This document outlines the history and architecture of Microsoft's .NET framework. It lists the major versions of .NET from 1.0 to the current 4.0 version and the corresponding Common Language Runtime versions. It also provides a high-level overview of the Model-View-Controller design pattern commonly used with .NET applications.
This document provides an overview of Microsoft technologies including desktop applications, web, cloud, mobile, games and other devices. It discusses the .NET Framework, its components like the Common Language Runtime and Base Class Libraries. It also covers Visual Studio 2010 editions, hardware requirements, new features, project templates, SQL Server Express 2008 R2 and ASP.NET. Finally, it lists resources for learning more and developer communities.
Expression Encoder is a software program that allows users to:
1. Encode high quality video and capture PC screens for sharing online or live broadcasting.
2. Produce content optimized for the Silverlight video experience.
3. Requirements include Windows XP or newer, 1GB RAM, 2GB storage, and DirectX 9 graphics. It supports formats like AVI, WMV, MOV and encodes video for delivery through Smooth Streaming.
El documento presenta una serie de preguntas curiosas sobre fenómenos científicos y de la vida cotidiana cuya respuesta no es obvia. Algunas de las preguntas se refieren a por qué el sol aclara el pelo pero oscurece la piel, por qué las mujeres no pueden pintarse las pestañas con la boca cerrada, y por qué nunca se ha visto un titular de periódico que diga "Adivino gana la lotería".
This document discusses the new features of Internet Explorer 9, including its support for modern web standards like HTML5, CSS3, SVG and ECMAScript 5. It highlights IE9's improved support for video, audio, canvas and graphics manipulation capabilities through HTML5. The document also demonstrates how to integrate IE9 with Windows features like pinned sites, start menu integration and jump lists. It provides resources for learning more about IE9's HTML5 support and tools for testing and developing HTML5 applications.
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia Smith-Davis
A collaborative effort by Verizon, iKeepSafe, and the California School Library Association--BEaPRO: Connect with Confidence is a family workshop on the Digital Literacy (Citizenship) concepts of balance, ethical use, privacy, relationships, reputation and online security.
This document provides contact information for Dani R Taufani who is an employee, student, and housewife. It lists her email, Twitter handle, blog, and a request to contact her. It also mentions several tools she uses like calendar, contacts, email, tasks, and collaboration.
This document outlines the history and architecture of Microsoft's .NET framework. It lists the major versions of .NET from 1.0 to the current 4.0 version and the corresponding Common Language Runtime versions. It also provides a high-level overview of the Model-View-Controller design pattern commonly used with .NET applications.
This document provides an overview of Microsoft technologies including desktop applications, web, cloud, mobile, games and other devices. It discusses the .NET Framework, its components like the Common Language Runtime and Base Class Libraries. It also covers Visual Studio 2010 editions, hardware requirements, new features, project templates, SQL Server Express 2008 R2 and ASP.NET. Finally, it lists resources for learning more and developer communities.
Expression Encoder is a software program that allows users to:
1. Encode high quality video and capture PC screens for sharing online or live broadcasting.
2. Produce content optimized for the Silverlight video experience.
3. Requirements include Windows XP or newer, 1GB RAM, 2GB storage, and DirectX 9 graphics. It supports formats like AVI, WMV, MOV and encodes video for delivery through Smooth Streaming.
El documento presenta una serie de preguntas curiosas sobre fenómenos científicos y de la vida cotidiana cuya respuesta no es obvia. Algunas de las preguntas se refieren a por qué el sol aclara el pelo pero oscurece la piel, por qué las mujeres no pueden pintarse las pestañas con la boca cerrada, y por qué nunca se ha visto un titular de periódico que diga "Adivino gana la lotería".
This document discusses the new features of Internet Explorer 9, including its support for modern web standards like HTML5, CSS3, SVG and ECMAScript 5. It highlights IE9's improved support for video, audio, canvas and graphics manipulation capabilities through HTML5. The document also demonstrates how to integrate IE9 with Windows features like pinned sites, start menu integration and jump lists. It provides resources for learning more about IE9's HTML5 support and tools for testing and developing HTML5 applications.
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia Smith-Davis
A collaborative effort by Verizon, iKeepSafe, and the California School Library Association--BEaPRO: Connect with Confidence is a family workshop on the Digital Literacy (Citizenship) concepts of balance, ethical use, privacy, relationships, reputation and online security.
