networks-will-be.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/8596550672319213993'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/8596550672319213993'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2012/12/the-access-to-social-networks-will-be.html' title='The access to social networks will be blocked for Tajikistan citizens  '/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-9196687488196808050</id><published>2012-12-20T04:01:00.001-08:00</published><updated>2012-12-20T04:44:09.443-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Russia"/><category scheme="http://www.blogger.com/atom/ns#" term="security news"/><title type='text'>Two Russian failures  </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
The Internet irritates Russian powers for so long and very seriously. But generally, the Internet it is a space of freedom and undercontroling. &lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://i.bnet.com/blogs/russia.jpg&quot; /&gt;&lt;br /&gt;The WWW was accused of some many things: in organization of “colored revolutions” and &lt;a a9tat=&quot;a9tat&quot; c3=&quot;c3&quot; href=&quot;http://lingvopro.abbyyonline.com/ru/Search/GlossaryItemExtraInfo?text=%d0%b3%d0%be%d1%81%d1%83%d0%b4%d0%b0%d1%80%d1%81%d1%82%d0%b2%d0%b5%d0%bd%d0%bd%d1%8b%d0%b9%20%d0%bf%d0%b5%d1%80%d0%b5%d0%b2%d0%be%d1%80%d0%be%d1%82&amp;amp;translation=coup%20d&quot; srclang=&quot;ru&amp;amp;destLang=en&#39;&quot;&gt;coup d&#39;état&lt;/a&gt; in Arab countries. Internet was called as “ the main basis of Russian opposition”. The desire to regulate the Internet comes to the executive and the legislative powers minds 25 hours a day. There even were some International initiatives from Russia towards this question. Anyway this actions are focused on restrictions of freedom of thoughts and Net information. And this is the first failure. Russia, along with a group of rather representative countries defeated in offering Internet initiatives in Dubai. &lt;br /&gt;&lt;br /&gt;On December 3-14 in Dubai there was the ITU conference. It was expected that resulting document will include statements connected with the Internet. In particular, the representatives of Russia, China, Sudan, Saudi Arabia, Alger, Bahrain offered to allow for countries-members of the Union to run Internet domains and addresses on their territory. But this offer faced with a strong opposition of such countries as Australia, the USA, Canada and several members of the EU. So, because of it, the offer was not included in the resulting document. According to “Vedomosti”, the offer to give sovereign Internet regulating rights caused a kickback among the trade members. Google accused several countries off  the desire to “capture&lt;br /&gt;the Internet control” that will lead to censorship. &lt;br /&gt;&lt;br /&gt;Another Russian failure is not so serious, but anyway... The next legislative initiative, saturated with hypocrisy and populism concerning the prohibition of alcohol advertising also suffered a defeat without any international discussions. &lt;br /&gt;&lt;br /&gt;According to the information from Izvestia.ru,  alcohol producers found a way to avoid this prohibition of alcohol advertisements in the Internet, that will come into force on January 1, 2013. They will continue to place information about their products on pages of such popular social services as LiveJournal and Facebook. &lt;br /&gt;&lt;br /&gt;Many people are sure that the prohibition on advertising of high quality alcohol  and tobacco in Media is rather unreasonable, unhumanistic and unconstitutional thing. Such a ban limits consumers right on getting information about the quality of products. &lt;br /&gt;&lt;br /&gt;So, Russia failed twice. And this is quite logical. This totally satisfy the law of the priority of the International law over municipal one. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/9196687488196808050/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2012/12/two-russian-failures.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/9196687488196808050'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/9196687488196808050'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2012/12/two-russian-failures.html' title='Two Russian failures  '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-4905928504565776596</id><published>2012-12-12T03:35:00.001-08:00</published><updated>2012-12-12T03:50:41.705-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Censorship"/><category scheme="http://www.blogger.com/atom/ns#" term="Russia"/><title type='text'>Censorship in Russia</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.8626452214084566&quot; style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;color: #434343; font-family: Arial; font-size: 19px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Ilya Varlamov is one of the most popular Russian blogger. Today his blog counts about 2 mln readers a month. By his photos, for example about the violence towards the opposition, he shows and tells about what unparliamentary controlled Media is passing over in silence.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #434343; font-family: Arial; font-size: 19px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #434343; font-family: Arial; font-size: 19px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #434343; font-family: Arial; font-size: 19px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Internet is the main Media for Putin opponents. But the period when the Kremlin underestimated the Internet force have already gone.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;color: #434343; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 19px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;img src=&quot;http://reinep.files.wordpress.com/2012/09/russian-censorship.jpg?w=466&amp;amp;h=350&quot; /&gt;&lt;b style=&quot;text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;color: #434343; font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: 19px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #434343; font-family: Arial; font-size: 19px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Ilya Varlamov, Russian blogger: Now due to the latest events I think that the Internet have caused some danger and that is why it became regulated. But they did not consider that nobody can regulate the Internet yet, except China. &amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;From the beginning of November rules changed. Now authorities can block the Internet account without a court decision if there are any suspicious in child pornography, drug promotion or suicide. Are this suspicious objective? This is decided by authorities again.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Every Russian Internet user can add his proposals to the ‘black list” of &amp;nbsp;unwanted sites.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Sergey Jeleznyak &amp;nbsp;the chairmen of the Russian State Duma said: Censored is prohibited by the Russian Constitution. The only thing we can do is to stop the spread of the &amp;nbsp;illegal information.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;There are a lot of &lt;/span&gt;&lt;span style=&quot;background-color: white; color: #393939; font-family: Verdana; font-size: 19px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;questionable cases. For example, Internet providers had to block the access to the on-line &lt;/span&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;encyclopedia because of the article about marijuana.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Russian representatives of Google company were trying to dissuade Russian government from the Internet control, but without a success.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Such bloggers as Ilya Varlamov and the opposition supporters &amp;nbsp;are afraid that it will be even worse. Now it is planned to search for some extremism on the sites.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;background-color: #fdfdfd; color: #434343; font-family: &#39;Trebuchet MS&#39;; font-size: 19px; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/4905928504565776596/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2012/12/censorship-in-russia.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/4905928504565776596'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/4905928504565776596'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2012/12/censorship-in-russia.html' title='Censorship in Russia'/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-2618923484145328677</id><published>2012-10-25T00:17:00.001-07:00</published><updated>2012-12-26T05:39:01.481-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Freedom"/><category scheme="http://www.blogger.com/atom/ns#" term="Russia"/><title type='text'>Voice of  supporters for freedom must be heard</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table class=&quot;contentpaneopen&quot; style=&quot;background-color: white; color: #333333; font-family: Helvetica, Arial, FreeSans, sans-serif; font-size: 12px; line-height: 16px; text-align: start; width: 570px;&quot;&gt;&lt;tbody&gt;
