SlideShare a Scribd company logo
1 of 4
Download to read offline
Breaking News Entertainment Gadgets Sports PR News WordPress Freebies Shopping Mall
« Deal of the Day: Get a Pen, Stylus, Laser Pointer, LED Flashlight and UV
Light within $10!!!
Apple Releases iPhone 2.2 Software Update - Happy Holidays! »
Voted
11
Angsuman Chakraborty November 22nd, 2008
Topics (map)
» News (1973)
» Web (1916)
» Technology
(1252)
» How To (910)
» Web Services
(840)
» India (689)
» Information
Technology (663)
» Microsoft (627)
» Google (609)
» Pro Blogging
(470)
Taragana
Network
Enterprise Blog
Free Book on Eye
Care by Natural
Therapy
Gadgetophilia -
Gadget guide for
gadget addicts
Hot Computer Jobs
Blog
Startup Database
Taragana - Software
Outsourcing
Blog Stats
There are currently
5,842 posts and 15,385
comments in this
weblog. Enjoy!
Translate
Subscribe by Email...
9748644 translated pages
served by Angsuman's
Translator Plugin Gold
since May 2007.
Cache hit : 96.65%
Cache miss : 3.35%
Simple solutions for complex problems.
How to Prevent CyberTerrorism and Software Piracy
Through Validy SoftNaos - A Technical Perspective
Cyber terrorism, data theft
and piracy are three of the
most concerning factors for
any software developer or a
learned internet user. We
have always looked forward
to numerous softwares as
they claim to prevent any
trespasser but in vain. None
of them have been efficient
enough and that is the
reason why we are here to
tell you about a new and
unknown technology, Validy
Softnaos (which was given to us to for reviewing purpose and have a
technological insight) It uses a hardware-software bridge that works efficiently
to prevent any unauthorized activity.
What is Validy Technology
Validy Technology (VT) is a system which protects software against piracy and
ensures software integrity. It uses a combination of software compilation
techniques and of a small secure hardware device called a token. If you look
at this following pic, you will understand the technology behind Validy's.
You can see that there is a co-processor that works under a Secure Token (an
USB dongle) and executes the program there itself
Validy Softnaos
Validy SoftNaos for Java is a software protection product targeted at
software publishers who develop Java applications. It prevents software
piracy and ensures software integrity by combining software transformation
with a piece of secure hardware (a secure token of USB dongle).
How Does it Work
To perform the protection by Validy SoftNaos for Java, a post-compiler
transforms the Java bytecode of the application. Unless a Validy SoftNaos
USB token is attached to the PC, the protected application can not run
anymore.
At runtime, the token becomes an extension of the main processor. It
contains a subset of the application's state and executes the parts of the
application that use or modify this state.
The token is a slave co-processor, receiving a flow of encrypted instructions
and exchanging data with the main processor through the USB interface.
The whole concept of Validy Softnaos protection works on enciphering and
deciphering of encryption. Because the only link between a protected
application and the token is a cryptographic key. The post-compiler
enciphers instructions using a secret key at protection time and the token
deciphers them at runtime using the same key.
Protection over Data in Co Processor (Technical Aspect)
How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror...
1 sur 4 05/09/2010 10:42
Poll
What is your favorite Open Source
Database
MySQL
PostgreSQL
Firebird
GNU SQL Server
SAP MaxDB
ScimoreDB
DXstore database system
HSQLDB
CloudDB
Other (please specify in comments
below)
View Results
Comments
Show all Polls
Latest Tweets
How To
ronpruett If you need rtention in your group I know how to know how to
do it.
namurien Learn How To Live Off The Grid http://bit.ly/Q8vsX
thisuserexists Just updated my blog @ articles24.com :-) How To Make
Money As A Kid Online? http://tinyurl.com/yjm2gzq
gottchacheater How To Come Back Stronger Than Ever After Infidelity
http://bit.ly/17Cbq3
ReneMGuru Internet Marketing 101: How to increase cause email efforts:
Several email marketing businesses can help market.. http://bit.ly/vuPCp
Berthavsksy How to you make a dish washer into a snow blower? Give the
bitch a shovel
_beccaboo_ Man I wish my chemistry teacher knew how to write proper
instructions. Confused. I'll figure it out eventually though.
JimmyJames70 For some reason I'm getting flashbacks of Jeremy Giambi
forgetting how to slide in an A's playoff game from many years ago
paulosuzart how to pass an http session to #lift session? i will try to mock
it. :)
Claim
Blogussion Claim Your Facebook Fan Page Username http://bit.ly/ljjHA
APCPro We'd like to give a mini gallery wrap to 5 APC tweeps that help
fight diabetes w/ @rhedpixel http://bit.ly/4iBNrs DM 2 claim.
imabima planning to go to the Claim Company at Northbrook Court for
lunch tomorrow. The whole world is telling me it's the greatest.
wiselark Waitangi 262 claim for cultural and intellectual property affects
Archives [along with @NLNZ and @TePapa] #lianza09
JamesPinnell Amazon claim "higher operating costs outside the US" for a
40% increase in costs for Aussie Kindle. Umm, what? http://is.gd/4eFPU
GameTheSystem Twitter Nope Were Not Doing Video Tweets: We
commented a few hours ago on a claim in the Telegraph newspaper th..
http://bit.ly/NxuYO
elpie Sorting out insurance claim for the storm damage. Shame we can't
claim for trees and destroyed plants.
KingMikeMac I commented on a YouTube video -- laci, what is this I hear
about you filing a false DMCA claim because... http://bit.ly/3aCvZz
Latest Friend Feeds
Technology
petrbuben Training to Climb an Everest of Digital Data
petrbuben Link by Link: Is It a Day to Be Happy Check the Index
petrbuben Closing the Deal at the Virtual Checkout Counter
tombiro Powermat Cuts the Cord
seyedkamal 2006 � �!! // http://www.guardian.co.uk/technology
/2006/oct/11/news.iran // // ...
livechina China Techfaith Wireless Communication Technology Up 113.4%
Since smartrend's ... - FOXBusiness
erikmitk [Geeks Are Sexy] Technology News - We make technology sexy
randomnescence 13th Rajiv Gandhi Science and Technology lecture
organised - Times of India
ludtke Twitter to introduce live video-tweeting
mattis RT @yorkshireforum #classified ads, #discussions, #technology
help, #video forums,#joke forum,
#leeds,#sheffield,#doncaster,#york,#bradford
deeped 50 things that are being killed by the internet - Telegraph