This document provides contact information for Dani R Taufani who is an employee, student, and housewife. It lists her email, Twitter handle, blog, and a request to contact her. It also mentions several tools she uses like calendar, contacts, email, tasks, and collaboration.
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Luca Bongiorni
Sicurezza delle reti cellulari
A tutt'oggi il GSM (Global System for Mobile Communications), sebbene progettualmente datato (1987), è lo standard di radio-comunicazione cellulare più diffuso al mondo contando, infatti, più di 4.4 miliardi di utenti in più di 200 stati. La sua popolarità e diffusione a livello globale, ha garantito, nel tempo, la possibilità di comunicare mantenendo un'efficiente mobilità, grazie la quale à massivamente utilizzato non solo dalla gente comune, ma anche da criminali ed organizzazioni terroristiche. Al fine di combattere queste ultime, è stato introdotto il cosiddetto sistema di Lawful Interception, il quale garantisce alle forze di Polizia, previo autorizzazione della Magistratura, la possibilità di localizzare ed intercettare determinate utenze attraverso l'utilizzo di diverse tecniche, tra le quali l'uso di IMSI-Catcher: particolari apparati portatili molto costosi in grado di tracciare e intercettare un telefono cellulare. Gli IMSI-Catcher sono utilizzati principalmente nel caso in cui non si conoscano (a priori e in dettaglio) i dati sugli utenti da tracciare e intercettare, o nel caso si sospetti la presenza d'insiders all'interno delle stesse compagnie telefoniche, i quali potrebbero compromettere le indagini.
Il seguente intervento tratterà diverse tematiche inerenti lo stato dell'arte della sicurezza delle reti cellulari. Quali vulnerabilità risiedono in esse. E quali tool vengono utilizzati per portare a termine con successo attacchi agli utenti e alla rete. Verranno inoltre presentati alcuni casi di studio reali e alcune ricerche condotte.
The document provides examples of successful individuals and companies who achieved success through perseverance and connecting with others. It discusses how Steve Jobs and Steve Wozniak founded Apple through their collaboration. Similarly, Sergey Brin and Larry Page created Google through partnering on a research project. The document advocates finding connections through social networking and websites like Cluehut to achieve dreams.
Certificate Pinning in Mobile ApplicationsLuca Bongiorni
The document discusses certificate pinning and provides information on implementing it for Android, iOS, and Windows platforms. It describes certificate pinning as associating a host with an expected certificate or public key to prevent man-in-the-middle attacks. The document outlines pros and cons of certificate pinning, and provides code examples and links to resources for implementing pinning on different mobile platforms.
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Luca Bongiorni
The document discusses various mobile application security vulnerabilities. It covers topics like insecure data storage, lack of encryption for network traffic, authentication issues, insecure session management, and risks from unintended data exposure. Mitigation strategies are provided for each vulnerability, which generally involve following secure coding best practices, leveraging encryption properly, validating all inputs, and deploying defenses in depth with checks on both the client and server sides.
Lockpicking Baltic Cyber Security Forum 2013Luca Bongiorni
This document provides an introduction to lock picking, including the anatomy of a pin tumbler lock, how locks work, and the basic steps for picking a lock. It explains that lock picking involves analyzing and manipulating the lock's components without a key to unlock it. The key components of a pin tumbler lock are identified as the shell, plug, keyway, key, pins (tumblers), and springs. The document also notes that the goal of lock picking is to push up the pins with a tool until each pair is pressed past the shear line, causing a "click" and allowing the plug to rotate and unlock the lock.
iParanoid: an IMSI Catcher - Stingray Intrusion Detection SystemLuca Bongiorni
The goal is the research and development of Intrusion Detection System related with Cell Networks.
Mainly this App will check the status of some Cell Network variables (e.g. Cellid, LAC, A5 Encryption, etc.) subsequently update a local DB and check if the information about the cell networks around the users are valid or if there could be a risk (e.g. possible interception, possible impersonation, etc.).
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionLuca Bongiorni
Open BTS: Emergency GSM Messaging & Monitoring System for Civil Protection is proposed as a solution ready-to-deploy in the event of natural disaster, in that areas where GSM networks are temporarily down.
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...Luca Bongiorni
Quick overview of some case studies about: IMSI-Catcher (Stingray phone tracker), tracking phones, GPRS sniffing, GSM-R catching and DoS, POS, gambling machines, etc.
La educación debe enfocarse en desarrollar la creatividad, el pensamiento crítico y la colaboración entre estudiantes para que puedan prosperar en un mundo en constante cambio, en lugar de centrarse únicamente en exámenes y calificaciones.