&lt;/tbody&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;&lt;div style=&quot;margin-bottom: 15px; margin-top: 10px;&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.596353548578918&quot; style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: medium; font-weight: normal; line-height: normal;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Mikhail Sokolov, the former &quot;Radio Liberty&quot; - for &quot;Novaya Gazeta&quot;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;img src=&quot;https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcSI8WUWTojpgYTsqriQFwvPM4o9cwfJKVrJ1SP-3M7Bddh-re9AZDes48k&quot; /&gt;&lt;b style=&quot;line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: Arial;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&quot;Aeroflot plane landed at the airport in Prague&quot;, as it was said to passengers. In fact, it is a true, but Ruzyne airport at the Prague already has a new name - &quot;Vaclav Havel&quot;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In 2012, the World Prague &quot;Forum 2000&quot; &quot;Media and Democracy&quot; held in Prague for the sixteenth time, but for the first time without &amp;nbsp;its founder. Probably that is why so many performances at the Palace Zofin were devoted to the person and the work of Vaclav Havel, a human rights activist, politician, and media person.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;A former Australian Minister of Foreign affairs, Gareth Evans said that during his presidency, Havel provided a strong moral support to those who fought against authoritarian regimes. Contrary to the &quot;realpolitik&quot; it takes a have a strong posision according the repression in Tibet and China, supported the democratic movement of Aung Suu Kyi in Burma, Cuba, Belarus. Havel&#39;s attitude to tyranny in all its forms was unequivocal.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;A former U.S. State Secretary Madeleine Albright said that Vaclav Havel founded the &quot;Forum 2000&quot; to bring the world closer to freedom:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Havel was able, finally, to realize his dream to travel, and he saw that the world is not that big, but there is a struggle between freedom and repression in the world. He was an honest political leader. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Actually, this endless struggle for free speech and against dictatorship was discussed at the &quot;Forum 2000&quot;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In the center of conversation were those who are active: Tibet has sent the prime minister-in-exile Lopsanga Sangeya. He talked about “ the great Chinese Internet wall”, provocations against the supporters of the Dalai Lama, and that as a sign of protest against the repression China&#39;s offensive for free speech and meetings went on more than 40 self-immolation of Tibetans. Pay attention to the assault on democracy in Ukraine passionately urged daughter of Yulia Tymoshenko - Eugene. Burma were represented by one of the leaders of the student protests of 1988, Ko Ko Gyi riots who spoke about the difficulties of transition from dictatorship to democracy, was convicted firstly on 20 and then on 65 years in prison, and was imprisoned in the camps of the junta for 26 years.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Especially bright and actively were democracy movements from Belarus Franek and Vintsuk Vechorka and Alexander Milinkevich. They consistently denounced the dictatorship in the heart of Europe, and personally dictator Alexander Lukashenko.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;At the Prague forum Russia was represented by a politician Grigory Yavlinsky, who acted as a media expert. Yavlinsky explained that in Russia the government controls all the electronic media and influential newspapers:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- There is no free independent politically influential media. They immediately destroyed when they can hardly influence on people thoughts. All politically influential media are state-owned and controlled by Vladimir Putin. Putin personally makes all key decisions about the most important media. He believes in the power of television, as he was created by the TV. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;A part of the press in Russia belongs to the business, but business in Russia is also a state-owned. So the press is owned by the government either directly or through business. In addition, many people in Russia do not require a free press, as disappointed in her 90 years at the time of construction of the criminal economy.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The state wants people to not have any politically influential press. The government has a direct interest in the neutralization of the society in its passivization because a disunity society is not a problem for the authorities. People are disappointed with politicians, corruption and social problems. Some Eastern European countries are searching for authoritarian methods of recovery. Disappointing people, the loss of respect and vision for the future are case that one can see not only in Russian. This happens also in Europe, especially in the East - in Romania, Hungary, Poland and even in the Czech Republic, where the regional elections in the two areas were won by the Communist party.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The freedom of the media is crucial. Society should pay a big price for this. it is necessary to do anything to separate the press department from the government, business and special hired by the government people. We need the public media, need also a special independent media. In a situation of frustration, crisis, uncertain future of the global economy, it may be an issue number 1 -to &amp;nbsp;have a professional independent free media, - said Grigory Yavlinsky.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Voice of the supporters of freedom must be heard loudly - said at the Forum Madeleine Albright. When a mass murder or bombing civilian villages are take place, thanks to new technologies the world will know about it. But the technology do not have a morality, they can abuse. The Nazis used the radio. Khomeini were distributing tapes. Today the Internet recruited supporters of different ideologies. We have learned to value freedom, but we must understand who and how use it. Do not be afraid of a clash of civilizations, but we can not avoid the collision of ideas, - said Professor Albright.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;I managed to talk with ф former U.S. Secretary of State alone. In an exclusive interview with the &quot;New&quot; Professor Madeleine Albright said:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- I hope for democratic change in Russia. The people of Russia is ripe to make their own decisions about their lives, and to have the opportunity to truly express their feelings. And I know that in Russia there are many people with different views. And as in every great country, its government must listen to the people who want to express their opposing views.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Are there any changes in the policies of Putin? it is hard to say. I think President Putin seems to not want to hear those who do not agree with him, and this is unfortunate because in a great country, you can not disagree with your leadership, and your leadership to listen to what you had to say.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Supporters of democracy should feel that they can express their views. They should not punish for it. And I&#39;m sorry, when I see that some of the views can not be expressed in contemporary Russia. Russia is a great country. And I think that people of Russia would and could hear a lot of interesting things for themselves.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;At the &quot;Forum 2000&quot; and Madeleine Albright made a very important point: &quot;We need to ensure that the government respects the right of the people, including the right to peaceful and orderly rise up against injustice&quot;. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;And one more detail of a history - during one of the discussions in Prague: President Vaclav Havel, for his 10 years in the City vetoed only 25 laws. In this series the highlight was to veto controversial law on television, because of which a quiet Christmas Prague in winter 2000 saw mass protests in defense of press freedom. And people in the Czech Republic were heard.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The situation in Rusiia is paradoxical: since Putin won a new election, the society began to vibrant political debate, the debate around the case of «PussiRiot». In parallel, there are continuous and steadily growing repressions, which are not a random. They reflect the line of Putin and his administration to eliminate opposition police methods. And both for the media and journalists situation becomes existential.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;You can not predict what the outcome of the current situation: Russia has a freedom of speech for the educated class, but is not going to go anywhere from the politically effective &quot;Putin machine&quot;, which is dedicated to the destruction of the idea of ​​free political competition and structural policy reform - has forecast Alexander Morozov.