The Italian and Israeli governments held high-level meetings to discuss strengthening their bilateral relationship. They signed new agreements on cooperation in areas like energy, trade, security, and culture. Both governments committed to further cooperation on issues like countering terrorism, promoting regional stability, and developing high-tech industries and cybersecurity. They also discussed collaborating in international development, education exchanges, and commemorating the Holocaust.
Il Presidente del Consiglio, Enrico Letta, ha partecipato a Bruxelles al Consiglio Europeo del 24 e 25 ottobre. Al termine dei lavori ha tenuto una conferenza stampa in cui ha definito “sufficienti” le conclusioni del vertice sottolineando l’importanza dei passaggi sull’immigrazione, posta come questione europea, all'insegna della solidarietà, dopo la tragedia di Lampedusa.
La Relazione 2013 sull’attività svolta nel 2012 predisposta dall’unità tecnica finanza di progetto.
Come di consueto nelle relazioni annuali dell’UTFP degli ultimi anni, nel dare conto dell’andamento dell’intero mercato del PPP - Partenariato Pubblico Privato - italiano, particolare attenzione è riservata al dettaglio dei dati relativi alle concessioni di lavori pubblici, in quanto principale strumento contrattuale di PPP in Italia.
Presentazione all'incontro di formazione su Educazione e socialnetwork tenuto da Igor Salomone a Marina di Massa il 13 marzo 2011 nell'ambito di un ciclo di incontri organizzato dalla Cooperativa Doc di Torino
The Italian and Israeli governments held high-level meetings to discuss strengthening their bilateral relationship. They signed new agreements on cooperation in areas like energy, trade, security, and culture. Both governments committed to further cooperation on issues like countering terrorism, promoting regional stability, and developing high-tech industries and cybersecurity. They also discussed collaborating in international development, education exchanges, and commemorating the Holocaust.
Il Presidente del Consiglio, Enrico Letta, ha partecipato a Bruxelles al Consiglio Europeo del 24 e 25 ottobre. Al termine dei lavori ha tenuto una conferenza stampa in cui ha definito “sufficienti” le conclusioni del vertice sottolineando l’importanza dei passaggi sull’immigrazione, posta come questione europea, all'insegna della solidarietà, dopo la tragedia di Lampedusa.
La Relazione 2013 sull’attività svolta nel 2012 predisposta dall’unità tecnica finanza di progetto.
Come di consueto nelle relazioni annuali dell’UTFP degli ultimi anni, nel dare conto dell’andamento dell’intero mercato del PPP - Partenariato Pubblico Privato - italiano, particolare attenzione è riservata al dettaglio dei dati relativi alle concessioni di lavori pubblici, in quanto principale strumento contrattuale di PPP in Italia.
Presentazione all'incontro di formazione su Educazione e socialnetwork tenuto da Igor Salomone a Marina di Massa il 13 marzo 2011 nell'ambito di un ciclo di incontri organizzato dalla Cooperativa Doc di Torino
La proprietà intellettuale condivisa e gli archivi aperti (ott. 2015)Simone Aliprandi
Le slides utilizzate da Simone Aliprandi per il seminario "La proprietà intellettuale condivisa e gli archivi aperti" tenutosi all'Università di Sassari il 21 ottobre 2015 in occasione della Open Access Week 2015. Maggiori dettagli: http://aliprandi.blogspot.it/2015/10/proprieta-intellettuale-condivisa-openaccess-sassari.html.
"Gli archivi nel tempo" elaborato della classe 4 B, Istituto Comprensivo "Armando Diaz" - Scuola primaria "A.Diaz", Milano, prof. Marina Lauricella
percorso tematico: Il tesoro dei poveri. Una lettura interdisciplinare del patrimonio culturale dei Luoghi pii elemosinieri attraverso le diverse tipologie di fonti
Deft Linux is a free digital forensics and incident response Linux distribution that provides tools for investigating cybersecurity incidents. Giovanni Rattaro, an IT security consultant and member of the BackTrack Linux project, leads the Deft Linux team. The next release, code named "Deft X Xplosion", will build on the existing digital forensics and incident response tools included in previous Deft Linux, Deft Zero, and DART distributions.
deftcon 2015 - Epifani, Picasso, Scarito, Meda - Tor Browser forensics on Win...Deft Association
This document summarizes research into analyzing artifacts from the Tor browser on Windows systems. It describes how the Tor browser leaves various artifacts that can be analyzed, including prefetch files, the UserAssist registry key, thumbnail cache, Windows search database, bookmarks, pagefile.sys, and memory dumps. These artifacts can reveal information like installation date, execution dates and paths, and evidence of websites visited. The document provides an example of how analysis of these artifacts was used in a case to identify the suspect who accessed a private company's salaries before they were published online.
deftcon 2015 - Dave Piscitello - DNS Traffic MonitoringDeft Association
This document discusses how DNS is used by cybercriminals and malware in various ways. It describes how criminals register domains for malicious purposes like phishing, botnets, and malware distribution. It also explains how legitimate domains get compromised and used for criminal ends. The document advocates monitoring DNS traffic and logs to detect abnormal queries that could indicate cyberattacks, exploits, or command and control communications between infected devices and criminal infrastructure.
deftcon 2015 - Nino Vincenzo Verde - European Antitrust Forensic IT ToolsDeft Association
The document discusses the European Antitrust Forensic IT Tools (EAFIT_TOOLS) project. It provides an overview of the project objectives, which are to develop a prototype indexing software to boost technical convergence of forensic analysis tools for European antitrust authorities. The software will index large amounts of documents collected during dawn raids and enable collaborative review. Requirements were gathered from authorities and include capabilities for on-site indexing and analysis during raids. The software architecture is discussed and it will be released as open source. The goals are to standardize forensic procedures and tools to aid multi-jurisdictional antitrust investigations.
