0wn1ng the Enterprise 2.0
|
|
- Cody Parsons
- 8 years ago
- Views:
Transcription
1 0wn1ng the Enterprise 2.0 relatore: Igor Falcomatà nuove tipologie di attacco alle reti aziendali nell'epoca dei social network e del web 2.0 Broadband Business Forum 25 nov 09 - Roma free advertising > 0wn1ng the Enterprise 2.0 Broadband Business Forum 25 nov 09 Roma Igor Falcomatà <ifalcomata@enforcer.it>, alcuni diritti riservati: - Pagina 1
2 about: aka koba attività professionale: analisi delle vulnerabilità e penetration testing security consulting formazione altro: sikurezza.org (Er bz)lug Relatore: Igor Falcomatà Chief Technical Officer ifalcomata@enforcer.it Igor Falcomatà <ifalcomata@enforcer.it>, alcuni diritti riservati: - Pagina 2
3 0wn1ng the Enterprise 1.0 in una Internet remota, molti anni fa.. terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 3
4 Discovery... 0wn1ng the Enterprise 1.0 Mr. Malicious 1.0 terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 4
5 Discovery... 0wn1ng the Enterprise 1.0 Mr. Malicious 1.0 terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 5
6 Discovery... 0wn1ng the Enterprise 1.0 Mr. Malicious 1.0 terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 6
7 Exploiting... 0wn1ng the Enterprise 1.0 Mr. Malicious 1.0 terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 7
8 Exploiting... 0wn1ng the Enterprise 1.0 Mr. Malicious 1.0 terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 8
9 0wn1ng the Enterprise 1.5 web applications, WiFi, VPNs,... firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 9
10 0wn1ng the Enterprise 1.5 web applications, WiFi, VPNs,... firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 10
11 Discovery... 0wn1ng the Enterprise 1.5 Mr. Malicious 1.5 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 11
12 Discovery... 0wn1ng the Enterprise 1.5 Mr. Malicious 1.5 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 12
13 Discovery... 0wn1ng the Enterprise 1.5 Mr. Malicious 1.5 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 13
14 Exploiting... 0wn1ng the Enterprise Mr. Malicious 1.5 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 14
15 Exploiting... 0wn1ng the Enterprise Mr. Malicious 1.5 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 15
16 0wn1ng the Enterprise 2.0 0wn1ng the Enterprise 2.0 Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 16
17 Discovery... see mom.. no direct traffic.. Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 17
18 Discovery... 0wn1ng the Enterprise 2.0 Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 18
19 Exploiting... 0wn1ng the Enterprise 2.0 3rd party Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 19
20 Exploiting... 0wn1ng the Enterprise 2.0 3rd party Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 20
21 Social engineering 2.0 img src: 3rd party Mr. Malicious 2.0 vittima Hey, sono Bill, il collega di Canicattì... ti ricordi? Hey Bill.. come va? sei ancora al marketing?... Igor Falcomatà alcuni diritti riservati: - Pagina 21
22 Phishing...non solo verso siti di banking 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà alcuni diritti riservati: - Pagina 22
23 Tinyurl & co....come offuscare un link con un semplice click 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà alcuni diritti riservati: - Pagina 23
24 un semplice XSS? 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà alcuni diritti riservati: - Pagina 24
25 xss-proxy 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà alcuni diritti riservati: - Pagina 25
26 xss shell 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà alcuni diritti riservati: - Pagina 26
27 Exploiting... the good ol'way.. 3rd party Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 27
28 Exploiting... messenger/browser/clients 0 days.. 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà <ifalcomata@enforcer.it>, alcuni diritti riservati: - Pagina 28
29 Command & Conquer Welcome, master! 3rd party Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 29
30 Command & Conquer 3rd party Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 30