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;That&#39;s the difference between being in perpetual crisis of European democracy as imperfect but striving to embody the ideas of Vaclav Havel and successful development of the model of Vladimir Putin of the Russian autocracy. &lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Arial; font-size: 12px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Mikhail Sokolov&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/2618923484145328677/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2012/10/voice-of-supporters-of-freedom-must-be.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/2618923484145328677'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/2618923484145328677'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2012/10/voice-of-supporters-of-freedom-must-be.html' title='Voice of  supporters for freedom must be heard'/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-3487872277627750390</id><published>2012-10-01T05:58:00.000-07:00</published><updated>2012-12-26T05:43:47.025-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Gmail"/><category scheme="http://www.blogger.com/atom/ns#" term="Iran"/><category scheme="http://www.blogger.com/atom/ns#" term="unblock"/><title type='text'>Iran unblocks access to Gmail  </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.21583929588086903&quot; style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial; font-size: 18px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Members of Iran can again start using a mail service Gmail, said on Monday the AFP agency referring to the representative of the Ministry of Telecommunications Mohammad Reza Miri.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial; font-size: 18px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;img src=&quot;http://www.timeturk.com/resim/en/2012/10/01/iran-unblocks-access-to-gmail.jpg&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12.222222328186035px;&quot; /&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.21583929588086903&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium; font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;According to Miri, there was a consequence of blocking Gmail closing local authorities access to the video sharing YouTube. &quot;Unfortunately, we do not know how to &amp;nbsp;differentiate technically these two services. We want to block access to Youtube and Gmail. This was unintentional,&quot; - said Miri.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Recall, on September 25, Iranian authorities have announced their decision to block the Internet search engine Google, Gmail email service and video hosting YouTube.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;This was announced on a state television Abdolsamada Horamabadi Iran, the state official agency for Internet censorship and computer crime.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial; font-size: 18px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;According Horamabadi the reason for this step is to avoid the administration of Google to block links to controversial film of innocent of Muslims and remove it from the video sharing YouTube.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/3487872277627750390/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2012/10/iran-to-unblock-access-to-gmail.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/3487872277627750390'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/3487872277627750390'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2012/10/iran-to-unblock-access-to-gmail.html' title='Iran unblocks access to Gmail  '/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-6229118062063884901</id><published>2012-09-29T01:22:00.003-07:00</published><updated>2012-12-30T01:46:55.225-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><title type='text'>The creator of &quot;innocent of Muslims&quot; feels safer in prison  </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.44319296116009355&quot; style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In the U.S &lt;/span&gt;&lt;span style=&quot;background-color: #fefefe; color: #003399; font-family: Arial; font-size: 15px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;arrested&lt;/span&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; one of the creator of the film &quot;innocent of Muslims&quot; because it for three weeks &lt;/span&gt;&lt;span style=&quot;background-color: #fefefe; color: #003399; font-family: Arial; font-size: 15px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;shakes the entire Islamic world&lt;/span&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Curiously, he was not arrested for insulting the religious feelings, but because of the fair him to the offended.&lt;/span&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Nakula Nakula Basili got to the police for having joined the Internet - it was forbidden by the court due to past misconduct.&lt;/span&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Therefore the arrest was given as for his safety.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.44319296116009355&quot; style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Authorities in Los Angeles have chosen the day for the arrest. In the Muslim world was already Friday. For those who practice Islam it is a blessed day, holidays and weekends. On Friday Muslims often gather for thousands shares, rallies and marches. Today, the arrest was the reason.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b id=&quot;internal-source-marker_0.44319296116009355&quot; style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Nakula Nakula Bassel, who according to the careful wording of the court, presumably, is behind the film-provoking &quot;innocent of Muslims&quot;, is placed in the city jail without a bail.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;In the courtroom, he is gray sneakers, white and yellow shirt, handcuffs and a chain around his waist. The judge asked his real name. Mark Bassel Yousef, said the defendant. The lawyer offered 10 thousand dollars as a deposit, please note that many Muslims in prison, and the defendant there in mortal danger. The judge ruled otherwise and counsel refused.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Muslims around the world follow this process. The prosecution seemed very strange. Judge who came from Egypt accused Bassel not for the film, and so much blood, and for violation of parole. Back in 2010, he was sent to prison for fraud with bank loans. Within 5 years, it us forbidden to use the Internet and come up with nicknames - network aliases. Both conditions are violated - Bassel on YouTube under the name Sam Besil posted a 14-minute video &quot;innocent of Muslims&quot;, besides using the web he has 17 more aliases. The film ostensibly is to protect Coptic Christians, but for Muslims the author became the enemy number one.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&quot;I declare the bounty of this blasphemer, this sinner, who insulted our holy prophet. The fact is &amp;nbsp;who killed him and will fulfill the sacred duty, the reward of one hundred thousand dollars&quot; - promised the other day Bilur Ghulam Ahmad, Minister of Railway Transport of Pakistan.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The government of Pakistan later negotiated that this is a personal point of view, the minister, but judging by what has happened after the movie, he is not one of its shares. Defeated several U.S. embassies, burning hundreds of stars and stripes. In Benghazi, the Libyan ambassador to the U.S. in pieces. Muslims protesting not only in the Middle East and North Africa - the troubled Western Europe, Asia reeling - protests in India, Indonesia and Thailand.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&quot;Why do we have to settle it down? The access to the video have to be blocked. Film&#39;s producer must be punished. We demand justice!&quot; - said one of the people who signed the petition to ban access to the movie &quot;The innocence of the Muslims&quot;.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The actors who played in the provocative film claim that they were deceived. There were no mention in the scenario that the film is about Islam and the Prophet Muhammad. Washington has asked for, YouTube and Google Sergey Brin to delete movies from the Internet. Businessman is protected by the First Amendment to the U.S. Constitution - the freedom of speech.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: #fefefe; color: #333333; font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The U.S. authorities did not forget about the existence of the amendment. During the active combat operations in Iraq and Afghanistan channels that show footage of dead soldiers and harassment of the local population were forbidden. And even now, CNN and the New York Times received a severe reprimand from the State Department for the publication of the diary because of that was killed the ambassador in Benghazi.