La proprietà intellettuale condivisa e gli archivi aperti (ott. 2015)Simone Aliprandi
Le slides utilizzate da Simone Aliprandi per il seminario "La proprietà intellettuale condivisa e gli archivi aperti" tenutosi all'Università di Sassari il 21 ottobre 2015 in occasione della Open Access Week 2015. Maggiori dettagli: http://aliprandi.blogspot.it/2015/10/proprieta-intellettuale-condivisa-openaccess-sassari.html.
"Gli archivi nel tempo" elaborato della classe 4 B, Istituto Comprensivo "Armando Diaz" - Scuola primaria "A.Diaz", Milano, prof. Marina Lauricella
percorso tematico: Il tesoro dei poveri. Una lettura interdisciplinare del patrimonio culturale dei Luoghi pii elemosinieri attraverso le diverse tipologie di fonti
Deft Linux is a free digital forensics and incident response Linux distribution that provides tools for investigating cybersecurity incidents. Giovanni Rattaro, an IT security consultant and member of the BackTrack Linux project, leads the Deft Linux team. The next release, code named "Deft X Xplosion", will build on the existing digital forensics and incident response tools included in previous Deft Linux, Deft Zero, and DART distributions.
deftcon 2015 - Epifani, Picasso, Scarito, Meda - Tor Browser forensics on Win...Deft Association
This document summarizes research into analyzing artifacts from the Tor browser on Windows systems. It describes how the Tor browser leaves various artifacts that can be analyzed, including prefetch files, the UserAssist registry key, thumbnail cache, Windows search database, bookmarks, pagefile.sys, and memory dumps. These artifacts can reveal information like installation date, execution dates and paths, and evidence of websites visited. The document provides an example of how analysis of these artifacts was used in a case to identify the suspect who accessed a private company's salaries before they were published online.
deftcon 2015 - Dave Piscitello - DNS Traffic MonitoringDeft Association
This document discusses how DNS is used by cybercriminals and malware in various ways. It describes how criminals register domains for malicious purposes like phishing, botnets, and malware distribution. It also explains how legitimate domains get compromised and used for criminal ends. The document advocates monitoring DNS traffic and logs to detect abnormal queries that could indicate cyberattacks, exploits, or command and control communications between infected devices and criminal infrastructure.
deftcon 2015 - Nino Vincenzo Verde - European Antitrust Forensic IT ToolsDeft Association
The document discusses the European Antitrust Forensic IT Tools (EAFIT_TOOLS) project. It provides an overview of the project objectives, which are to develop a prototype indexing software to boost technical convergence of forensic analysis tools for European antitrust authorities. The software will index large amounts of documents collected during dawn raids and enable collaborative review. Requirements were gathered from authorities and include capabilities for on-site indexing and analysis during raids. The software architecture is discussed and it will be released as open source. The goals are to standardize forensic procedures and tools to aid multi-jurisdictional antitrust investigations.
Paolo Dal Checco, Alessandro Rossetti, Stefano Fratepietro - DEFT 7 ManualDeft Association
The document is a manual for DEFT 7 Linux, an open-source digital forensics distribution. It describes the authors and contributors to the toolkit. It also includes an end user license agreement and acknowledgements. The manual provides an overview of the applications included in DEFT Linux and DART, the Windows-based component, and requirements for running the distributions.
Paolo Dal Checco, Alessandro Rossetti, Stefano Fratepietro - Manuale DEFT 7Deft Association
DEFT is a Linux distribution and toolkit for digital forensics and intelligence activities. It contains various Linux applications and scripts as well as Windows applications through the DART suite. Some key features include tools for acquiring, analyzing, and investigating digital evidence from a variety of sources like hard drives, smartphones, and network traffic. This manual provides an overview of the main applications in DEFT and includes some tutorials for common digital forensics tasks.
Deftcon 2014 - Stefano Zanero - Comprehensive Black-box Methodology for Testi...Deft Association
This document presents a comprehensive black-box methodology for testing the forensic characteristics of solid-state drives (SSDs). The methodology aims to assess how SSD technologies like trim, garbage collection, wear leveling, and compression impact forensic analysis. A series of controlled experiments are conducted on several SSD models to determine if they implement these technologies and how they affect data persistence and file recoverability when using standard forensic tools and approaches in a black-box setting. The results provide insight into the challenges of SSD forensics and help evaluate the feasibility of potential white-box analysis techniques.
Deftcon 2014 - Marco Albanese - Andlink: Un’applicazione a supporto per le attività di repertazione della Polizia Giudiziaria
1. AndLink
Un’applicazione PDA per il supporto alle
attività di repertazione della Polizia Giudiziaria
Candidato: Marco Albanese
Relatore: Prof. Antonio Barili
Correlatore: Sov. Davide Gabrini