31 0wn1ng the Enterprise 2.0 relatore: Igor Falcomatà grazie Broadband Business Forum 25 nov 09 - Roma free advertising > 0wn1ng the Enterprise 2.0 Broadband Business Forum 25 nov 09 Roma Igor Falcomatà <ifalcomata@enforcer.it>, alcuni diritti riservati: - Pagina 31
The Hacker's Corner. Privacy e sicurezza.. ..per giornalisti in rete. Igor Falcomatà koba@sikurezza.org
The Hacker's Corner International Journalism Festival Perugia 2 maggio 2014 Privacy e sicurezza....per giornalisti in rete Igor Falcomatà koba@sikurezza.org Sempre più spesso emerge come i giornalisti
More informationAndroid e mobile security (for developers)
Android e mobile security (for developers) Igor Falcomatà CTO, Enforcer ifalcomata@enforcer.it -Italy Day2012 Rome, 23 November 2012 Copyright 2008 - The Foundation Permission is granted to copy, distribute
More information(GNU/Linux) Host Intrusion Detection
(GNU/Linux) Host Intrusion Detection breve panoramica sulle tecnologie e gli strumenti di host intrusion detection, exploit mitigation e analisi dei log su piattaforma GNU/Linux CLUSIT Security Summit
More informationAndroid e mobile security
Android e mobile security relatore: Igor Falcomatà client side, server side, privacy do android malware writers dream of electric sheep? Linux Day 2012 Firenze free advertising > Android e mobile security:
More informationIndustrial Control Systems Security. Denny Gregianin_Sales Area Manager
Industrial Control Systems Security Denny Gregianin_Sales Area Manager VEM in Numbers 5 29 170 800 495 5000 Dipendenti e Fatturato Design & Delivery NOC SOC HR & Quality Operations Custom Application Development
More informationSCADA / Smart Grid Security Who is really in control of our Control Systems?
SCADA / Smart Grid Security Who is really in control of our Control Systems? Simone Riccetti Certified SCADA Security Architect Agenda Overview of Security landscape SCADA security problem How to protect
More informationQuick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011
Quick Note 026 Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server Digi International Technical Support December 2011 Contents 1 Introduction... 3 1.1 Outline... 3 1.2 Assumptions...
More informationHow To Read Investire In Borsa Con I Trend Pdf
INVESTIRE IN BORSA CON I TREND PDF ==> Download: INVESTIRE IN BORSA CON I TREND PDF INVESTIRE IN BORSA CON I TREND PDF - Are you searching for Investire In Borsa Con I Trend Books? Now, you will be happy
More informationThe New Luxury World: l identità digitale nel lusso fa la differenza
The New Luxury World: l identità digitale nel lusso fa la differenza Massimo Fubini Founder & CEO di ContactLab 7 Luxury Summit, Il Sole 24ORE, 10 giugno 2015 It may not be modified, organized or reutilized
More informationThe New Luxury World: l identità digitale nel lusso fa la differenza
The New Luxury World: l identità digitale nel lusso fa la differenza Massimo Fubini Founder & CEO di ContactLab 7 Luxury Summit, Il Sole 24ORE, 10 giugno 2015 It may not be modified, organized or reutilized
More informationPresentation title here
Come abbattere il costo delle Presentation title here licenzesoracle Database ubtitle here Maurizio Priano Informatica Roma, 5 Novembre 2013 Problema: come
More informationDocument No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Single Static IP Customer Owned LAN Router Support
Document No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Title: Single Static IP Customer Owned LAN Router Support Version 1.0 Summary: Use the following method to
More informationSource code security testing
Source code security testing Simone Riccetti EMEA PSS Security Services All information represents IBM's current intent, is subject to change or withdrawal without notice, and represents only IBM ISS goals
More informationPowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
More informationCloud ibrido, è tutta questione di località delle risorse. (e risparmi)
Cloud ibrido, è tutta questione di località delle risorse (e risparmi) Primo passo IaaS Non solo IaaS Cloud storage cloud tiering Object store private cloud Object store public cloud Primary Storage Cloud
More informationCryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer
CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati Patrick Gada 18 March 2015 Senior Sales Engineer CryptoLocker Rossi Mario, CryptoLocker CryptoLocker Attacco del 27 gennaio
