University of Wolverhampton School of Technology

Total Page:16

File Type:pdf, Size:1020Kb

University of Wolverhampton School of Technology University of Wolverhampton School of Technology Developing a Concept for Handling IT Se‐ curity with Secured and Trusted Electronic Connections Volker Hockmann, Dipl.W.‐Inf. (FH), M.Sc. A thesis submitted in partial fulfilment of the requirements of the University of Wolverhampton for the degree of Doctor of Philosophy This work or any part thereof has not previously been presented in any form to the University or to any other body whether for the purposes of assessment, publica‐ tion or for any other purpose (unless otherwise indicated). Save for any express ac‐ knowledgements, references and/or bibliographies cited in the work, I confirm that the intellectual content of the work is the result of my own efforts and of no other person. The right of Volker Hockmann to be identified as author of the work is asserted in accordance with ss.77 and 78 of the Copyright, Designs and Patents Act 1988. At this date copyright is owned by the author. 17.06.2014 Signature: Date 2 Abstract In this day and age, the Internet provides the biggest linkage of information, per‐ sonal data and information, social contact facilities, entertainment and electronic repository for all things including software downloads and tools, online books and technical descriptions, music and movies – both legal and illegal [Clarke, 1994]. With the increasing bandwidth in the last few years worldwide, it is possible to ac‐ cess the so‐called “Triple‐Play‐Solutions” – Voice over IP, High‐Speed‐Internet and Video on Demand. More than 100 million subscribers have signed on across Asia, Europe, and the Americas in 2007, and growth is likely to continue steadily in all three. As broadband moves into the mainstream, it is reshaping the telecommuni‐ cations, cable and Internet access industrie [Beardsley, Scott and Doman, Andrew, and EdinMC Kinsey, Pär, 2003]. Cisco [Cisco, 2012], one of the biggest network companies, will expect more than 966 exabytes (nearly 1 zettabyte) per year or 80.5 exabytes per month in 2015 and the “Global IP traffic has increased eightfold over the past 5 years, and will increase fourfold over the next 5 years. Overall, IP traffic will grow at a compound annual growth rate (CAGR) of 32 percent from 2010 to 2015”. More and more types of sensible data flow between different recipients. News from around the world are transferred within seconds from the one end to the other end of the world, and affect the financial market, stock exchange [Reuters, 2012] and also bring down whole governments. For instance, worldwide turmoil might ensue if a hacker broke into the web‐server of an international newspaper or news channel like N‐TV in Germany or BBC in England and displayed messages of a political revolution in Dubai or the death of the CEO from Microsoft or IBM. A very significant percentage of the population in developed and developing countries is using wired and wireless connections for reading e‐mails, accessing news‐groups or using Internet banking. All these services run on a web‐server. Most web‐servers run the Apache or the Microsoft Internet Information Server (IIS). All versions of both of these servers (Apache 1.3.x/2.x and IIS 3‐7.5) [Netcraft, 2006] are particularly vulnerable against a variety of attacks [SANS, 2006]. An attacker is, with little effort, in a position to break into many web‐servers in‐ cluding the Internet Information Server, and Apache server, the most popular web‐ servers [Netcraft, 2012]. Ellison and Schneier [2000, p. 6] note that “Certificates must be used properly if you want security. Are these practices designed with solid security reasons, or are they just rituals or imitations of the behavior of someone else? Many such practices and even parts of 3 some standards are just imitations which, when carefully traced back, started out as arbi‐ trary choices by people who didn’t try to get a real answer.” However, the web‐servers and services are vulnerable against attacks and data spoofing and manipulating. Companies, government and private households are dependent on the broadband connections. Companies offer or use services for broadband connections like video on demand (e.g. Maxdome, Videoload or iTunes) and VoIP (e.g. easybell, Sipgate or Bellshare) for conferencing (e.g. Skype) or private consumers (movies and online games), or they offer services which are essential for other companies and people. For exam‐ ple online banking, stock exchange or medical equipment like one of the biggest and most expensive projects in Germany; the implementation of the health insur‐ ance card for all people who are required to join a health insurance scheme. All these different services have a common feature – they all work with a very high data volume, and the companies need to have faith in the incoming information. The aim of this thesis is to identify how data connections can be secured and sys‐ tem validity guaranteed. One of the most important questions is whether the man‐ agement of German companies (small‐sized, medium‐sized to major enterprise) understand the importance of IT security and whether the technical staff (e.g. ad‐ ministrator) as well as the person responsible for the implemented business proc‐ esses (e.g. IT security manager) got the appropriate background, rather than only a technical view. Kevin Mitnick [Barnes, 2004], one of the most well‐known hackers, pointed out that “Security is always going to be a cat and mouse game because thereʹll be people out there that are hunting for the zero day award, you have people that donʹt have configura‐ tion management, donʹt have vulnerability management, donʹt have patch management...”