pacepe How Google Wave could transform journalism | Technology | Los
Angeles Times
hanifisko i am tired using technology
ksna - POS ...
cashflowco Who might see the value of receiving mental health services via
"live" web casted therapy sessions.
cantorjf Tiny 'nuclear batteries' unveiled - BBC NEWS
petrbuben Tough choices for feds giving out broadband money
ruv TwittMaster.Com � Technology as of October 11, 2009
jamesketchell NewScientist #Innovation: The #psychology of #Google
Wave (http://bit.ly/3629QM) #GoogleWave #human #brain #mind
#technology
wonojo @adrt80 for what i've paid on the n96 i was really hoping the
technology wouldn't be obsolete in less than a year. nokia makes me sad.
Java Software
The protection of an application with Validy Technology begins with the
relocation of some of the instance and static fields of some of its classes
inside the memory of the secure coprocessor. When such a transformed class
is loaded or such a transformed object is created, a chunk of memory is
allocated in the heap of the coprocessor to hold the values of the relocated
fields. In the transformed classes, the relocated instance and static fields are
replaced by the address of these chunks of memory. These addresses are
stored in two fields named k$this and k$class for instance and static fields
respectively. Figure 3.1 shows an object of class A and its fields before and
after the relocation of two fields to the coprocessor.
What's More?
What I liked the most about this product was its use of tags. The tags
mechanism is easy to implement and runs fast because it involves only simple
operations. It is however extremely powerful because additional instructions
can be tied to the original ones using tags.
This makes it simple, fast and yet secure.
Validy USB Token
The Validy USB token is built around a secure micro-controller running the
firmware for one or more of the following Validy applications: Validy
Softnaos, Validy WebBusiness, Validy FileCrypt, or Validy SmartLicense.
The main characteristics of the micro-controller are:
32 bit architecture
256 Kbytes of ROM (for the code)
32 Kbytes of EPROM (for permanent data)
8 Kbytes of RAM (for the working set of applications)
256 Kbytes of external ciphered RAM (used as a paging area by Validy
SoftNaos)
USB full speed interface (12 Mbit/s) Cryptographic accelerator for DES
and Triple DES
Cryptographic accelerator for RSA up to 1024 bit keys (or 2048 bits
using the Chinese Remainder Theorem)
Countermeasures to protect against physical attacks.
Advantages
* strong protection against software piracy without undue control of the
user's machine or breach of privacy
* low impact on the development and distribution of the software: protection
is mostly automated, application updates can be produced after the tokens
are in the field
* integrity checks or accesses to token cryptographic resources (for
authentication or signature) can be added and securely tied to other token
instructions
How to Install
Simply run the vldy-softnaos-eval-1.0.x.y.jar installer. After execution,
you will find the following directories under the install root location you have
chosen:
lib: The jar files for the translator, annotations, Ant task, virtual
coprocessor, and interface with the secure coprocessor.
liblibs: The third party libraries used by the translator.
doc: This evaluation guide in PDF and HTML formats.
examples: Sample applications.
To use the actual secure coprocessor, the runtime that communicates with a
hardware token instead of simulating it must be used. The jar file vldy-tech-
vruntime.jar must be replaced by vldy-tech-runtime.jar on the class
How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror...
2 sur 4 05/09/2010 10:42
scorpfromhell Larry Ellison - Oracle is committed to Sun - hardware,
software, Java, MySql, more R&D $$$ #oow09
intellibitz RT @Mrgareth Father of Java James Gosling says he is
"absolutely" excited about working for the #1 business software co
http://ff.im/9DHFh
intellibitz #java #job - FAT32 Software developer Software engineer
($16/hr) - http://donanza.com/t/990718 #jobs
brhubart Bob #oow09 - Gosling on Java at Oracle: "I've never worked for a
software company."
mrgareth1 Father of Java - James Gosling - says he is "absolutely" excited
about working for the number one business software company #OOW09
brhubart #oow09 - Gosling on Java at Oracle: "I've never worked for a
software company."
edans An Oyster Card has more computing power than the first computer
I wrote software for, and it runs on Java...
tonybaer For #Java best news is Java now managed by SOFTWARE
company #oow09
gotti Object-Oriented Software Engineering: Practical Software
Development using UML and Java by Robert Laganiere
intellibitz Graduate Java Developer J2EE JEE Travel Industry job in
Hertfordshire at Oho Group http://bit.ly/Dpr23 #it #software #dev
itjobstweet Graduate Java Developer J2EE JEE Travel Industry job in
Hertfordshire at Oho Group http://bit.ly/Dpr23 #it #software #dev
rezvaneh -
eddieawad Enterprise Software Development with Java: Oracle OpenWorld
Live
jamessmith24 #Java Java Swing Developer - Algorithmic Trading -
Software: My client are a technology driven software ho.. http://bit.ly
/KSP4x
tysonlundbech GetJar: Free Java, Symbian, Windows Mobile, BlackBerry,
Palm and Flash Lite mobile games and applications
projectjobs Senior Java Engineer - (Marin county/San Francisco) <
projectjobs Java J2EE Guru for Start-of-the Art NTS Software Application:
MA-Boston, Location Boston, MA; Cambridge, MA Sal.. http://bit.ly/J5PGY
ronhagenhoff Java Platform
intellibitz Exploring the world of Android :: Part 3 � JTeam Blog / JTeam:
Enterprise Java, Open Source, software solutions, Amsterdam
projectjobs Senior Software Engineer - Java - MVC - Spring - Hibernate:
CA-San Francisco, Location San Francisco, CA; South.. http://bit.ly
/1mKEDn
avec Google Friend Connect
Membres (4449) Plus »
Vous êtes déjà membre ? Connexion
path.
You can find more about running the tools here
Conclusion
Validy Technology is very competent to fight against such bigger threats but
there are some points they should consider on.
1. The documentation is too technical (though I know its for software
developers). But even a software developer can feel lost under all these
technicalities. So improvement upon documentation is a must.
2. It is too much java dependent and I will surely want it to grow over it and
be as diverse as possible.
Predictions tell us that we will have 12 million dongles attached to computers