More informationCatalogo Corsi 2013/2014
Catalogo Corsi 2013/2014 Area Brand Titolo gg Aula gg 1 to 1 Grafica Ottimizzazioni immagini per schermo 1 1 Grafica Adobe After Effect CS5 base 3 3 Grafica Adobe After Effect CS6 base 3 3 Grafica Adobe
More information8 Steps for Network Security Protection
8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because
More information8 Steps For Network Security Protection
8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their
More informationBig Data, Big True. IDC Big Data Conference II, Bologna 19 novembre 2013. Fabio Rizzotto IT Research&Consulting Director, IDC Italy
Big Data, Big True IDC Big Data Conference II, Bologna 19 novembre 2013 Fabio Rizzotto IT Research&Consulting Director, IDC Italy Il sorpasso dei Big Data sulla BI Business Intelligence Big Data Worldwide
More informationUbiquity getting started
Introduction This document describes the most important steps to quickly get started with Ubiquity Installation Domain creation Device registration and activation Version Description Date 1 First emission
More informationClient Side Cross Site Scripting
Client Side Cross Site Scripting 1 Client Side Cross Site Scripting CLIENT SIDE XSS - DI PAOLA 2 Soluzioni e sicurezza per applicazioni mobile e payments Consorzio Triveneto, azienda leader nei sistemi
More informationLe tecnologie del Web 2.0: RSS. Prof. Filippo Lanubile. ovvero: semplice diffusione di contenuti
Le tecnologie del Web 2.0: RSS Cos è RSS Really Simple Syndication ovvero: semplice diffusione di contenuti Formato di dati per distribuire agli utenti web gli aggiornamenti di siti web, dei blog, l'audio
More informationAlberto Meneghini! Security Leader, IBM Italia! IBM Security. 2015 IBM Corporation. 12015 IBM Corporation
Alberto Meneghini! Security Leader, IBM Italia! 12015 IBM Corporation Esistono istituzioni finanziarie che sanno cosa significa essere attaccate ed altre che neppure lo immaginano. In quale vi riconoscete?!
More informationNumber: 08.04 NETWORK SECURITY
NETWORK SECURITY December 2003 TABLE OF CONTENTS 1 INTRODUCTION... 1 1.1 NETWORK SECURITY OVERVIEW... 1 1.2 EXCLUSIONS... 1 1.3 COMMENTS AND SUGGESTIONS... 1 2 NETWORK SECURITY RESPONSIBILITIES... 3 2.1
More informationCorso: Core Solutions of Microsoft Skype for Business 2015 Codice PCSNET: MSKY-5 Cod. Vendor: 20334 Durata: 5
Corso: Core Solutions of Microsoft Skype for Business Codice PCSNET: MSKY-5 Cod. Vendor: 20334 Durata: 5 Obiettivi Al termine del corso i partecipanti saranno in grado di: Descrivere l'architettura di
More informationVoIP : Voice over Internet Privacy. Alessio L.R. Pennasilico mayhem@aipsi.org http://www.aipsi.org
VoIP : Alessio L.R. Pennasilico http://www.aipsi.org Alessio L.R. Pennasilico Security Evangelist @ Alba S.T. Member / Board of Directors: AIP, AIPSI, CLUSIT, HPP, ILS, IT-ISAC, LUGVR, OPSI, Metro Olografix,
More informationTDD da un capo all altro. Matteo Vaccari vaccari@pobox.com matteo.vaccari@xpeppers.com (cc) Alcuni diritti riservati
TDD da un capo all altro Matteo Vaccari vaccari@pobox.com matteo.vaccari@xpeppers.com (cc) Alcuni diritti riservati 1 Introduzione Quando si parla di Test-Driven Development spesso si sente dire facciamo
More informationCustom Integration Solutions
Welcome to this introduction into a true business class network solution for you and your clients This solution has been designed, by integrators, for integrators. We look forward to producing an ever
More informationIBM Academic Initiative
IBM Academic Initiative Sistemi Centrali Modulo 3- Il sistema operativo z/os (quarta parte) Unix Services Sapienza- Università di Roma - Dipartimento Informatica 2007-2008 UNIX System Services POSIX XPG4
More informationL informatica nel mondo industriale
Gian Luca Sacco - Marketing Director South & Central Europe L informatica nel mondo industriale Page 1 Smarter decisions, better products. Today s Product Challenges are More Difficult Than Ever Before
More informationState of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services
More informationNext Step Publishing. Federico Ruberti Fake Press. Roma, 7 dicembre 2010, Digital Cafè, Più libri più liberi 2010.