. The second part of this thesis discusses the hardening and securing of services and systems. In the third part, a case study illustrates the issues. The main focus is on the Ger‐ man health card and the security mechanisms in this project. This part should make clear why it is so important to secure the data connection and to guarantee that the incoming data really comes from the sender and the receiver. How is it possible to establish a data connection between two or more machines or services? In a high security environment like the Telematik1 infrastructure or a Stock Ex‐ 1 See also: http://www.gematik.de/cms/de/egk_2/telematikinfrastruktur/telematikinfrastruktur_1.j sp 4 change, it is essential to ensure and verify the data. It may be the worst case sce‐ nario if a hacker was in a position to manipulate data in that network, with the re‐ sult that the trust of the population might be irretrievably lost. 5 Contents Part 1 – The Beginning of IT Security and Securing Web Services and Web-Servers ................... 16 1 Introduction ........................................ 17 1.1 Research Questions ............................. 18 1.2 Aims and Objectives of the Study ............... 19 1.3 Research Contribution .......................... 21 1.4 Summary of Research Approach and Methodology ... 21 1.5 Thesis Structure ............................... 23 2 Literature Review of IT Security and Cryptography and its Role in Companies and Network Connections............... 24 2.1 The Fundamental Definition of Security: The History 25 2.2 First Attacks against Services into the ARPA and the Internet .............................................. 27 2.2.1 The Kevin Mitnick - Tsutomu Shimomura Affair 27 2.2.2 The Morris Worm Attack ...................... 28 2.3 Hacker, Cracker and Attacker ................... 28 2.4 Social Engineering: Human Factor – Human Failure 30 2.5 Web Service – Server Security: An Introduction . 31 2.5.1 Definition of Web Service ................... 31 2.5.2 Definition of Web-Server/Application Server . 32 2.5.3 The Fundamental Identification Problem ...... 34 2.5.4 First Results of the Beginning of IT Security 35 2.5.4.1 Stateful Inspection....................... 35 2.5.4.2 Stateful Packet Inspection (SPI).......... 36 2.5.4.3 Application-Gateways...................... 36 2.5.4.4 Secure Socket Layer SSL and TLS........... 36 2.6 Security Approaches: Their Potential Effectiveness and Applicability for this Research ................... 38 2.7 Cryptography and Network Security .............. 39 2.7.1 Definition Public Key Infrastructure PKIX X.509 (PKIX) 40 7 2.7.2 Problem Definition of a PKI Environment – Validation of a Certificate ......................... 41 2.8 Similar Techniques comparable to OCSP .......... 42 2.8.1 The RosettaNet and EDIFACT/EDIFICE I ........ 42 2.8.2 One-Time-Password ........................... 42 2.8.3 Microsoft Passport-Netzwerk ................. 43 2.9 The German Health Card Project ................. 43 2.10 Triple Play Solutions .......................... 44 2.10.1 Triple Play Services ........................ 44 2.10.2 The Fundamental 3PS Problems ................ 46 2.11 Final Consideration and Outcome of this Thesis . 46 Part 2 – Research Details ...................... 48 3 Research Strategy ................................... 49 3.1 Philosophical Worldviews or the Research Paradigm49 3.1.1 Ontology Aspect ............................. 50 3.1.1.1 View on Information and Data.............. 51 3.1.1.2 View on Information System................ 52 3.1.1.3 View of Human Beings...................... 52 3.1.1.4 View on Technology........................ 52 3.1.1.5 View on Organisations and Society......... 52 3.1.2 The Epistemological Aspect .................. 53 3.1.3 Ethics – The Human Nature Aspect ............ 53 3.1.4 Research Methodology Aspect ................. 54 3.2 Research Methods ............................... 54 3.2.1 Survey Research ............................. 56 3.2.2 Laboratory Experiment ....................... 56 3.2.3 Action Research ............................. 56 3.2.4 Triangulation or Multi-Trait and Multi-Method 57 3.2.5 Case Study .................................. 58 3.3 Research Conclusion and the Chosen Research Method for this Thesis ....................................... 59 4 Survey Research ..................................... 64 4.1 Research Questions ............................. 64 4.2 Survey Research Methodology .................... 66 8 4.3 The Design of the Questionnaire ................ 67 4.4 Aims, Assumptions and Target Group ............. 68 4.5 Survey Statistics and Execution ...............