by 2012. So you can understand that what a magnanimous influence will it
be if it becomes a success. Having said all that, Validy Softnaos is worth a try.
If you are concerned over piracy and sabotages, then you may use it and tell
us your experience too.
Filed under How To, Java Software, Programming, Software Review, Technology, Windows Software
Review | Tags: 2012, Claim, Cyber terrorism, Lost, Piracy, Validy Softnaos, Validy technology |
Comment Below | Email this Article
Windows Software Review
News
How to check what has been changed
in your Windows Registry
Firefox 3.5 Review
To-Do list ToBeeDo Review
Top 5 Free Antivirus Software
Easeus Data Recovery Wizard
Professional: Comprehensive Review
Xobni- Free Plugin Manager for
Microsoft Outlook: Review
Radmin Remote Control Software -
Overview
Top 10 Hard Drive Cloning &amp;
Backup Software
2012 News
Outsourcing signals boom in India's publishing
industry
AP aiming for more lucrative deals with major
Web sites as offline media slump worsens
The Complete story of Who benefited and who
lost in this recession
NEC to withdraw from Japan supercomputer
project due to slump
e-Commerce Marketing is gaining momentum
due to recession
Infosys to pick up most of IBM's support
contract with Australia's Telstra
CDM Authority Goes Hitech
Intel Warns AMD on Legal Terms about
GlobalFoundries $4.2 Billion Project
Related Articles
Judge rules against Real Networks, prohibits company from marketing DVD
copying software
August 12th, 2009 Judge bars sales of RealNetworks' DVD softwareSAN FRANCISCO — DVD
copying software sold by RealNetworks Inc. appears to be an illegal pirating tool, a federal
judge ruled Tuesday in a legal battle that's been closely watched in Hollywood and
elsewhere.
Microsoft Windows Genuine Advantage Check Cracked under 24 hours
July 28th, 2005 Microsoft's effort to refuse access to updated versions of Windows Operating
System has been foiled by hackers within 24 hours. Microsoft demanded that those who
wanted Windows updates, other than security updates, will have to download an Active X
program that sniffed their operating system to see if their OS copy had been pirated.
How to prevent robots (Google Bot, MSNBot, Yahoo Slurp! etc.) from
displaying cached pages of your site
April 12th, 2005 Site Owners often detest the fact that google caches an old copy of their site
and displays it on searches which brings up the site pages. A simple way to prevent robots
(including Google, Yahoo etc.) from caching your site contents is to include the following
within the head section of your web page.
How To Prevent Search Engines Like Google & MSN Search From Using ODP
Title & Description For Site
August 23rd, 2006 Search engines like Google often fetch your site description from ODP
(Open Directory Project) description instead of fetching it from the site content or
meta-tags. This may not always be desirable as it may not represent your site properly.
India Set to be Technical Backend for All New .org Web Sites
October 4th, 2005 India’s global image and reputation is rapidly growing. Top Internet
decision makers, PIR, have decided to make India a hub for the technical backend of all
new websites, a move that is expected to significantly reduce time to resolve websites.
Compuware sells application testing software line to Britain's Micro Focus for
$80M
May 6th, 2009 Compuware sells software line to British companyDETROIT — Business
software and services provider Compuware Corp. says it's selling an applications testing
software line to Britain's Micro Focus International PLC for $80 million.
A Plan for Stopping Online Music & Book Piracy
August 14th, 2007 Online piracy is assuming alarming proportions and will continue to do so
with the popularization of internet and better bandwidth availability to customers. Online
piracy affects every material that can be moved online - music, video, books and software.
How To Use .htaccess to Prevent Apache HTTPD Directory Listing
March 16th, 2008 Apache HTTPD servers are configured by default to display directory listing,
when index files like index.htm or index.html of index.php etc. are not present in the
directory.
How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror...
3 sur 4 05/09/2010 10:42
Corporate | Products | About Me | How to use this site | Submit News | Archives | Forum | Contact | Privacy Policy
Understanding the Role of Manuals in Software Development
June 8th, 2005 Understanding the Role of Manuals in Software development; Debunking the
XP Myth of Code is Documentation; Additional value of Good Documentation; Role of
Technical Writers in XP project; Summary
I Don't Want to Restart My PC after Every Automatic Windows Updates -
Solution
March 13th, 2009 Okay letting automatic updates wasn't enough. When they finish, you are
prompted to restart your computer.
How to Distribute Your Software Products Securely over the Internet? -
IntellProtector - A Comprehensive Review
October 16th, 2008 Software vendors like us always looks for ways to easily and cheaply
protect their software from getting stolen. Microsoft with billions of dollars of resources has
done it with Windows Genuine Advantage program.
How To Prevent Browser Caching of HTML Pages
November 4th, 2006 This is old news for most of us and yet when I wanted to quickly find it, it
took some searching. So here it is, in simple language, what you can do to prevent your
web pages from being cached by browsers.
Corporate Blogging: Meet Fortune 500 Blogger - Sun's CEO Jonathan
Schwartz
June 1st, 2006 Jonathan Schwartz is probably the highest profile individual to blog as CEO of
Sun Microsystems, a Fortune 500 company. But that is not what this article is about.
Answering Joel Spolsky's Questions On Enterprise Development
September 4th, 2006 Joel Spolsky was asked four important questions on enterprise
development. Joel didn't offer a clear answer on some of them.
Nginx: How To Redirect /index.php To / To Avoid Content Duplication
August 8th, 2008 Normally any website that responds to /index.php also responds to /. This
has the potential to duplicate content.
Discussion
Name (required)
Mail (will not be displayed; required)
Website (optional)
Notify me of followup comments via e-mail
"The whole of science is nothing more than a refinement of everyday thinking." - Albert Einstein
Copyright© 2003-2009 Angsuman Chakraborty
Protected by Comment Guard Pro
How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror...
4 sur 4 05/09/2010 10:42

