<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7151523677680216710</id><updated>2024-09-09T22:19:03.326-04:00</updated><category term="análise de malware"/><category term="camada de aplicação"/><category term="camada de enlace"/><category term="camada de rede"/><category term="camada de transporte"/><category term="data mining"/><category term="forense computacional"/><category term="iniciação científica"/><category term="malware"/><category term="redes de computadores"/><category term="redes sem fio e redes móveis"/><category term="snort"/><title type='text'>Gestão da Tecnologia da Informação</title><subtitle type='html'>Conceitos, Técnicas, Ferramentas, Engenharia Reversa, Pen Test e Estudos de Casos, Redes de Computadores, Gestão de TI.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://masedos.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7151523677680216710/posts/default'/><link rel='alternate' type='text/html' href='http://masedos.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Fernandes Macedo</name><uri>http://www.blogger.com/profile/07843589062454400693</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>5</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7151523677680216710.post-107359468577267933</id><published>2019-11-13T18:02:00.001-04:00</published><updated>2019-11-13T18:05:40.913-04:00</updated><title type='text'>https://www.seedr.cc</title><content type='html'>I found a #cloud #torrent that&#39;s awesome ;) @seedrcoil it&#39;s FREE just give it a try! https://www.seedr.cc/&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;box-sizing: border-box; color: #507076; display: block; font-family: &amp;quot;open sans&amp;quot;; font-size: 32px; line-height: inherit;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; font-weight: 900;&quot;&gt;Seedr.cc&lt;/span&gt;&amp;nbsp;offers the following methods to get you free space.&lt;/span&gt;&lt;span style=&quot;background-color: #d9f8ff; color: #507076; font-family: &amp;quot;open sans&amp;quot;; font-size: 22px;&quot;&gt;To get your free space , click one of the options below and you will be awarded for each&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #d9f8ff; color: #507076; font-family: &amp;quot;open sans&amp;quot;; font-size: 22px;&quot;&gt;(When you upgrade , all your free bonus space comes with you ! *)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: #d9f8ff; color: #507076; font-family: &amp;quot;open sans&amp;quot;; font-size: 22px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;h4 style=&quot;background-color: #f4f4f4; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;; font-size: 1.4375rem; font-weight: 400; line-height: 1.4; margin: 0.2rem 0px 0.5rem; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;
How do I do that ?&lt;/h4&gt;
&lt;span style=&quot;background-color: #d9f8ff; color: #507076; font-family: &amp;quot;open sans&amp;quot;; font-size: 22px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;background-color: #f4f4f4; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;; font-size: 16px; line-height: 1.6; list-style-position: outside; margin: 0px 0px 1.25rem 1.1rem; padding: 0px 15px 0px 0px;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; margin: 0px; padding: 0px;&quot;&gt;I get a special Link&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; margin: 0px; padding: 0px;&quot;&gt;Every time someone signs up from that link , both you and them get 500MB of space , for FREE&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; margin: 0px; padding: 0px;&quot;&gt;Limited to up to 4 friends&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; list-style-type: disc; margin: 0px; padding: 0px;&quot;&gt;Feel free to copy the link and share with anyone&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: Open Sans;&quot;&gt;https://www.seedr.cc/?r=1244842&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://masedos.blogspot.com/feeds/107359468577267933/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7151523677680216710/107359468577267933' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7151523677680216710/posts/default/107359468577267933'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7151523677680216710/posts/default/107359468577267933'/><link rel='alternate' type='text/html' href='http://masedos.blogspot.com/2019/11/httpswwwseedrcc.html' title='https://www.seedr.cc'/><author><name>Fernandes Macedo</name><uri>http://www.blogger.com/profile/07843589062454400693</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7151523677680216710.post-5085802088947974738</id><published>2016-05-28T07:20:00.000-04:00</published><updated>2016-05-28T07:20:20.918-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="camada de aplicação"/><category scheme="http://www.blogger.com/atom/ns#" term="camada de enlace"/><category scheme="http://www.blogger.com/atom/ns#" term="camada de rede"/><category scheme="http://www.blogger.com/atom/ns#" term="camada de transporte"/><category scheme="http://www.blogger.com/atom/ns#" term="redes de computadores"/><category scheme="http://www.blogger.com/atom/ns#" term="redes sem fio e redes móveis"/><title type='text'>Redes de Computadores e a Internet: Uma Abordagem Top-Down - 6ª ed.</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Conforme a leitura do livro, os slides serão traduzidos.