&lt;/span&gt;&lt;/div&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/6229118062063884901/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2012/09/creator-of-innocent-muslims-feels-safer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/6229118062063884901'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/6229118062063884901'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2012/09/creator-of-innocent-muslims-feels-safer.html' title='The creator of &quot;innocent of Muslims&quot; feels safer in prison  '/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-1013356968602010291</id><published>2011-08-24T03:24:00.000-07:00</published><updated>2011-08-24T03:45:08.524-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Wi-Fi Security"/><title type='text'>All You Need to Know About Wi-Fi Security</title><content type='html'>&lt;div&gt;&lt;a href=&quot;http://wi-fi-security.blogspot.com/2011/08/all-you-need-to-know-about-wi-fi.html&quot;&gt;&lt;img title=&quot;All You Need to Know About Wi-Fi Security&quot; alt=&quot;All You Need to Know About Wi-Fi Security&quot; align=&quot;left&quot; height=&quot;150px&quot; width=&quot;150px&quot; src=&quot;http://www.instructables.com/image/FKJPBPUG5W7CSL8/Wifi-security.jpg&quot; /&gt;&lt;/a&gt;&lt;p style=&quot;margin-bottom: 0cm&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;&lt;b&gt;Wi-Fi technologies and Wi-Fi Security are rather meaningful nowadays. Their importance rises because of frequent usage internet technologies both at home, office and in hot spots. The global village widens its borders now; the security becomes more and more concerned. Many users do not even bother about the internet security while using they it computers or laptops everywhere they need. It’s in vain. While installing Wi-Fi software one need to set up all possible settings and follow necessary measures before demonstrating these or that data to one of your friends or colleagues.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;What should user know about the Wi-Fi&lt;b&gt; &lt;/b&gt;measures while using in everyday life. Of course you are to follow the &lt;a href=&quot;http://www.smarthide.com/&quot;&gt;rules of Wi-Fi Security&lt;/a&gt; and to change passwords as often as possible. Most of the Wi-Fi base stations may provide default keys or may give the password which is already being using by several computers simultaneously. Of course it obviously makes your PC data rather vulnerable to hacker’s attacks. What’s more hackers are very developed nowadays. Recently one of the Facebook bloggers threatened of destroying this system one day.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;How to avoid all the evident and up- to- date difficulties. The answer is rather simple - keep your password in the place accessible only to you, make it easy to remember to you. Only then you will feel that your network is sufficiently secure.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;You are also to remember that every operating system has its own peculiarities and the manner of compounding the password may also differ. Much also depends on the type of the modem being used. Usually all WIFI modems have range SSID (Service Set Identifier).&lt;br /&gt;Much depends on the traffic available, if an outsider identifies the name of network you are working in all measures of protection have been done in vain.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;One more thing that can help you in organizing secure functioning is scrambling the passwords of the net. WEP may help in this. Disinterested hackers are not able to destroy private data but determined ones can break it.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;Every computer has its own machine access code (MAC). You may configure your base station so that it would give the access only to your MAC addresses.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;So now we know all the possible measures of creating secure Wi-Fi network.&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/1013356968602010291/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2011/08/all-you-need-to-know-about-wi-fi.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/1013356968602010291'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/1013356968602010291'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2011/08/all-you-need-to-know-about-wi-fi.html' title='All You Need to Know About Wi-Fi Security'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-6430025609642675219</id><published>2011-07-20T03:57:00.000-07:00</published><updated>2011-07-20T03:57:00.490-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="WiFi Security tips"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless network security"/><title type='text'>Check Home Wireless Security Basics Once Again</title><content type='html'>&lt;a href=&quot;http://www.blogger.com/post-create.g?blogID=3069634593329107485&quot; alt=&quot;Wireless Security Basics&quot; title=&quot;Wireless Security Basics&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 170px; height: 120px;&quot; src=&quot;http://www.laptopsarena.com/wp-content/uploads/2009/11/laptop-wireless-internet-connections2-470x391.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;b&gt;Wireless Internet is comfort and mobility at the same time. Protection of the network consists of several steps. Communications in the network are specially encrypted. One may choose between &lt;a href=&quot;http://www.smarthide.com&quot;&gt;Wi-Fi Protected Access&lt;/a&gt; or Wired Equivalent Privacy.&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Apply spyware software or antivirus programs or firewall&lt;/li&gt;&lt;li&gt;Identifier broadcasting is some kind of wireless router&lt;/li&gt;&lt;li&gt;Remember only being turned off computer will be safe from signals from any devices&lt;/li&gt;&lt;li&gt;Changing of the pre-set password makes the situation more reliable. The longer password is the more difficult it to be cracked.&lt;/li&gt;&lt;li&gt;In purpose of security your computer should be let down for access only by specific PCs of wireless network&lt;/li&gt;&lt;li&gt;It’s better to turn off when it’s not used.&lt;/li&gt;&lt;/ul&gt;Public “hot spots” are not always secure; other people can get the access to your data and observe all your actions.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Wireless Network Security&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Wireless network attracts more and more users nowadays because of comfort and mobility. Up to date businessmen being on their vacations can be in touch with their staff with the help of wireless network or lazy shoppers if there are such at all can purchase all they need being on-line.&lt;br /&gt;&lt;br /&gt;Wireless network can be set up in any part of the lodging without any cords and any kind of staff and one can get the access to the net in any possible place where the network is available.&lt;br /&gt;&lt;br /&gt;Wireless connection usually requires broadband Internet access in home or some kind of “access point”, it can DSL cord switch into the modem. Setting up to the kind of network consists of several steps:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Connection to the access point&lt;/li&gt;&lt;li&gt;Broadcasting a signal&lt;/li&gt;&lt;li&gt;One should know that computers are equipped with special client card pulling signal in the air and gaining web access.&lt;/li&gt;&lt;/ul&gt;The possibility of unauthorized users to log in to the wireless net is its only pitfall. It makes hackers or neighbor active in its malicious actions. It arouses the level of web criminality or other similar actions.&lt;br /&gt;&lt;br /&gt;Fortunately, there are&lt;b&gt; steps protecting security of PC data&lt;/b&gt;. They are as follows:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;1) Encryption&lt;/b&gt; prevents any interference or communications in the net. Wireless routers, base stations and access points possess encryption mechanism. Usually encryption feature is turned off, it must be set up. There are two types of encryption: Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). It depends on the user choice what to set up. The most popular and often used encryption is WEP.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2) Then follows firewall installation&lt;/b&gt;, it provides anti-virus protection. The second step is manual connection to the net with the help of SSID name, then one should change the identifier up to the standard otherwise it can be caught be hackers, configure unique ID in wireless router, use password consisting of at least 10 symbols. Treat your net carefully, turn it off when it is not used. Do not switch to in “hot spots”, always save information you got in wireless connection. &lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;3) Using &lt;a href=&quot;http://www.smarthide.com&quot;&gt;WiFi Security Software like SmartHide&lt;/a&gt; to ensure your WiFi Security. It is easy and not free solution but when you are using it, you can be sure that your wireless network are safeguarded for sure.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/6430025609642675219/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2011/07/check-home-wireless-security-basics.