More Related Content

Viewers also liked

Eads louis gallois - denis gardin - yann barbaux - louis granboulan - relan...
Eads   louis gallois - denis gardin - yann barbaux - louis granboulan - relan...Eads   louis gallois - denis gardin - yann barbaux - louis granboulan - relan...
Eads louis gallois - denis gardin - yann barbaux - louis granboulan - relan...Gilles Sgro
 
Patents portfolio 29 aout 2013
Patents portfolio   29 aout 2013Patents portfolio   29 aout 2013
Patents portfolio 29 aout 2013Gilles Sgro
 
Cork by Numbers
Cork by Numbers Cork by Numbers
Cork by Numbers Karen Healy
 
Hackademy magazine50
Hackademy magazine50Hackademy magazine50
Hackademy magazine50Gilles Sgro
 

Viewers also liked (7)

Eads louis gallois - denis gardin - yann barbaux - louis granboulan - relan...
Eads   louis gallois - denis gardin - yann barbaux - louis granboulan - relan...Eads   louis gallois - denis gardin - yann barbaux - louis granboulan - relan...
Eads louis gallois - denis gardin - yann barbaux - louis granboulan - relan...
 
Patents portfolio 29 aout 2013
Patents portfolio   29 aout 2013Patents portfolio   29 aout 2013
Patents portfolio 29 aout 2013
 
Evaluation 3
Evaluation 3Evaluation 3
Evaluation 3
 
Evaluation 2
Evaluation 2Evaluation 2
Evaluation 2
 
Cork by Numbers
Cork by Numbers Cork by Numbers
Cork by Numbers
 
3Aworld Official Presentation
3Aworld Official Presentation3Aworld Official Presentation
3Aworld Official Presentation
 
Hackademy magazine50
Hackademy magazine50Hackademy magazine50
Hackademy magazine50
 

Similar to How to prevent cyber terrorism taragana

Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...DevOps Indonesia
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKIRJET Journal
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great againEric Larcheveque
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdfdino715195
 
Hacking Web Aplications using Cookie Poisoning
Hacking Web Aplications using Cookie PoisoningHacking Web Aplications using Cookie Poisoning
Hacking Web Aplications using Cookie PoisoningSumutiu Marius
 
Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3Stefan Streichsbier
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)ITCamp
 
The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListSecurity Weekly
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2securityxploded
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
Securing a great DX - DevSecOps Days Singapore 2018
Securing a great DX - DevSecOps Days Singapore 2018Securing a great DX - DevSecOps Days Singapore 2018
Securing a great DX - DevSecOps Days Singapore 2018Stefan Streichsbier
 

Similar to How to prevent cyber terrorism taragana (20)

Itech 1005
Itech 1005Itech 1005
Itech 1005
 
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great again
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
2019-12-11-OWASP-IoT-Top-10---Introduction-and-Root-Causes.pdf
 
Hacking Web Aplications using Cookie Poisoning
Hacking Web Aplications using Cookie PoisoningHacking Web Aplications using Cookie Poisoning
Hacking Web Aplications using Cookie Poisoning
 
Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3Securing a great Developer Experience - v1.3
Securing a great Developer Experience - v1.3
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
 
SAP HANA Cloud Security
SAP HANA Cloud SecuritySAP HANA Cloud Security
SAP HANA Cloud Security
 
The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted List
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
 
Securing a great DX - DevSecOps Days Singapore 2018
Securing a great DX - DevSecOps Days Singapore 2018Securing a great DX - DevSecOps Days Singapore 2018
Securing a great DX - DevSecOps Days Singapore 2018
 

More from Gilles Sgro

Pierre moscovici 13 nov 2013
Pierre moscovici  13 nov 2013Pierre moscovici  13 nov 2013
Pierre moscovici 13 nov 2013Gilles Sgro
 
Fleur pellerin 13 nov 2013
Fleur pellerin  13 nov 2013Fleur pellerin  13 nov 2013
Fleur pellerin 13 nov 2013Gilles Sgro
 