Next Step Publishing Federico Ruberti Fake Press Roma, 7 dicembre 2010, Digital Cafè, Più libri più liberi 2010. Fake Press Think-tank italiano e internazionale che investiga, sviluppa e realizza modelli
More informationHow To Manage A Mobile Device Safely
Quali sono i rischi che derivano dall utilizzo del mobile e quali le precauzioni da prendere contro gli attacchi informatici. Nicola D Ottavio Security Sales Specialist 1 The required roadmap disclaimer
More informationMaestri formaggiai dal 1921
formaggiai dal 1921 Sono passati PIÙ DI NOVANT ANNI da quando Giuseppe Colla fondò il CASEIFICIO COLLA. Ancora OGGI dopo 4 GENERAZIONI, produciamo un FORMAGGIO di ALTISSIMA QUALITÀ, mantenendo inalterata
More informationWH-Display. G EPROM d e s i g n > ESPOSITORI A PARETE/VETRINA WALL DISPLAY STAND/DISPLAY CASE
G EPROM > ESPOSITORI A PARETE/VETRINA WALL DISPLAY STAND/DISPLAY CASE L espositore è concepito per un cambio rapido del messaggio. È costituito da una tasca piatta in Plexiglas antiurto trasparente, sostenuta
More informationPublic Affairs & Communication Huawei Italia
Security Level: Talent Lab A training program sponsored by Huawei and MIUR Public Affairs & Communication Huawei Italia www.huawei.com HUAWEI TECHNOLOGIES CO., LTD. The project : TALENT LAB Talent Lab
More informationMade in Italy ENABLING ITALIAN BUSINESSES TO GROW GLOBALLY WITH DIGITAL. Alessandra Domizi Giulia Pierangeli Google
Made in Italy ENABLING ITALIAN BUSINESSES TO GROW GLOBALLY WITH DIGITAL Alessandra Domizi Giulia Pierangeli Google ITALIAN ECONOMY IS SLIDING BACKWARDS BY 13 YEARS GDP down 3.8% since 2010 12.6% Unemployment
More informationSicurezza Data Center 22 giugno 2015. Fabio Paravani Regional Account Manager
Sicurezza Data Center 22 giugno 2015 Fabio Paravani Regional Account Manager A world safe for exchanging digital information CEO Founded Headquarters Employees Offices 2012 Sales Eva Chen 1988, United
More informationThe Case for Enterprise Ready Virtual Private Clouds
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy University of Massachusetts Amherst *AT&T Research
More informationEdgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and
More informationIBM Security Services
IBM Security Services - Penetration Testing - July 15, 2014 12014 IBM Corporation THE EVOLVING THREAT LANDSCAPE 2 Success in today s dynamic, data driven global marketplace requires effective enterprise
More informationP2PSIP P2PSIP P2P-SIP P2P SIP SIPP2P SIP-P2P SIP P2P
P2PSIP P2PSIP P2P-SIP P2P SIP SIPP2P SIP-P2P SIP P2P Xché Per brillare di luce riflessa Perché sembra un'alternativa a Skype Per non essere tagliati fuori Per estendere la copertura Perché è una tecnologia
More informationCorso: Supporting and Troubleshooting Windows 10 Codice PCSNET: MW10-3 Cod. Vendor: 10982 Durata: 5
Corso: Supporting and Troubleshooting Windows 10 Codice PCSNET: MW10-3 Cod. Vendor: 10982 Durata: 5 Obiettivi Al termine del corso i partecipanti saranno in grado di: Descrivere i processi coinvolti nella
More informationEdgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5
More informationAT&T Global Network Client Domain Logon Guide. Version 9.6
Version 9.6 AT&T Global Network Client Domain Logon Guide 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual
More informationInternet and Intranet Calling with Polycom PVX 8.0.1
Internet and Intranet Calling with Polycom PVX 8.0.1 An Application Note Polycom PVX is an advanced conferencing software application that delivers Polycom's premium quality audio, video, and content sharing
More informationPalo Alto Networks AAC Lab Creation Guidelines v1.0
Palo Alto Networks AAC Lab Creation Guidelines v1.0 Contact Information Corporate Headquarters: Palo Alto Networks 3300 Olcott Street Santa Clara, CA 95054 http://www.paloaltonetworks.com/ About this Guide
More informationAPC-Pro sa Computer Service
Configuring, Managing and Troubleshooting Microsoft Exchange Service Pack 2 (10135B) Durata: 5 giorni Orario: 8:30 12:00 / 13:30-17.00 Costo per persona: CHF 1 900.-- (Min. 5 partecipanti) Obiettivi di
More informationBased on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.