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/6430025609642675219'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/6430025609642675219'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2011/07/check-home-wireless-security-basics.html' title='Check Home Wireless Security Basics Once Again'/><author><name>Seo Sniper</name><uri>http://www.blogger.com/profile/08494711083352834002</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-920667602328487905</id><published>2011-07-19T00:59:00.000-07:00</published><updated>2011-07-19T02:39:31.606-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="WiFi Security tips"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless network protection"/><category scheme="http://www.blogger.com/atom/ns#" term="wireless network security"/><title type='text'>How to Protect Wireless Network – Five Easy Steps</title><content type='html'>&lt;a href=&quot;http://wi-fi-security.blogspot.com/2011/07/how-to-protect-wireless-network-five.html&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 160px; height: 217px;&quot; src=&quot;http://rstcs.com/wp-content/uploads/2011/03/wireless_networking.gif&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;p style=&quot;text-align: left;margin-bottom: 0cm; font-weight: bold; &quot; align=&quot;JUSTIFY&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;The popularity of Wireless Network becomes more and more evident. It can be used in laptop IPhone, mobile devices. The only disadvantage and inconvenience of wireless nets is the possibility of interference into it and downloading data. Wireless also allows stealing laptop battery resource to be stolen. Only &lt;a href=&quot;http://www.smarthide.com/&quot;&gt;protection of information&lt;/a&gt; can help to find out the solution. &lt;/span&gt; &lt;/p&gt; &lt;p style=&quot;text-align: left;margin-bottom: 0cm; &quot; align=&quot;JUSTIFY&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;The essence of wireless network is usage of radio signals for communication. They travel outside home network; other wireless devices can pick up unprotected signals and connect to network, caught information which has not been sent yet. One of the best examples of wireless devices which can be created at home is Dell Inspiron 6400.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm; text-align: left;&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;&lt;b&gt;Ways of protection wireless network&lt;/b&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm;&quot; align=&quot;JUSTIFY&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;You should consider safety factors in setup of wireless network. One of them is transmitter in wireless networks. Wireless firewalls and security protocols are offered at gateways, routers, cellular base stations. They provide protection networks from risks.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;text-align: left;margin-bottom: 0cm; &quot; align=&quot;CENTER&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;&lt;i&gt;1. Usage of firewall&lt;/i&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm;&quot; align=&quot;JUSTIFY&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;Firewall is some kind of barrier which helps to through away all the suspicious objects and data which intrude into the net. Dell Latitude D420 Battery is the device which provides the protection of the network while being in use. Firewalls can be reached in various variants, hardware and software. Both variants can be used, it depends on the situation.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;text-align: left;margin-bottom: 0cm; &quot; align=&quot;CENTER&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;&lt;i&gt;2. Wireless encryption&lt;/i&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm;&quot; align=&quot;JUSTIFY&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;Wireless network has a great variety of protocols with encryption. There are great variety of methods in network security functioning. &lt;/span&gt; &lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm;&quot; align=&quot;JUSTIFY&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;Equivalent Protocol of wired nets&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm;&quot; align=&quot;JUSTIFY&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;WEP is encoded security protocol, it uses in all network bases of information with the help of WEP key. It assigns to the network and setups it with the WEP key. One can have personal key or create different with selected options. Correct password allows user enter into the network from battery 4 us.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;text-align: left;margin-bottom: 0cm; &quot; align=&quot;CENTER&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;&lt;i&gt;3. Wi-Fi protected access&lt;/i&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm;&quot; align=&quot;JUSTIFY&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;WPa security settings are used to decrypt and encrypt data transmitted in the network. Static security key in WEP encryption is not used. Instead of it Temporal Integrity Protocol is dynamically generated with a new key for each packet. &lt;/span&gt; &lt;/p&gt; &lt;p style=&quot;text-align: left;margin-bottom: 0cm; &quot; align=&quot;CENTER&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;&lt;i&gt;4. Connection to the private network&lt;/i&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm;&quot; align=&quot;JUSTIFY&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;While creating the private network point one should avoid network names in transmitter. Because the networks mostly transmit the default names, and all the computers in the neibourghoud can intrude to your data. While creating new working network station one should remember the SSID for connection new points in the net no matter whether it closed or there is no SSID broadcasting.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;text-align: left;margin-bottom: 0cm; &quot; align=&quot;CENTER&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;&lt;i&gt;5. Public safety&lt;/i&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin-bottom: 0cm;&quot; align=&quot;JUSTIFY&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;Talking about public safety in is necessary to consider that “hot spots”: cafes, airports, are very dangerous places from the point of view of security information. Wireless networks should be highly protected in order not to be destroyed. It is better to limit the activities to the dangerous e-mails, and basic security points while being in such kind of net.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: 0cm;&quot; align=&quot;JUSTIFY&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;&lt;i&gt;...Last but not least&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: 0cm;&quot; align=&quot;JUSTIFY&quot;&gt;If you do not want do all these steps and you need an easy solution to protect your WiFi, use &lt;a href=&quot;http://www.smarthide.com/&quot;&gt;SmartHide&lt;/a&gt; to protect your wireless connection in public places and at home.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/920667602328487905/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2011/07/how-to-protect-wireless-network-five.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/920667602328487905'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/920667602328487905'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2011/07/how-to-protect-wireless-network-five.html' title='How to Protect Wireless Network – Five Easy Steps'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-1011423553874103419</id><published>2010-05-25T01:22:00.000-07:00</published><updated>2012-12-30T01:47:48.539-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="WiFi Security Services"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi Security Software"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi Security tips"/><title type='text'>Ruckus Wireless Awarded Wi-Fi Security Patent for Dynamic Authentication and Encryption</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.3926241856534034&quot; style=&quot;font-weight: normal; text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;A new Advances Wi-Fi Security Innovationan that Simplifies Allowing Encryption Keys to be Automatically Generated for Each Wireless User and Installed on the End User Devices&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;SUNNYVALE, Calif., May 24 /PRNewswire/ -- Ruckus Wireless™ today it is announced that it get a patent from the United States Patent and Trademark Office (USPTO) for an innovation that radically simplifies the configuration, administration and strength of wireless network security. This patent is one of nearly two dozen patents granted to Ruckus with dozens more pending approval.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The new technique, commonly known as Dynamic Pre-Shared Key (PSK), effectively eliminates tedious and time-consuming manual installation of encryption keys, passphrases or user credentials needed to securely access a wireless network. Dynamic PSK changes this model by dynamically generating strong, unique security keys for each authenticated user, automatically installing these encryption keys on the end user devices with little or no human intervention.