Patrick pailloux anssi -3 nov 2013
Patrick pailloux   anssi -3 nov 2013Patrick pailloux   anssi -3 nov 2013
Patrick pailloux anssi -3 nov 2013Gilles Sgro
 
Courrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiCourrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiGilles Sgro
 
Réponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyRéponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyGilles Sgro
 
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Gilles Sgro
 
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Gilles Sgro
 
Reponse claude gueant à gilles sgro 9 fev 2012
Reponse claude gueant à gilles sgro   9 fev 2012Reponse claude gueant à gilles sgro   9 fev 2012
Reponse claude gueant à gilles sgro 9 fev 2012Gilles Sgro
 
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...Gilles Sgro
 
Courrier du chef de cabinet du président de la république du 8 aout 2012
Courrier du chef de cabinet du président de la république  du 8 aout 2012Courrier du chef de cabinet du président de la république  du 8 aout 2012
Courrier du chef de cabinet du président de la république du 8 aout 2012Gilles Sgro
 
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueLettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueGilles Sgro
 
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012Gilles Sgro
 
Secrétaire général elyséee macron - lettre - 4 octobre 2012
Secrétaire général elyséee   macron - lettre - 4 octobre 2012Secrétaire général elyséee   macron - lettre - 4 octobre 2012
Secrétaire général elyséee macron - lettre - 4 octobre 2012Gilles Sgro
 
Secrétaire général elyséee macron - note -4 octobre 2012
Secrétaire général elyséee  macron - note -4 octobre 2012Secrétaire général elyséee  macron - note -4 octobre 2012
Secrétaire général elyséee macron - note -4 octobre 2012Gilles Sgro
 
Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Gilles Sgro
 
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
Rapport senateur bockel surligné  cyber defense - 19 juillet 2012Rapport senateur bockel surligné  cyber defense - 19 juillet 2012
Rapport senateur bockel surligné cyber defense - 19 juillet 2012Gilles Sgro
 
Validy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandValidy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandGilles Sgro
 
Portefeuille de brevets 29 aout 2013
Portefeuille de brevets   29 aout 2013Portefeuille de brevets   29 aout 2013
Portefeuille de brevets 29 aout 2013Gilles Sgro
 
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...Gilles Sgro
 
Dir cab sébastien soriano - fleur pellerin -21 sept 2012
Dir cab   sébastien soriano - fleur pellerin -21 sept 2012Dir cab   sébastien soriano - fleur pellerin -21 sept 2012
Dir cab sébastien soriano - fleur pellerin -21 sept 2012Gilles Sgro
 

More from Gilles Sgro (20)

Pierre moscovici 13 nov 2013
Pierre moscovici  13 nov 2013Pierre moscovici  13 nov 2013
Pierre moscovici 13 nov 2013
 
Fleur pellerin 13 nov 2013
Fleur pellerin  13 nov 2013Fleur pellerin  13 nov 2013
Fleur pellerin 13 nov 2013
 
Patrick pailloux anssi -3 nov 2013
Patrick pailloux   anssi -3 nov 2013Patrick pailloux   anssi -3 nov 2013
Patrick pailloux anssi -3 nov 2013
 
Courrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiCourrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchi
 
Réponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyRéponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosy
 
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
 
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
 
Reponse claude gueant à gilles sgro 9 fev 2012
Reponse claude gueant à gilles sgro   9 fev 2012Reponse claude gueant à gilles sgro   9 fev 2012
Reponse claude gueant à gilles sgro 9 fev 2012
 
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
 
Courrier du chef de cabinet du président de la république du 8 aout 2012
Courrier du chef de cabinet du président de la république  du 8 aout 2012Courrier du chef de cabinet du président de la république  du 8 aout 2012
Courrier du chef de cabinet du président de la république du 8 aout 2012
 
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueLettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
 
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
 
Secrétaire général elyséee macron - lettre - 4 octobre 2012
Secrétaire général elyséee   macron - lettre - 4 octobre 2012Secrétaire général elyséee   macron - lettre - 4 octobre 2012
Secrétaire général elyséee macron - lettre - 4 octobre 2012
 
Secrétaire général elyséee macron - note -4 octobre 2012
Secrétaire général elyséee  macron - note -4 octobre 2012Secrétaire général elyséee  macron - note -4 octobre 2012
Secrétaire général elyséee macron - note -4 octobre 2012
 
Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006
 
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
Rapport senateur bockel surligné  cyber defense - 19 juillet 2012Rapport senateur bockel surligné  cyber defense - 19 juillet 2012
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
 
Validy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandValidy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marland
 
Portefeuille de brevets 29 aout 2013
Portefeuille de brevets   29 aout 2013Portefeuille de brevets   29 aout 2013
Portefeuille de brevets 29 aout 2013
 
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
 
Dir cab sébastien soriano - fleur pellerin -21 sept 2012
Dir cab   sébastien soriano - fleur pellerin -21 sept 2012Dir cab   sébastien soriano - fleur pellerin -21 sept 2012
Dir cab sébastien soriano - fleur pellerin -21 sept 2012
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