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...Luca Bongiorni
Sicurezza delle reti cellulari
A tutt'oggi il GSM (Global System for Mobile Communications), sebbene progettualmente datato (1987), è lo standard di radio-comunicazione cellulare più diffuso al mondo contando, infatti, più di 4.4 miliardi di utenti in più di 200 stati. La sua popolarità e diffusione a livello globale, ha garantito, nel tempo, la possibilità di comunicare mantenendo un'efficiente mobilità, grazie la quale à massivamente utilizzato non solo dalla gente comune, ma anche da criminali ed organizzazioni terroristiche. Al fine di combattere queste ultime, è stato introdotto il cosiddetto sistema di Lawful Interception, il quale garantisce alle forze di Polizia, previo autorizzazione della Magistratura, la possibilità di localizzare ed intercettare determinate utenze attraverso l'utilizzo di diverse tecniche, tra le quali l'uso di IMSI-Catcher: particolari apparati portatili molto costosi in grado di tracciare e intercettare un telefono cellulare. Gli IMSI-Catcher sono utilizzati principalmente nel caso in cui non si conoscano (a priori e in dettaglio) i dati sugli utenti da tracciare e intercettare, o nel caso si sospetti la presenza d'insiders all'interno delle stesse compagnie telefoniche, i quali potrebbero compromettere le indagini.
Il seguente intervento tratterà diverse tematiche inerenti lo stato dell'arte della sicurezza delle reti cellulari. Quali vulnerabilità risiedono in esse. E quali tool vengono utilizzati per portare a termine con successo attacchi agli utenti e alla rete. Verranno inoltre presentati alcuni casi di studio reali e alcune ricerche condotte.
The document provides examples of successful individuals and companies who achieved success through perseverance and connecting with others. It discusses how Steve Jobs and Steve Wozniak founded Apple through their collaboration. Similarly, Sergey Brin and Larry Page created Google through partnering on a research project. The document advocates finding connections through social networking and websites like Cluehut to achieve dreams.
Certificate Pinning in Mobile ApplicationsLuca Bongiorni
The document discusses certificate pinning and provides information on implementing it for Android, iOS, and Windows platforms. It describes certificate pinning as associating a host with an expected certificate or public key to prevent man-in-the-middle attacks. The document outlines pros and cons of certificate pinning, and provides code examples and links to resources for implementing pinning on different mobile platforms.
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Luca Bongiorni
The document discusses various mobile application security vulnerabilities. It covers topics like insecure data storage, lack of encryption for network traffic, authentication issues, insecure session management, and risks from unintended data exposure. Mitigation strategies are provided for each vulnerability, which generally involve following secure coding best practices, leveraging encryption properly, validating all inputs, and deploying defenses in depth with checks on both the client and server sides.
Lockpicking Baltic Cyber Security Forum 2013Luca Bongiorni
This document provides an introduction to lock picking, including the anatomy of a pin tumbler lock, how locks work, and the basic steps for picking a lock. It explains that lock picking involves analyzing and manipulating the lock's components without a key to unlock it. The key components of a pin tumbler lock are identified as the shell, plug, keyway, key, pins (tumblers), and springs. The document also notes that the goal of lock picking is to push up the pins with a tool until each pair is pressed past the shear line, causing a "click" and allowing the plug to rotate and unlock the lock.
iParanoid: an IMSI Catcher - Stingray Intrusion Detection SystemLuca Bongiorni
The goal is the research and development of Intrusion Detection System related with Cell Networks.
Mainly this App will check the status of some Cell Network variables (e.g. Cellid, LAC, A5 Encryption, etc.) subsequently update a local DB and check if the information about the cell networks around the users are valid or if there could be a risk (e.g. possible interception, possible impersonation, etc.).
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionLuca Bongiorni
Open BTS: Emergency GSM Messaging & Monitoring System for Civil Protection is proposed as a solution ready-to-deploy in the event of natural disaster, in that areas where GSM networks are temporarily down.
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...Luca Bongiorni
Quick overview of some case studies about: IMSI-Catcher (Stingray phone tracker), tracking phones, GPRS sniffing, GSM-R catching and DoS, POS, gambling machines, etc.
La educación debe enfocarse en desarrollar la creatividad, el pensamiento crítico y la colaboración entre estudiantes para que puedan prosperar en un mundo en constante cambio, en lugar de centrarse únicamente en exámenes y calificaciones.