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;With the explosive growth of Wi-Fi networks around the world, organizations struggled with how to streamline the complexity and cost of implementing robust wireless security. Many companies have used a passphrase that must be shared among many users and manually entered into client devices. If this &quot;pre-shared key&quot; becomes known or stolen it must be changed for all users and manually re-entered into every client device.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;A popular alternative to the pre-shared key approach is an elaborate security framework (e.g. 802.1X) that requires information, such as unique certificates or supplicants, to be installed on every user device. Deploying such systems requires a high level of technical expertise as well as ongoing technical support for users.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&quot;Concerning the Wi-Fi there were two ends of the security spectrum&quot; said Steve Martin, VP of Engineering for Ruckus Wireless. &quot;On the one end is the simple approach that makes life easy for network managers but creates potential security concerns for companies. On the other end is a very robust but often overwhelming security framework, such as 802.1X, that requires a tremendous amount of a time and an effort to implement. We&#39;ve created the best of both worlds with a user-friendly and low maintenance method for providing a high level of wireless security&quot;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Using Dynamic PSK, organizations can now streamline the administration of wireless security with the confidence of knowing that their wireless network is protected. Integrated into all Ruckus ZoneDirector wireless LAN controllers at no cost, Dynamic PSK technology is an independent-device and works on laptops and handheld Wi-Fi enabled devices.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;How Does Dynamic PSK Work?&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;When a user initially accesses the wireless network, they are authenticated through a captive portal on the Ruckus ZoneDirector. This information is checked against any standard back-end authentication server such as Active Directory, RADIUS or an internal database on the ZoneDirector. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Once the user has successfully authenticated, Dynamic PSK technology automatically generates a unique encryption key for that user device. This key is downloaded to the client and automatically configured, along with the requisite Wi-Fi information. This eliminates users from having to manually configure anything and dramatically reduces the technical support burden on IT staff.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Each Dynamic PSK is bound to a specific client device and has a configurable lifetime. With Dynamic PSK, organizations control the length of time that each key is valid in increments of hours, days, weeks or months. Once the key expires, users must re-authenticate. If a user device is stolen, others on the network are not at risk. Network managers only need to delete the compromised user or device record in their authentication database.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&quot;The simplicity of these technologies, like Dynamic PSK, truly changes the game for wireless deployments,&quot; said Matthew Crandall, Associate Director of Information Services at Johnson College in Pennsylvania. &quot;Dynamic PSK has been a remarkable time-saving tool for us -- eliminating the hassle of configuring each and every end user device while still giving us state-of-the-art Wi-Fi security.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&quot;Like a lot of organizations, we demanded strong wireless security but didn&#39;t want the management hassles associated with it. Dynamic PSK breaks through the conventional problems that have inhibited implementing a simple and strong wireless security architecture that easily scales,&quot; concluded Crandall.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Johnson College operates a campus-wide 802.11n Wi-Fi network across 13 buildings. When new users access an open &quot;provisioning&quot; wireless network (SSID), they use secure HTTPS to authenticate against Johnson College&#39;s user directory. Once authenticated, user devices are automatically configured with a unique encryption key and required SSID information. The devices then securely connect to the appropriate Johnson College wireless network.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;About Ruckus Wireless, Inc.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Headquartered in Silicon Valley, Ruckus Wireless is a manufacturer of advanced &quot;Smart Wi-Fi&quot; technology and wireless LAN (WLAN) systems used by enterprises and carriers around the world. Ranked as the top telecom company in the 2009 Inc. 500 list and named a World Economic Forum Technology Pioneer, Ruckus has developed patented technology that uniquely extends signal range and allows for consistently reliable distribution of delay-sensitive multimedia content and services over standard 802.11 Wi-Fi. Its flagship product line, ZoneFlex, is the first centralized wireless LAN system to combine state-of-the-art Wi-Fi smart antenna arrays and wireless meshing to deliver maximum range and reliable performance at the lowest cost. Leading broadband operators use its MediaFlex multimedia routers to extend wireless digital services such as IPTV throughout subscribers&#39; homes worldwide. Ruckus has raised approximately $51 million from premier investors such as Sequoia Capital, Focus Ventures, Sutter Hill, Motorola, T-Ventures, Telus, Mitsui and others. Ruckus Wireless is led by Ms. Selina Lo, president and chief executive officer. For more information, visit Ruckus Wireless at http://www.ruckuswireless.com.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Media Contacts&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Nancy MacGregor Hill&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;RealTime Communications&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;nancy@realtime-comm.com&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;+1-510-733-6228 office&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;+1-415-309-5185 mobile&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;David Callisch&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Ruckus Wireless&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;david@ruckuswireless.com&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;+1-408-504-5487&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/1011423553874103419/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/ruckus-wireless-awarded-wi-fi-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/1011423553874103419'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/1011423553874103419'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/ruckus-wireless-awarded-wi-fi-security.html' title='Ruckus Wireless Awarded Wi-Fi Security Patent for Dynamic Authentication and Encryption'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-8210794975410888626</id><published>2010-05-03T18:58:00.000-07:00</published><updated>2010-05-03T18:58:00.334-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network Security Software"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi Security Software"/><title type='text'>Arbor Networks Offers Virtual Network Security Tool</title><content type='html'>Arbor Networks, whose technology detects abnormal network traffic flow, now offers its PeakFlow monitoring tool for use in virtualized environments. PeakFlow X Virtual 4.2 is the alternative to PeakFlow X software that monitors packet flow through network routers and switches, alerting system administrators if traffic spikes above normal patterns, such as in the case of a distributed denial of service (DDOS) attack. The virtual version of the software is designed to run in VMware&#39;s ESX and ESXi hypervisors.&lt;br /&gt;&lt;br /&gt;PeakFlow SP was introduced in 2000, targeting telecommunications service providers such as Verizon, AT&amp;T, British Telecom and others that operate vast global networks and also serve as Internet service providers (ISPs). The appliance sampled about one packet in 100,000 to extrapolate from there network traffic patterns. In 2006, Arbor introduced PeakFlow X, which was targeted at enterprises and sampled 100 percent of network traffic, said Tom Bienkowski, director of product marketing for Arbor Networks.&lt;br /&gt;&lt;br /&gt;Increasingly, though, service providers are showing an interest in also using the enterprise version of PeakFlow as they become managed security service providers (MSSPs) to their customers, said Bienkowski. Frost &amp; Sullivan estimates that the size of the global managed security service market will grow to about $2.5 billion in 2015, from about $1.5 billion this year. Offering the virtualized product makes providing that security more cost-effective for MSSPs. &quot;The virtual version of the X products allows these service providers to deliver those managed services much more economically. It&#39;s much easier, there&#39;s less rack space -- all the advantages of being virtual,&quot; Bienkowski said.