How to prevent cyber terrorism taragana

  • 1. Breaking News Entertainment Gadgets Sports PR News WordPress Freebies Shopping Mall « Deal of the Day: Get a Pen, Stylus, Laser Pointer, LED Flashlight and UV Light within $10!!! Apple Releases iPhone 2.2 Software Update - Happy Holidays! » Voted 11 Angsuman Chakraborty November 22nd, 2008 Topics (map) » News (1973) » Web (1916) » Technology (1252) » How To (910) » Web Services (840) » India (689) » Information Technology (663) » Microsoft (627) » Google (609) » Pro Blogging (470) Taragana Network Enterprise Blog Free Book on Eye Care by Natural Therapy Gadgetophilia - Gadget guide for gadget addicts Hot Computer Jobs Blog Startup Database Taragana - Software Outsourcing Blog Stats There are currently 5,842 posts and 15,385 comments in this weblog. Enjoy! Translate Subscribe by Email... 9748644 translated pages served by Angsuman's Translator Plugin Gold since May 2007. Cache hit : 96.65% Cache miss : 3.35% Simple solutions for complex problems. How to Prevent CyberTerrorism and Software Piracy Through Validy SoftNaos - A Technical Perspective Cyber terrorism, data theft and piracy are three of the most concerning factors for any software developer or a learned internet user. We have always looked forward to numerous softwares as they claim to prevent any trespasser but in vain. None of them have been efficient enough and that is the reason why we are here to tell you about a new and unknown technology, Validy Softnaos (which was given to us to for reviewing purpose and have a technological insight) It uses a hardware-software bridge that works efficiently to prevent any unauthorized activity. What is Validy Technology Validy Technology (VT) is a system which protects software against piracy and ensures software integrity. It uses a combination of software compilation techniques and of a small secure hardware device called a token. If you look at this following pic, you will understand the technology behind Validy's. You can see that there is a co-processor that works under a Secure Token (an USB dongle) and executes the program there itself Validy Softnaos Validy SoftNaos for Java is a software protection product targeted at software publishers who develop Java applications. It prevents software piracy and ensures software integrity by combining software transformation with a piece of secure hardware (a secure token of USB dongle). How Does it Work To perform the protection by Validy SoftNaos for Java, a post-compiler transforms the Java bytecode of the application. Unless a Validy SoftNaos USB token is attached to the PC, the protected application can not run anymore. At runtime, the token becomes an extension of the main processor. It contains a subset of the application's state and executes the parts of the application that use or modify this state. The token is a slave co-processor, receiving a flow of encrypted instructions and exchanging data with the main processor through the USB interface. The whole concept of Validy Softnaos protection works on enciphering and deciphering of encryption. Because the only link between a protected application and the token is a cryptographic key. The post-compiler enciphers instructions using a secret key at protection time and the token deciphers them at runtime using the same key. Protection over Data in Co Processor (Technical Aspect) How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror... 1 sur 4 05/09/2010 10:42
  • 2. Poll What is your favorite Open Source Database MySQL PostgreSQL Firebird GNU SQL Server SAP MaxDB ScimoreDB DXstore database system HSQLDB CloudDB Other (please specify in comments below) View Results Comments Show all Polls Latest Tweets How To ronpruett If you need rtention in your group I know how to know how to do it. namurien Learn How To Live Off The Grid http://bit.ly/Q8vsX thisuserexists Just updated my blog @ articles24.com :-) How To Make Money As A Kid Online? http://tinyurl.com/yjm2gzq gottchacheater How To Come Back Stronger Than Ever After Infidelity http://bit.ly/17Cbq3 ReneMGuru Internet Marketing 101: How to increase cause email efforts: Several email marketing businesses can help market.. http://bit.ly/vuPCp Berthavsksy How to you make a dish washer into a snow blower? Give the bitch a shovel _beccaboo_ Man I wish my chemistry teacher knew how to write proper instructions. Confused. I'll figure it out eventually though. JimmyJames70 For some reason I'm getting flashbacks of Jeremy Giambi forgetting how to slide in an A's playoff game from many years ago paulosuzart how to pass an http session to #lift session? i will try to mock it. :) Claim Blogussion Claim Your Facebook Fan Page Username http://bit.ly/ljjHA APCPro We'd like to give a mini gallery wrap to 5 APC tweeps that help fight diabetes w/ @rhedpixel http://bit.ly/4iBNrs DM 2 claim. imabima planning to go to the Claim Company at Northbrook Court for lunch tomorrow. The whole world is telling me it's the greatest. wiselark Waitangi 262 claim for cultural and intellectual property affects Archives [along with @NLNZ and @TePapa] #lianza09 JamesPinnell Amazon claim "higher operating costs outside the US" for a 40% increase in costs for Aussie Kindle. Umm, what? http://is.gd/4eFPU GameTheSystem Twitter Nope Were Not Doing Video Tweets: We commented a few hours ago on a claim in the Telegraph newspaper th.. http://bit.ly/NxuYO elpie Sorting out insurance claim for the storm damage. Shame we can't claim for trees and destroyed plants. KingMikeMac I commented on a YouTube video -- laci, what is this I hear about you filing a false DMCA claim because... http://bit.ly/3aCvZz Latest Friend Feeds Technology petrbuben Training to Climb an Everest of Digital Data petrbuben Link by Link: Is It a Day to Be Happy Check the Index petrbuben Closing the Deal at the Virtual Checkout Counter tombiro Powermat Cuts the Cord seyedkamal 2006 � �!! // http://www.guardian.co.uk/technology /2006/oct/11/news.iran // // ... livechina China Techfaith Wireless Communication Technology Up 113.4% Since smartrend's ... - FOXBusiness erikmitk [Geeks Are Sexy] Technology News - We make technology sexy randomnescence 13th Rajiv Gandhi Science and Technology lecture organised - Times of India ludtke Twitter to introduce live video-tweeting mattis RT @yorkshireforum #classified ads, #discussions, #technology help, #video forums,#joke forum, #leeds,#sheffield,#doncaster,#york,#bradford deeped 50 things that are being killed by the internet - Telegraph