&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;i&gt;Complementos: Slides do PowerPoint&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;Redes de Computadores e a Internet: Uma Abordagem Top-Down - 6ª ed.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;J. F. Kurose e K.W. Ross&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Uma observação sobre o uso dos slides em ppt. Nós estamos criando e disponibilizando estes slides gratuitamente a todos os (professores, alunos, leitores). Eles são no formato de PowerPoint para que você veja as animações; e poder adicionar, modificar e excluir slides e retirar conteúdo para atender as suas necessidades. Obviamente, ele representam muito trabalho da nossa parte. Em retorno sobre o uso, pedimos apenas o seguinte:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Se você usar estes slides (por exemplo, em uma sala de aula) que você menciona sua fonte (afinal de contas, nós gostaríamos que as pessoas usem nosso livro!)&lt;/li&gt;
&lt;li&gt;Se você postar qualquer slides em um site www, que você notar que eles são adaptados dos (ou talvez idênticos aos) nossos slides, e em atenção a direitos de autor desta material.&lt;/li&gt;
&lt;/ul&gt;
Você pode estar interessado em outros materiais complementares para o nosso livro: os &lt;a href=&quot;http://www-net.cs.umass.edu/wireshark-labs/&quot;&gt;Wireshark Labs&lt;/a&gt;, &lt;a href=&quot;http://gaia.cs.umass.edu/kurose_ross/interactive/&quot;&gt;exercícios interativos fim-de-capítulo&lt;/a&gt;, e &lt;a href=&quot;http://gaia.cs.umass.edu/kurose/ebook/text/toc.htm&quot;&gt;verão online interativa, versão experimental ebook do Capítulo 1&lt;/a&gt;. Obrigado e divirta-se! JFK / KWR.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Slides em PowerPoint, por capítulo:&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;https://drive.google.com/open?id=0B7B0GAiEamAKZXlPOUdUX3JxU3c&quot;&gt;Capítulo 1: Redes de computadores e a internet&lt;/a&gt;, v6.1 &amp;nbsp;- &lt;b&gt;Traduzindo&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://drive.google.com/open?id=0B7B0GAiEamAKdW80VE05TDlEYk0&quot;&gt;Capítulo 2: Camada de aplicação&lt;/a&gt;, v6.3 - &lt;b&gt;Inglês&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://drive.google.com/open?id=0B7B0GAiEamAKcFlUVXNHUjNFSDg&quot;&gt;Capítulo 3: Camada de transporte&lt;/a&gt;, v6.01&amp;nbsp;-&amp;nbsp;&lt;b&gt;Inglês&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://drive.google.com/open?id=0B7B0GAiEamAKSXFWRzlURUhtakU&quot;&gt;Capítulo 4: A camada de rede&lt;/a&gt;, v6.11&amp;nbsp;-&amp;nbsp;&lt;b&gt;Inglês&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://drive.google.com/open?id=0B7B0GAiEamAKUkxFeVRxeGFSd2s&quot;&gt;Capítulo 5: A camada de enlace&lt;/a&gt;, v6.01&amp;nbsp;-&amp;nbsp;&lt;b&gt;Inglês&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://drive.google.com/open?id=0B7B0GAiEamAKS1RxVHJZVDZZYlE&quot;&gt;Capítulo 6: Redes sem fio e redes móveis&lt;/a&gt;, v6.0&amp;nbsp;-&amp;nbsp;&lt;b&gt;Inglês&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://drive.google.com/open?id=0B7B0GAiEamAKOGs5YkRscDVQSmc&quot;&gt;Capítulo 7: Redes multimídia&lt;/a&gt;, v6.0 -&amp;nbsp;&lt;b&gt;Inglês&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://drive.google.com/open?id=0B7B0GAiEamAKcmRuVzdyZGU3MHM&quot;&gt;Capítulo 8: Segurança em redes de computadores&lt;/a&gt;, v6.0 -&amp;nbsp;&lt;b&gt;Inglês&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://drive.google.com/open?id=0B7B0GAiEamAKcVlRSElZWVFqalE&quot;&gt;Capítulo 9: &amp;nbsp;Gerenciamento de redes&lt;/a&gt;, v6.0 -&amp;nbsp;&lt;b&gt;Inglês&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Estes PowerPoint são copyright 1996-2014 J. F. Kurose, K. W. Ross&lt;br /&gt;
Todos os direitos reservados. Última atualização: 14 de novembro de 2014&lt;br /&gt;
Comentários bem-vindo: &lt;i&gt;Kurose em cs.umass.edu&lt;/i&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://masedos.blogspot.com/feeds/5085802088947974738/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7151523677680216710/5085802088947974738' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7151523677680216710/posts/default/5085802088947974738'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7151523677680216710/posts/default/5085802088947974738'/><link rel='alternate' type='text/html' href='http://masedos.blogspot.com/2016/05/redes-de-computadores-e-internet-uma.html' title='Redes de Computadores e a Internet: Uma Abordagem Top-Down - 6ª ed.'/><author><name>Fernandes Macedo</name><uri>http://www.blogger.com/profile/07843589062454400693</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7151523677680216710.post-252099317917465440</id><published>2016-03-10T18:26:00.000-04:00</published><updated>2016-03-10T18:26:03.731-04:00</updated><title type='text'>Análise de big data aplicado a segurança da informação</title><content type='html'>&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1302&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 990.3px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 276.45px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
Fernandes Macedo Ribeiro – masedos@gmail.com&lt;/div&gt;
&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1304&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 970.65px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 278.25px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