&lt;br /&gt;&lt;br /&gt;DDOS attacks are growing in size and severity, he added. Arbor Networks&#39; own analysis reports DDOS attacks in 2007 of as high as 40Gbps, up from just 10 Gbps in 2004, and the rise of cloud computing is only going to create richer targets for attacks and more opportunities for companies such as Arbor Networks, said Jennifer Pigg, an analyst with Yankee Group. &quot;[In the cloud] there are things moving in and out of the network that you can&#39;t pin down the location for, you don&#39;t know where the resources are located so it becomes a real security vulnerability, and it becomes that much more difficult to trace where there is something like a denial of service attack,&quot; Pigg said. Arbor Networks can appeal to a large market of both ISPs and enterprises that are creating clouds for their own use or as a public cloud offering, Pigg added.&lt;br /&gt;&lt;br /&gt;Arbor Networks competes against companies like Lancope, with its StealthWatch line of network monitoring technology, and Mazu Networks, whose Mazu Profiler software also does network behavioral analysis. But Pigg said there are other companies in the domain name system (DNS) space that also provide DDOS notification, such as Neustar and Nominum.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Source&lt;/span&gt;: networkcomputing.com&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/8210794975410888626/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/arbor-networks-offers-virtual-network.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/8210794975410888626'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/8210794975410888626'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/arbor-networks-offers-virtual-network.html' title='Arbor Networks Offers Virtual Network Security Tool'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-5818920928775728446</id><published>2010-05-03T15:00:00.000-07:00</published><updated>2010-05-03T15:00:03.012-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="WiFi Security tips"/><title type='text'>Why WiFi Security and encryption matter?</title><content type='html'>Recently there seems to be a never ending stream of information leaks percolating through the news.  Several states mandate wireless networks implement encryption and the Federal government is looking at forcing companies to disclose information leaks to affected customers.  Of course any information leak or unauthorized access to sensitive data on a personal or even worse business network may present a myriad of liability issues.&lt;br /&gt;&lt;br /&gt;Wireless networks are often targeted and most of them are not up to the standard of security that is publicly available. Using no encryption leaves your network immediately open to attack.  This means any third party can connect in to your network, discover resources like shared files or computers that are vulnerable and gain access.  There is not much, if any legal protection afforded in this situation as the network is open.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;WEP (wireless equivalent privacy) is an older standard that for its time was certainly better than no encryption, but these days it is not much more secure than leaving the network wide open.  The reason is that there exist several fundamental flaws in the WEP algorithm that leave your network vulnerable, including, but not limited to:&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;br /&gt;&lt;li&gt;Passive attacks to decrypt traffic&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Active attacks to inject new traffic from unauthorized nodes&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Active attacks to decrypt traffic based on fooling the AP (access point)&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Dictionary-based attacks that may take some time, but allows full decryption of all network traffic&lt;/li&gt;&lt;br /&gt;&lt;/ol&gt;&lt;br /&gt;&lt;br /&gt;These attacks are simple to configure and can be implemented with off  the shelf equipment, including many standard laptop configurations.  Furthermore, WEP uses RC4 encryption, a weaker and older form of stream-based encryption that is easy for attackers to exploit because of its vulnerable key exchange mechanism and the lower grade cipher used.&lt;br /&gt;&lt;br /&gt;Many routers are setup to use WEP encryption, even those supplied by Internet providers.  If you are using WEP (or no encryption at all) it’s best to consider using WPA2 with AES encryption.  This is the highest publicly available wireless encryption standard.  If your router or wireless card does not support this standard now would be a good time to consider upgrading.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Source&lt;/span&gt;: arlingtonvacomputerrepair.com&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/5818920928775728446/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/why-wifi-security-and-encryption-matter.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/5818920928775728446'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/5818920928775728446'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/why-wifi-security-and-encryption-matter.html' title='Why WiFi Security and encryption matter?'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-607746035570162849</id><published>2010-05-03T12:44:00.000-07:00</published><updated>2010-05-03T12:44:00.220-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi Security tips"/><category scheme="http://www.blogger.com/atom/ns#" term="WiFi Security videos"/><title type='text'>HOWTO setup WiFi Security on your router and connect to your wireless network</title><content type='html'>This guide will show you how to put a security code on your wireless network so strangers can not access your Internet, how to connect to a secured wireless network. Router configuration addresses D-Link 192.168.0.1 Linksys 192.168.1.1 Belkin 192.168.2.1 Netgear 192.168.0.1&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;480&quot; height=&quot;385&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/nPmp0tlwa-M&amp;hl=ru_RU&amp;fs=1&amp;&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/nPmp0tlwa-M&amp;hl=ru_RU&amp;fs=1&amp;&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;480&quot; height=&quot;385&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Source&lt;/span&gt;: articlemarks.com&lt;br /&gt;&lt;br /&gt;Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/607746035570162849/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/howto-setup-wifi-security-on-your.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/607746035570162849'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/607746035570162849'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/howto-setup-wifi-security-on-your.html' title='HOWTO setup WiFi Security on your router and connect to your wireless network'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-5334680628952356923</id><published>2010-05-03T10:32:00.000-07:00</published><updated>2010-05-03T10:32:00.312-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Free Download"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><title type='text'>White Paper - Modern Network Security: The Migration to Deep Packet Inspection</title><content type='html'>Where attacks like Smurf, Fraggle and the Ping of Death were the key threats in years past, now attacks such as &quot;Microsoft IIS 5.0 printer ISAPI extension buffer overflow vulnerability&quot; and &quot;Unicode directory traversal&quot; are more prevalent, albeit much less imaginatively named...&lt;br /&gt;&lt;br /&gt;Read more in the white paper.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://depositfiles.com/files/jegplg1lt&quot; rel=&quot;nofollow&quot;&gt;Download White Paper&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Source&lt;/span&gt;: whitepapers.hackerjournals.com&lt;br /&gt;&lt;br /&gt;Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/5334680628952356923/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/white-paper-modern-network-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/5334680628952356923'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/5334680628952356923'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/white-paper-modern-network-security.html' title='White Paper - Modern Network Security: The Migration to Deep Packet Inspection'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-4544801770902816466</id><published>2010-05-02T21:24:00.000-07:00</published><updated>2010-05-02T22:32:17.928-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Network Security"/><title type='text'>Texas Network Security Systems are Tighter Than a Biscuit</title><content type='html'>Network security is one of the most important factors to be considered while setting up a network at home or at the office. An unsecured network will result in loss of information and data. Network Security in Austin Texas plays a very important role to the people of Texas as their computers may be given a potential threat from the Internet.&lt;br /&gt;&lt;br /&gt;More over cyber crimes are increasing tremendously these days which is to be considered as a matter of great importance. Austin Texas Network Security should be strengthened by all the computer users of Texas so that they can be safe about their data and information.