30. VoIP Example 3 (VoIP over VPN) Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. In this example 3300V
More informationDisplay racks for Wine
E R R E E N N E 48 Espositori per vino in plexiglass Nuova linea espositori in plexiglass per vino, eleganti soluzioni d arredo dalle forme armoniose che si rifanno alle più prestigiose disposizioni di
More informationREVIEW OF THE FIREWALL ARRANGEMENTS
WEST DORSET DISTRICT COUNCIL REVIEW OF THE FIREWALL ARRANGEMENTS Report issued: December 2007 The matters raised in this report are only those, which came to the attention of the auditor during the course
More informationCourse Title: Penetration Testing: Communication Media Testing, 1st Edition
Course Title: Penetration Testing: Communication Media Testing, 1st Edition Page 1 of 6 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad
More informationWebsense TRITON. Ferdinando Mancini Sr. Sales Engineer
Websense TRITON Raggiungere un elevato livello di integrazione di soluzioni e piattaforme grazie ad una nuova ed unica suite dedicata alla sicurezza dei contenuti Ferdinando Mancini Sr. Sales Engineer
More informationUsing IPsec VPN to provide communication between offices
Using IPsec VPN to provide communication between offices This example provides secure, transparent communication between two FortiGates located at different offices using route-based IPsec VPN. In this
More informationDall Information Security alla Cyber Security, e ritorno
Dall Information Security alla Cyber Security, e ritorno (Come migliorare la sicurezza dell azienda attraverso un efficace governo degli incidenti) Luca Bechelli (CLUSIT) Marco Di Leo (HP) Fabio Vernacotola
More informationMCSE SERVER INFRASTRUCTURE PERCORSO COMPLETO
MCSE SERVER INFRASTRUCTURE PERCORSO COMPLETO Descrizione Il corso è destinato ai professionisti dell'information Technology (IT) responsabili della pianificazione, progettazione e implementazione di un
More informationFLAVIO D ANNUNZIO Digital for Business
ITALIAN ORPHAN DRUGS DAY Venerdì 13 febbraio 2015 Sala conferenze Digital for Business - Sesto San Giovanni (MI) FLAVIO D ANNUNZIO Digital for Business www.digitalforacademy.com Find the Patients, Drive
More informationSecurity perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders
Network Security Part 2: protocols and systems (f) s and VPNs (overview) Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Security perimeter Insider - Access control,
More informationLesson 201: Use of il quale
Lesson 201: Use of il quale by Keith A Preble, info@ilgur.com Il quale can be used as a relative pronoun when it is combined with the definite article, il, la, i, le or when it is articulated with a simple
More informationDeploying Silver Peak VXOA Physical And Virtual Appliances with Dell EqualLogic Isolated iscsi SANs including Dell 3-2-1
Deploying Silver Peak VXOA Physical And Virtual Appliances with Dell EqualLogic Isolated iscsi SANs including Dell 3-2-1 Tech Note June 2012 This tech note describes the deployment of Silver Peak physical
More informationCommunity sites powered by Drupal LinuxDay 2014 @ IIS F. Alberghetti. Andrea franz Francesconi andrea.francesconi@gmail.com
Community sites powered by Drupal LinuxDay @ IIS F. Alberghetti Andrea franz Francesconi andrea.francesconi@gmail.com LinuxDay Topic... Il messaggio di quest'anno fa esplicito riferimento alle libertà
More informationWEBINARS. Realtà Aumentata e casi studio rilevanti nel settore industriale. Mauro Rubin. Copyright 2015 by InfoComm International
WEBINARS Realtà Aumentata e casi studio rilevanti nel settore industriale Mauro Rubin Copyright 2015 by InfoComm International About Mauro Rubin JoinPad President & Founder Tags: #Geek #VR #Entrepreneur
More informationITU-T Kaleidoscope Conference Innovations in NGN. Architecture for Broadband and Mobile VPN over NGN
ITU-T Kaleidoscope Conference Innovations in NGN Architecture for Broadband and Mobile VPN over NGN Masahisa Kawashima NTT Information Sharing Platform Laboratories kawashima.masahisa@lab.ntt.co.jp Architecture
More informationBasic IPv6 WAN and LAN Configuration
Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration
More informationConfiguration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview
Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall Overview This document describes how to implement IPSec with pre-shared secrets establishing