MBA Governança nas Tecnologias da Informação&lt;/div&gt;
&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1306&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 951.15px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 330.9px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
Instituto de Pós-Graduação - IPOG&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1308&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 931.8px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 334.95px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
Goiânia, GO, 29 de agosto de 2014&lt;/div&gt;
&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1302&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 990.3px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 276.45px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
Fernandes Macedo Ribeiro – masedos@gmail.com&lt;/div&gt;
&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1304&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 970.65px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 278.25px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
MBA Governança nas Tecnologias da Informação&lt;/div&gt;
&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1306&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 951.15px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 330.9px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
Instituto de Pós-Graduação - IPOG&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;&lt;/span&gt;Resumo&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1308&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 931.8px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 334.95px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
Goiânia, GO, 29 de agosto de 2014&lt;/div&gt;
&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1302&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 990.3px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 276.45px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
Fernandes Macedo Ribeiro – masedos@gmail.com&lt;/div&gt;
&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1304&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 970.65px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 278.25px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
MBA Governança nas Tecnologias da Informação&lt;/div&gt;
&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1306&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 951.15px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 330.9px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
Instituto de Pós-Graduação - IPOG&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;ember-view dh-page-text&quot; id=&quot;ember1308&quot; style=&quot;-webkit-user-select: auto; background-color: white; bottom: 931.8px; box-sizing: border-box; color: transparent; cursor: text; font-family: g_d0_f3; font-size: 17px; left: 334.95px; line-height: 1; padding: 0px; position: absolute; unicode-bidi: bidi-override;&quot;&gt;
Goiânia, GO, 29 de agosto de 2014&lt;b style=&quot;background-color: transparent;&quot;&gt;Resumo&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Este artigo trata da aplicação das melhores práticas na análise de big data para a segurança da informação no ambiente empresarial. A hipótese tem como ideia gerenciar e analisar uma larga escala de dados crescente e complexa para tomar decisões oportunas para a gestão de negócios. O objetivo é apresentar a importância da análise de big data no ambiente de tecnologia nas empresas, que pode incluir uma variedade de dados como logs de sistemas, tráfego de rede, pacotes de dados, fluxo de dados, comportamento do usuário, entre outras ações geradas diariamente que oferece um novo conjunto de desafios e obstáculos, que faz da segurança e governança da informação um verdadeiro desafio. O método é identificar através da análise de dados, informações pertinente que tenha como objetivo mitigar riscos e responder a incidente em tempo real de forma inteligente em seus ambientes computacionais. Os resultados indicam que ao analisar estes dados às empresas obtém-se um significante retorno sobre os incidentes em seus ativos de rede. A conclusão foi que a análise de big data na área de segurança da informação é imprescindível para as empresas se tornarem um diferencial no mercado de negócios.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Palavras-chave&lt;/b&gt;: &lt;i&gt;Big data. Segurança da informação. Detecção de incidente. Níveis estratégico. Data warehouse&lt;/i&gt;.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;https://drive.google.com/open?id=0B7B0GAiEamAKQzhfSm43MmxIZlk&quot;&gt;Download do artigo&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://masedos.blogspot.com/feeds/252099317917465440/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7151523677680216710/252099317917465440' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7151523677680216710/posts/default/252099317917465440'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7151523677680216710/posts/default/252099317917465440'/><link rel='alternate' type='text/html' href='http://masedos.blogspot.com/2016/03/analise-de-big-data-aplicado-seguranca.html' title='Análise de big data aplicado a segurança da informação'/><author><name>Fernandes Macedo</name><uri>http://www.blogger.com/profile/07843589062454400693</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7151523677680216710.post-3905776811354397679</id><published>2012-07-10T09:41:00.000-04:00</published><updated>2012-07-10T09:42:33.046-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="análise de malware"/><category scheme="http://www.blogger.com/atom/ns#" term="forense computacional"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><title type='text'>Análise de Malware em Forense Computacional</title><content type='html'>&lt;br /&gt;