&lt;br /&gt;&lt;br /&gt;Most people in Texas do not still know what network security is and the dangers that can be caused by the security breach. Any one can get into the computer of an unsecured or unprotected network and can use the data or information that is available in the system.&lt;br /&gt;&lt;br /&gt;If the Austin Texas Network Security is too weak then hackers can easily modify the data or even destroy the data present in the computer. Network Security in Austin Texas depends on the protection and the security of the network in which the computer is connected to.&lt;br /&gt;&lt;br /&gt;Network security is basically not about updating programs in the system and rather it is removing the malware, spyware and other intruding programs that damage the capability of the system. Network Security in Austin Texas should be made available to all the people in the city and everyone should be aware of the potential dangers of an unsecured network.&lt;br /&gt;&lt;br /&gt;Austin Texas Network Security comes into a role where the people of the city are working with an always on Internet connection where the chances of getting a security breach are high. With high speed Internet connections coming to reality people should be very much aware of the network security.&lt;br /&gt;&lt;br /&gt;Every person in the city of Texas who has a system and which is connected to a network which can be a local area network or a wide area network should be very careful about his network. Austin Texas Network Security is used by the people only when their system is affected by a virus program or there has been a loss of data in their system.&lt;br /&gt;&lt;br /&gt;Most companies forget the danger of an unsecured network which can result in a great loss to the company as the company secrets and their information can go destroyed without Network security in Austin Texas. If one system is affected by a virus which is connected to an unsecured network every person in that network has the chance of getting that virus very easily if Austin Texas Network Security not proper.&lt;br /&gt;&lt;br /&gt;A malicious code can cause the whole system to crash without the knowledge of the user of the system if the Network security in Austin Texas is weak. The damage is very strong that even a bank’s network or an airline or any company in the city can be completely shut down due to poor Austin Texas Network Security.&lt;br /&gt;&lt;br /&gt;The damages due to these are increasing every year and so the people should be careful about their computers and make sure it is secured while it is connected to a network.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Source&lt;/span&gt;: tech.yug.com&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/4544801770902816466/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/texas-network-security-systems-are.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/4544801770902816466'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/4544801770902816466'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2010/05/texas-network-security-systems-are.html' title='Texas Network Security Systems are Tighter Than a Biscuit'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3069634593329107485.post-6893127073239323846</id><published>2010-01-28T00:19:00.000-08:00</published><updated>2010-01-28T00:24:11.302-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="WEP Wireless Security Stinks – Find Out Why"/><title type='text'>WEP Wireless Security Stinks – Find Out Why</title><content type='html'>A part of securing your network needs of your wireless access points. Wireless access can be dangerous to your network. Most people do not know how easy it is to use wireless access points. Let me illustrate my point. I went one afternoon and took my trusty &lt;b&gt;laptop&lt;/b&gt; with me. The task was to scan this afternoon &quot;open&quot; wireless access points. An &quot;open&quot; wireless access point is one that has no encryption, or &lt;b&gt;security,&lt;/b&gt; on the signal.This allows anyone to listen to your stream.&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://palisade.plynt.com/images/cracking-wep.png&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 480px; height: 319px;&quot; src=&quot;http://palisade.plynt.com/images/cracking-wep.png&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;If you still can not get, it&#39;s a very bad thing! So I drove for about 2 miles through a small business district and apartment complex. What was the outcome? Oh, about 45 open wireless networks. This means that I could subscribe to those networks, scan it, and to use machines connected to that network. I did not do it, but you my drift. The lesson here is to encrypt your wireless data stream. &lt;/p&gt; &lt;p&gt; Some people think that the choiceWEP encryption provides great &lt;b&gt;wireless security.&lt;/b&gt; It would be wrong. Your wireless router may have an option for WPA and WEP. You should always choose &lt;b&gt;WPA security&lt;/b&gt; over WEP. Let me explain why. I set up a wireless network in my home. I enabled &lt;b&gt;WEP security&lt;/b&gt; with 128-bit encryption. The &quot;strong&quot; &lt;b&gt;security&lt;/b&gt; for WEP encryption. I wrote the &lt;b&gt;security&lt;/b&gt; key and then I started my test. My aim was to hack my own WEP wireless network. I thought it woulda really difficult task. I was wrong.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://compscistuff.com/wp-content/uploads/2009/07/7421-asus-wl500gp-wireless-router-connectivity.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 400px; height: 324px;&quot; src=&quot;http://compscistuff.com/wp-content/uploads/2009/07/7421-asus-wl500gp-wireless-router-connectivity.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt; I shot on my Linux &lt;b&gt;laptop.&lt;/b&gt; Linux is simply an alternative operating system to Windows. This particular Linux distribution or Linux variant was a &lt;b&gt;safety issue.&lt;/b&gt; This gave me all kinds of tools to scan for wireless networks and exploiting. A typical hacker is all these free tools are available. I then fired up Kismet. Kismet is a great Wi-scanning program. I have my wireless network in the list. Ifound the connected client and the access point or router. Then I went to a typical type of attacks do on the network. Hackers have to dig what a &quot;package&quot; from a computer that already has the key for the secure wireless network. The hacker can then this package to replies from the router. Why is this so important? This allows the hacker a tremendous amount of data from the access point to collect. And they can eventually crack the hacker on the &lt;b&gt;WEP security&lt;/b&gt;Key. &lt;/p&gt; &lt;p&gt; So I went to my own hacking WEP wireless router. I &quot;deauthenticated&quot; my computer that was already connected to the router. This gave me the package I needed for the router. Then I started sending this packet to the router a lot. Once I had enough data from the router, I then went to a cracking program. Viola, it cracked the key in about 1 second. After the dust settled, I had cracked my &lt;b&gt;WEP security&lt;/b&gt; in less than 30 minutes! But would the typical userI chop? Probably not. The only thing they would see is that their wireless connection for a moment lost. This is when I deauthenticated &quot;grab&quot; them from the network of &quot;packet&quot; I needed it.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.mp3car.com/vbulletin/attachments/wireless-communications/29338d1147666124-wifi-annoyances-problems-wep-homenetwork.jpg&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 684px; height: 464px;&quot; src=&quot;http://www.mp3car.com/vbulletin/attachments/wireless-communications/29338d1147666124-wifi-annoyances-problems-wep-homenetwork.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt; Remember, I had my set WEP encryption to 128 bits. This is a high level of encryption. But it does not matter. All the hacker needs is a signal to crack a little time to them. Remember that hackers like house thieves. You will walk on the path of least resistance. TheYour wireless signal is harder to crack, the less likely that you will be hacked. They will simply move to the next &quot;open&quot; network, or with poor encryption. Do yourself a favor, and always choose WPA &lt;b&gt;wireless security to&lt;/b&gt; WEP. &lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Like this post? Why not to &lt;a href=&quot;http://feedburner.google.com/fb/a/mailverify?uri=WiFi-Security&amp;amp;loc=en_US&quot; rel=&quot;nofollow&quot;&gt;Subscribe to WiFi Security news by Email for FREE&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://wi-fi-security.blogspot.com/feeds/6893127073239323846/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://wi-fi-security.blogspot.com/2010/01/wep-wireless-security-stinks-find-out.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/6893127073239323846'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3069634593329107485/posts/default/6893127073239323846'/><link rel='alternate' type='text/html' href='http://wi-fi-security.blogspot.com/2010/01/wep-wireless-security-stinks-find-out.html' title='WEP Wireless Security Stinks – Find Out Why'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>