pacepe How Google Wave could transform journalism | Technology | Los Angeles Times hanifisko i am tired using technology ksna - POS ... cashflowco Who might see the value of receiving mental health services via "live" web casted therapy sessions. cantorjf Tiny 'nuclear batteries' unveiled - BBC NEWS petrbuben Tough choices for feds giving out broadband money ruv TwittMaster.Com � Technology as of October 11, 2009 jamesketchell NewScientist #Innovation: The #psychology of #Google Wave (http://bit.ly/3629QM) #GoogleWave #human #brain #mind #technology wonojo @adrt80 for what i've paid on the n96 i was really hoping the technology wouldn't be obsolete in less than a year. nokia makes me sad. Java Software The protection of an application with Validy Technology begins with the relocation of some of the instance and static fields of some of its classes inside the memory of the secure coprocessor. When such a transformed class is loaded or such a transformed object is created, a chunk of memory is allocated in the heap of the coprocessor to hold the values of the relocated fields. In the transformed classes, the relocated instance and static fields are replaced by the address of these chunks of memory. These addresses are stored in two fields named k$this and k$class for instance and static fields respectively. Figure 3.1 shows an object of class A and its fields before and after the relocation of two fields to the coprocessor. What's More? What I liked the most about this product was its use of tags. The tags mechanism is easy to implement and runs fast because it involves only simple operations. It is however extremely powerful because additional instructions can be tied to the original ones using tags. This makes it simple, fast and yet secure. Validy USB Token The Validy USB token is built around a secure micro-controller running the firmware for one or more of the following Validy applications: Validy Softnaos, Validy WebBusiness, Validy FileCrypt, or Validy SmartLicense. The main characteristics of the micro-controller are: 32 bit architecture 256 Kbytes of ROM (for the code) 32 Kbytes of EPROM (for permanent data) 8 Kbytes of RAM (for the working set of applications) 256 Kbytes of external ciphered RAM (used as a paging area by Validy SoftNaos) USB full speed interface (12 Mbit/s) Cryptographic accelerator for DES and Triple DES Cryptographic accelerator for RSA up to 1024 bit keys (or 2048 bits using the Chinese Remainder Theorem) Countermeasures to protect against physical attacks. Advantages * strong protection against software piracy without undue control of the user's machine or breach of privacy * low impact on the development and distribution of the software: protection is mostly automated, application updates can be produced after the tokens are in the field * integrity checks or accesses to token cryptographic resources (for authentication or signature) can be added and securely tied to other token instructions How to Install Simply run the vldy-softnaos-eval-1.0.x.y.jar installer. After execution, you will find the following directories under the install root location you have chosen: lib: The jar files for the translator, annotations, Ant task, virtual coprocessor, and interface with the secure coprocessor. liblibs: The third party libraries used by the translator. doc: This evaluation guide in PDF and HTML formats. examples: Sample applications. To use the actual secure coprocessor, the runtime that communicates with a hardware token instead of simulating it must be used. The jar file vldy-tech- vruntime.jar must be replaced by vldy-tech-runtime.jar on the class How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror... 2 sur 4 05/09/2010 10:42
  • 3. scorpfromhell Larry Ellison - Oracle is committed to Sun - hardware, software, Java, MySql, more R&D $$$ #oow09 intellibitz RT @Mrgareth Father of Java James Gosling says he is "absolutely" excited about working for the #1 business software co http://ff.im/9DHFh intellibitz #java #job - FAT32 Software developer Software engineer ($16/hr) - http://donanza.com/t/990718 #jobs brhubart Bob #oow09 - Gosling on Java at Oracle: "I've never worked for a software company." mrgareth1 Father of Java - James Gosling - says he is "absolutely" excited about working for the number one business software company #OOW09 brhubart #oow09 - Gosling on Java at Oracle: "I've never worked for a software company." edans An Oyster Card has more computing power than the first computer I wrote software for, and it runs on Java... tonybaer For #Java best news is Java now managed by SOFTWARE company #oow09 gotti Object-Oriented Software Engineering: Practical Software Development using UML and Java by Robert Laganiere intellibitz Graduate Java Developer J2EE JEE Travel Industry job in Hertfordshire at Oho Group http://bit.ly/Dpr23 #it #software #dev itjobstweet Graduate Java Developer J2EE JEE Travel Industry job in Hertfordshire at Oho Group http://bit.ly/Dpr23 #it #software #dev rezvaneh - eddieawad Enterprise Software Development with Java: Oracle OpenWorld Live jamessmith24 #Java Java Swing Developer - Algorithmic Trading - Software: My client are a technology driven software ho.. http://bit.ly /KSP4x tysonlundbech GetJar: Free Java, Symbian, Windows Mobile, BlackBerry, Palm and Flash Lite mobile games and applications projectjobs Senior Java Engineer - (Marin county/San Francisco) < projectjobs Java J2EE Guru for Start-of-the Art NTS Software Application: MA-Boston, Location Boston, MA; Cambridge, MA Sal.. http://bit.ly/J5PGY ronhagenhoff Java Platform intellibitz Exploring the world of Android :: Part 3 � JTeam Blog / JTeam: Enterprise Java, Open Source, software solutions, Amsterdam projectjobs Senior Software Engineer - Java - MVC - Spring - Hibernate: CA-San Francisco, Location San Francisco, CA; South.. http://bit.ly /1mKEDn avec Google Friend Connect Membres (4449) Plus » Vous êtes déjà membre ? Connexion path. You can find more about running the tools here Conclusion Validy Technology is very competent to fight against such bigger threats but there are some points they should consider on. 1. The documentation is too technical (though I know its for software developers). But even a software developer can feel lost under all these technicalities. So improvement upon documentation is a must. 2. It is too much java dependent and I will surely want it to grow over it and be as diverse as possible. Predictions tell us that we will have 12 million dongles attached