&lt;div style=&quot;font: 12.0px Times; margin: 0.0px 0.0px 0.0px 0.0px;&quot;&gt;
&lt;b&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;font: normal normal normal 14px/normal Times; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;
&lt;b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;ANÁLISE DE MALWARE EM FORENSE COMPUTACIONAL&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;font: 14.0px Times; margin: 0.0px 0.0px 0.0px 0.0px;&quot;&gt;
&lt;b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;font: normal normal normal 12px/normal Times; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;RESUMO&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;font: 12.0px Times; margin: 0.0px 0.0px 0.0px 0.0px;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;font: normal normal normal 12px/normal Times; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;A computação forense busca apresentar a verdade através de técnicas e metodologias aplicadas por um investigador forense nos processos de aquisição, identificação, preservação, filtragem e apresentação de dados e evidências que possam servir de prova em juízo. Com o advento da disseminação dos sistemas computacionais em todas as áreas de atividade humana, a computação forense garante que fatos danosos, criminais ou não, perpetrados com a utilização da informática, possam ser esclarecidos quanto à materialidade e autoria. Como forma de disseminar as invasões e ocorrências indevidas que podem ser utilizados &lt;i&gt;softwares &lt;/i&gt;maliciosos, e para que a forense computacional possa resolver as questões apresentadas, necessita-se dissecar este &lt;i&gt;malware &lt;/i&gt;com o intuito de encontrar informações relevantes para a conclusão de um relatório pericial. O objetivo deste trabalho é analisar como os &lt;i&gt;softwares &lt;/i&gt;maliciosos atuam no contexto da forense computacional, como podem ser detectados através de análises estáticas e dinâmicas e quais são as dificuldades encontradas. Foi possível observar a existência de um grande número de ferramentas disponíveis, exigindo do investigador um método de trabalho sistemático para realizar a bom termo o seu trabalho.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font: normal normal normal 12px/normal Times; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font: normal normal normal 12px/normal Times; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font: normal normal normal 12px/normal Times; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Palavra-chave: &lt;/b&gt;computação forense, &lt;i&gt;malware&lt;/i&gt;, engenharia reversa.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font: normal normal normal 12px/normal Times; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font: normal normal normal 12px/normal Times; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: justify;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font: normal normal normal 12px/normal Times; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: justify;&quot;&gt;
&lt;a href=&quot;https://docs.google.com/open?id=0B7B0GAiEamAKRFgzRXg2RTNRdUU&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://masedos.blogspot.com/feeds/3905776811354397679/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7151523677680216710/3905776811354397679' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7151523677680216710/posts/default/3905776811354397679'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7151523677680216710/posts/default/3905776811354397679'/><link rel='alternate' type='text/html' href='http://masedos.blogspot.com/2012/07/analise-de-malware-em-forense.html' title='Análise de Malware em Forense Computacional'/><author><name>Fernandes Macedo</name><uri>http://www.blogger.com/profile/07843589062454400693</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7151523677680216710.post-8567879611318856465</id><published>2011-02-16T17:36:00.000-03:00</published><updated>2011-02-16T16:31:43.779-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="data mining"/><category scheme="http://www.blogger.com/atom/ns#" term="iniciação científica"/><category scheme="http://www.blogger.com/atom/ns#" term="snort"/><title type='text'>Análise de Integração de Ferramentas de Segurança</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot;   style=&quot;  color: rgb(85, 85, 85); line-height: 17px; font-family:Verdana, &#39;BitStream vera Sans&#39;, Helvetica, sans-serif;font-size:12px;&quot;&gt;&lt;h4 style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-weight: bold; letter-spacing: -0.05em; font-family: Arial; font-size: 16px; color: rgb(0, 136, 0); text-align: center; &quot;&gt;PLANO DE PESQUISA DO ALUNO&lt;/h4&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;1.  