More informationDefinition of firewall
Internet Firewalls Definitions: firewall, policy, router, gateway, proxy NAT: Network Address Translation Source NAT, Destination NAT, Port forwarding NAT firewall compromise via UPnP/IGD Packet filtering
More informationCCNA Security 2.0 Scope and Sequence
CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
More informationI. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course
More informationReti Informatiche. WireShark. www.wireshark.org
Reti Informatiche WireShark www.wireshark.org What is WireShark Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data
More informationLearning Module title: Promoting ICT with migrants in the ICT centre
Learning Module title: Promoting ICT with migrants in the ICT centre Position within the curriculum: Stage 2 (consolidation) / Category 2 (Methodological skills in working with groups of participants)
More informationCORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 info@coresecurity.com
More information100% Renewable Power Nightmare, Dream or Reality? Antonella Battaglini Kyoto Club, Roma 16-02-2011
100% Renewable Power Nightmare, Dream or Reality? Antonella Battaglini Kyoto Club, Roma 16-02-2011 Energiekonzept Global and European Development Roadmap to 2050 Slide 2 Nightmare - Incubo... Affinché
More information24 novembre 2014. Relatrici: Monica Proto e Carmela Cornacchia CNR-IMAA. Sportello APRE Basilicata/TeRN
BANDI DI INTERESSE in H2020 (SC2) 24 novembre 2014 Relatrici: Monica Proto e Carmela Cornacchia CNR-IMAA Sportello APRE Basilicata/TeRN Food security, sustainable agriculture and forestry, marine and maritime
More informationCreating a VPN with overlapping subnets
Creating a VPN with overlapping subnets This recipe describes how to construct a VPN connection between two networks with overlapping IP addresses in such a way that traffic will be directed to the correct
More informationENDIAN Topologies Setup of different Network topologies with Endian Firewalls
ewon Application User Guide You Select, We Connect AUG 027 / Rev 1.0 ENDIAN Topologies Setup of different Network topologies with Endian Firewalls Table of Contents 1. Hardware and software requirements...3
More informationSCHEMI PREPARAZIONE CAVI per cabling del Beam Splitter
SCHEMI PREPARAZIONE CAVI per cabling del Beam Splitter INFORMAZIONI GENERALI...2 IDENTIFICAZIONE COMPONENTI...2 LEGENDA...3 PINOUT OF THE MAIN DEVICES...3 CABLE A (VACUUM SIDE)...5 CABLE B (VACUUM SIDE)...6
More informationSmart Transport for Sustainable City
Smart Transport for Sustainable City Dipartimento di Ingegneria dell Informazione University of Pisa, Italy E-mail: francesco.marcelloni@unipi.it Alessio Bechini, Beatrice Lazzerini Projects SMARTY (SMArt
More informationEnterprise Risk Management: Strategie e Soluzioni a confronto
Enterprise Risk Management: Strategie e Soluzioni a confronto - Milano 25 Settembre 2008 Fabio Battelli, CISSP, CISA Practice Manager - Advisory Services Symantec Consulting Services Symantec Global Services
More informationAppendix C Network Planning for Dual WAN Ports
Appendix C Network Planning for Dual WAN Ports This appendix describes the factors to consider when planning a network using a firewall that has dual WAN ports. This appendix contains the following sections:
More informationA6- Sensitive Data Exposure
OWASP Vulnerabilities and Attacks Simplifie d: Business Manager Series Part 2 Have you heard of the times when Fantastic Frank from Randomland was furious? Money and critical data was being stolen from
More informationUsing Remote Desktop Software with the LAN-Cell 3
Using Remote Desktop Software with the LAN-Cell 3 Technote LCTN3010 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail:
More informationVulnerabilità e Attacchi alle Infrastrutture IT Simone Riccetti. Sr. IT Security Architect
Vulnerabilità e Attacchi alle Infrastrutture IT Simone Riccetti Sr. IT Security Architect Agenda Team di Ricerca X-Force Vulnerabilità e Minacce Tecnologie di Protezione Attack Lifecycle Live Demo 2 The
More informationScenario 1: One-pair VPN Trunk
VPN Trunk Load-Balance between Vigor3200 and Other Vigor Router This section will discuss how to build VPN Trunk with load-balance between Vigor3200 and other router (e.g., Vigor3300). Scenario 1: One-pair
More informationNGN. Giulio Signorelli WIND Telecomunicazioni S.p.A.