to computers by 2012. So you can understand that what a magnanimous influence will it be if it becomes a success. Having said all that, Validy Softnaos is worth a try. If you are concerned over piracy and sabotages, then you may use it and tell us your experience too. Filed under How To, Java Software, Programming, Software Review, Technology, Windows Software Review | Tags: 2012, Claim, Cyber terrorism, Lost, Piracy, Validy Softnaos, Validy technology | Comment Below | Email this Article Windows Software Review News How to check what has been changed in your Windows Registry Firefox 3.5 Review To-Do list ToBeeDo Review Top 5 Free Antivirus Software Easeus Data Recovery Wizard Professional: Comprehensive Review Xobni- Free Plugin Manager for Microsoft Outlook: Review Radmin Remote Control Software - Overview Top 10 Hard Drive Cloning &amp; Backup Software 2012 News Outsourcing signals boom in India's publishing industry AP aiming for more lucrative deals with major Web sites as offline media slump worsens The Complete story of Who benefited and who lost in this recession NEC to withdraw from Japan supercomputer project due to slump e-Commerce Marketing is gaining momentum due to recession Infosys to pick up most of IBM's support contract with Australia's Telstra CDM Authority Goes Hitech Intel Warns AMD on Legal Terms about GlobalFoundries $4.2 Billion Project Related Articles Judge rules against Real Networks, prohibits company from marketing DVD copying software August 12th, 2009 Judge bars sales of RealNetworks' DVD softwareSAN FRANCISCO — DVD copying software sold by RealNetworks Inc. appears to be an illegal pirating tool, a federal judge ruled Tuesday in a legal battle that's been closely watched in Hollywood and elsewhere. Microsoft Windows Genuine Advantage Check Cracked under 24 hours July 28th, 2005 Microsoft's effort to refuse access to updated versions of Windows Operating System has been foiled by hackers within 24 hours. Microsoft demanded that those who wanted Windows updates, other than security updates, will have to download an Active X program that sniffed their operating system to see if their OS copy had been pirated. How to prevent robots (Google Bot, MSNBot, Yahoo Slurp! etc.) from displaying cached pages of your site April 12th, 2005 Site Owners often detest the fact that google caches an old copy of their site and displays it on searches which brings up the site pages. A simple way to prevent robots (including Google, Yahoo etc.) from caching your site contents is to include the following within the head section of your web page. How To Prevent Search Engines Like Google & MSN Search From Using ODP Title & Description For Site August 23rd, 2006 Search engines like Google often fetch your site description from ODP (Open Directory Project) description instead of fetching it from the site content or meta-tags. This may not always be desirable as it may not represent your site properly. India Set to be Technical Backend for All New .org Web Sites October 4th, 2005 India’s global image and reputation is rapidly growing. Top Internet decision makers, PIR, have decided to make India a hub for the technical backend of all new websites, a move that is expected to significantly reduce time to resolve websites. Compuware sells application testing software line to Britain's Micro Focus for $80M May 6th, 2009 Compuware sells software line to British companyDETROIT — Business software and services provider Compuware Corp. says it's selling an applications testing software line to Britain's Micro Focus International PLC for $80 million. A Plan for Stopping Online Music & Book Piracy August 14th, 2007 Online piracy is assuming alarming proportions and will continue to do so with the popularization of internet and better bandwidth availability to customers. Online piracy affects every material that can be moved online - music, video, books and software. How To Use .htaccess to Prevent Apache HTTPD Directory Listing March 16th, 2008 Apache HTTPD servers are configured by default to display directory listing, when index files like index.htm or index.html of index.php etc. are not present in the directory. How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror... 3 sur 4 05/09/2010 10:42
  • 4. Corporate | Products | About Me | How to use this site | Submit News | Archives | Forum | Contact | Privacy Policy Understanding the Role of Manuals in Software Development June 8th, 2005 Understanding the Role of Manuals in Software development; Debunking the XP Myth of Code is Documentation; Additional value of Good Documentation; Role of Technical Writers in XP project; Summary I Don't Want to Restart My PC after Every Automatic Windows Updates - Solution March 13th, 2009 Okay letting automatic updates wasn't enough. When they finish, you are prompted to restart your computer. How to Distribute Your Software Products Securely over the Internet? - IntellProtector - A Comprehensive Review October 16th, 2008 Software vendors like us always looks for ways to easily and cheaply protect their software from getting stolen. Microsoft with billions of dollars of resources has done it with Windows Genuine Advantage program. How To Prevent Browser Caching of HTML Pages November 4th, 2006 This is old news for most of us and yet when I wanted to quickly find it, it took some searching. So here it is, in simple language, what you can do to prevent your web pages from being cached by browsers. Corporate Blogging: Meet Fortune 500 Blogger - Sun's CEO Jonathan Schwartz June 1st, 2006 Jonathan Schwartz is probably the highest profile individual to blog as CEO of Sun Microsystems, a Fortune 500 company. But that is not what this article is about. Answering Joel Spolsky's Questions On Enterprise Development September 4th, 2006 Joel Spolsky was asked four important questions on enterprise development. Joel didn't offer a clear answer on some of them. Nginx: How To Redirect /index.php To / To Avoid Content Duplication August 8th, 2008 Normally any website that responds to /index.php also responds to /. This has the potential to duplicate content. Discussion Name (required) Mail (will not be displayed; required) Website (optional) Notify me of followup comments via e-mail "The whole of science is nothing more than a refinement of everyday thinking." - Albert Einstein Copyright© 2003-2009 Angsuman Chakraborty Protected by Comment Guard Pro How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror... 4 sur 4 05/09/2010 10:42