TÍTULO: Análise de Integração de Ferramentas de Segurança&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;1.1. &lt;/strong&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Introdução&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: justify; &quot;&gt;Muitas vulnerabilidades de segurança da &lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Internet&lt;/em&gt; são inerentes ao projeto original. Como necessitamos de segurança nessas redes, usamos uns dos mecanismos mais comuns de segurança adotado na &lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Internet&lt;/em&gt; que é o &lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Firewall&lt;/em&gt;. Contudo quando se trata de um &lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Firewall &lt;/em&gt;não é somente instalar um firewall no sistema. A melhor forma de prevenir e proteger uma rede de ser atingida é restringir a entrada não autorizada e criarmos políticas de segurança, nos dias atuais este é o grande diferencial. Uma maneira de descrevermos a melhor utilização do &lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Firewall&lt;/em&gt; é melhorarmos diariamente suas responsabilidade e gerenciar suas permissões ou negação de tráfego de pacotes na rede. Podendo criar projeto sobre a integração de um &lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;firewall&lt;/em&gt; (filtros colocados estrategicamente na entrada de uma rede), com um IDS (Sistema de Detecção de Intrusão), permitindo ter um melhor conhecimento em tempo real das ameaças; devido ao grande números de informações que chega a um determinado &lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;host&lt;/em&gt;, até mesmo dificultando a análise de seus &lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;logs,&lt;/em&gt; usaremos ferramentas como o BASE (&lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Basic Analysis and Security Engine&lt;/em&gt;), para podermos ter um melhor conhecimento dos tipos de ataques sofridos e implementar regras contra futuras tentativas de ataques. Os IDS são softwares utilizados para uma melhor monitoração da rede a procura de sinais padrões de comportamento considerados maliciosos. Existem muitas categorias de IDS, como&lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Snort, Psad, Snort_inlnine. &lt;/em&gt;Estas ferramentas podem ser integradas com &lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Firewall&lt;/em&gt; para se ter uma melhor segurança de uma rede de computadores, e dependendo do tipo e da localização dos seus sensores, e de sua metodologia de uso com os geradores de alertas, podemos ter uma ampla rede mais segura.&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: justify; &quot;&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: justify; &quot;&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: left; &quot;&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: left; &quot;&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: left; &quot;&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: left; &quot;&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: left; &quot;&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: center; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Relatório Final da Iniciação Científica&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: center; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: center; &quot;&gt;&lt;strong style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;RESUMO&lt;/strong&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: justify; &quot;&gt;&lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;A invasão de redes e sistemas ligados a Internet é uma realidade. Para dissuadir os atacantes e invasores de rede, é utilizado o honeypot, que retira a atenção dos sistemas reais em uma rede de computadores. Com a quantidade de alertas gerados pelo Snort, pode-se utilizar a técnica de data mining para analisar os resultados, e através dos mesmos poder criar regras relevantes de segurança.&lt;/em&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: justify; &quot;&gt;&lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;em style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;a href=&quot;https://docs.google.com/viewer?a=v&amp;amp;pid=explorer&amp;amp;chrome=true&amp;amp;srcid=0B7B0GAiEamAKZTU4NmJmNWMtM2RiZi00MDE1LWI4Y2YtY2Y5ZGY1Y2U4M2Ix&amp;amp;hl=pt_BR&quot;&gt;Download do Relatório Final&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&lt;p style=&quot;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: center;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; &quot;&gt;Vigência 2009-2010&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://masedos.blogspot.com/feeds/8567879611318856465/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7151523677680216710/8567879611318856465' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7151523677680216710/posts/default/8567879611318856465'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7151523677680216710/posts/default/8567879611318856465'/><link rel='alternate' type='text/html' href='http://masedos.blogspot.com/2011/02/analise-de-integracao-de-ferramentas-de.html' title='Análise de Integração de Ferramentas de Segurança'/><author><name>Fernandes Macedo</name><uri>http://www.blogger.com/profile/07843589062454400693</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>