NGN Giulio Signorelli WIND Telecomunicazioni S.p.A. NGN & Wi-FI Bologna, 26 settembre 2011 Agenda Current Broadband situation In Italy FTTH models Conclusion - Page 2 - - Page 3 - Fixed Broadband in Italy
More informationPercorso Mcsa Managing and Mainting Windows 8
Percorso Mcsa Managing and Mainting Windows 8 Descrizione In questo corso, gli studenti imparano a progettare l'installazione, la configurazione e la manutenzione di Windows 8. Due caratteristiche uniche
More informationONLINE COLLABORATION USING DATABASES IMAGE EDITING SPECIALISED LEVEL CAD2D SPECIALISED LEVEL
POLO BIANCIARDI CERTIFICAZIONE AICA ECDL PROFILE IT SECURYTI SPECIALISED SPECIALISED CAD2D SPECIALISED ADVANCED HEALTH ECDL SPECIALISED ADVANCED CAD2D SPECIALISED HEALTH 1 ESAME ECDL BASE SPECIALISED ADVANCED
More informationipratico POS Quick Start Guide v. 1.0
ipratico POS Quick Start Guide v. 1.0 Version History Version Pages Comment Date Author 1.0 First Release 5/Marzo/2012 Luigi Riva 2 SUMMARY 1 GETTING STARTED 4 1.1 What do you need? 4 1.2 ipad 5 1.3 Antenna
More informationInfrastructure-less networks
Infrastructure-less networks Csaba Simon Dept. of Telecommunications and Media Informatics simon@tmit.bme.hu Convergent Networks and Services (VITMM156) 1 Mobility management 2 Mobility Mobile station,
More informationConfiguring an IPsec VPN to provide ios devices with secure, remote access to the network
Configuring an IPsec VPN to provide ios devices with secure, remote access to the network This recipe uses the IPsec VPN Wizard to provide a group of remote ios users with secure, encrypted access to the
More informationLoad Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
More informationPROGRAMMA CORSO DI LOGIC PRO 9
PROGRAMMA CORSO DI LOGIC PRO 9 1-VIDEO ANTEPRIMA Durata: 4 27 2-VIDEO n.1 Durata: 1 07 - APRIRE UNA NUOVA SESSIONE 3-VIDEO n.2 Durata: 3 36 - CREARE UNA NUOVA TRACCIA - SOFTWARE INSTRUMENT : - Aprire una
More informationLezione 10 Introduzione a OPNET
Corso di A.A. 2007-2008 Lezione 10 Introduzione a OPNET Ing. Marco GALEAZZI 1 What is OPNET? Con il nome OPNET viene indicata una suite di prodotti software sviluppati e commercializzati da OPNET Technologies,
More informationLab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)
More informationTechNote. Configuring SonicOS for Amazon VPC
Network Security SonicOS Contents Overview... 1 System or Network Requirements / Prerequisites... 3 Deployment Considerations... 3 Configuring Amazon VPC with a Policy-Based VPN... 4 Configuring Amazon
More informationTRADING ONLINE E STATISTICA PDF
TRADING ONLINE E STATISTICA PDF ==> Download: TRADING ONLINE E STATISTICA PDF TRADING ONLINE E STATISTICA PDF - Are you searching for Trading Online E Statistica Books? Now, you will be happy that at this
More informationChapter 3 Security and Firewall Protection
Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+
More informationHow To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key
How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key
More informationNetwork Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
More informationOracle Database 10g: Security Release 2
Oracle University Chiamaci: 800 672 253 Oracle Database 10g: Security Release 2 Duration: 4 Days Description In this course, the students learn how they can use Oracle database features to meet the security
More information