Recommended publications
  • The Contradictions of Techno-Nationalism and Techno-Globalism: a Historical Perspective
    New Global Studies Volume 1, Issue 1 2007 Article 1 The Contradictions of Techno-Nationalism and Techno-Globalism: A Historical Perspective David E.H. Edgerton, Hans Rausing Professor of Science and Technology, Imperial College, London Recommended Citation: Edgerton, David E.H. (2007) "The Contradictions of Techno-Nationalism and Techno- Globalism: A Historical Perspective," New Global Studies: Vol. 1: Iss. 1, Article 1. DOI: 10.2202/1940-0004.1013 ©2007 New Global Studies. All rights reserved. The Contradictions of Techno-Nationalism and Techno-Globalism: A Historical Perspective David E.H. Edgerton Abstract Techno-nationalism and techno-globalism are descriptive and prescriptive categories for understanding the impact of technology on society and vice versa. They reflect the underlying assumptions made by analysts of the place of technology in the world, and denote ideologies, rather than technological policies or realities. They also help us to realize that standard accounts of the nation and globalization are not as securely based as they appear. Indeed, nations and states are important in ways techno-nationalism does not capture, and the international and global dimension is crucial in ways which that techno-globalism overlooks. Yet an analysis of both terms yields building blocks to a more sophisticated appreciation of the linkages between the nation, technological innovation and globalization. KEYWORDS: techno-globalism, techno-nationalism, technology Author Notes: David E.H. Edgerton is the Hans Rausing Professor of History of Science at the Technology Imperial College, London. Edgerton: Contradictions of Techno-Nationalism and Techno-Globalism In this article I distinguish two approaches, which I label techno- nationalism and techno-globalism, to the study of technology and society at macro-level.
    [Show full text]
  • A DEFENCE of the CLICHÉ1 Samuel Godwin
    JOURNAL OF ENGLISH STUDIES - VOLUME 5 (2005-2006), 139-153 A DEFENCE OF THE CLICHÉ1 ADOLPHE HABERER Université Lumière-Lyon 2 ABSTRACT. A sure thing is that clichés have a bad reputation. Trying to define the cliché as a linguistic or stylistic category, however, leads to all sorts of difficulties, as we seem to be dealing with “matters as imprecise as the shape and size of a cloud or the beginning and end of a wave”. Following the example of Louis MacNeice who once wrote a “Homage to Clichés”, in this paper I will take the defence of the cliché and show that in the terms of a (Lacanian) problematics of the subject’s enunciation it has its own function and significance. “ce cœur parlant que nous appelons l’inconscient” 2 Jacques Lacan (in Kaufman 1993: 395) Samuel Godwin (1948), the Hollywood cinema magnate, is reported to have once said to his team of script-writers: “Let’s have some new clichés!”. This raises the question of whether one can “make it new” when dealing in clichés, or be at all original when dealing with clichés – as I will be doing here –, bearing in mind everything that has been said or written on the subject. Perhaps, the only proper way to address the cliché is, as we shall see presently, to follow the example of Louis MacNeice, who composed a “Homage to clichés”, and write up something that would be both an illustration and a defence of the cliché, a discourse from which anything new or original would be eliminated, leaving only what falls into the categories of the banal, the commonplace, the ready-made formula, the 1.
    [Show full text]
  • Full Dissertation All the Bits 150515 No Interviews No
    The Practice and Politics of Children’s Music Education in the German Democratic Republic, 1949-1976 By Anicia Chung Timberlake A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Music in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Richard Taruskin, Chair Professor Mary Ann Smart Professor Nicholas Mathew Professor Martin Jay Spring 2015 Abstract The Practice and Politics of Children’s Music Education in the German Democratic Republic, 1949-1976 by Anicia Chung Timberlake Doctor of Philosophy in Music University of California, Berkeley Professor Richard Taruskin, Chair This dissertation examines the politics of children’s music education in the first decades of the German Democratic Republic. The East German state famously attempted to co-opt music education for propagandistic purposes by mandating songs with patriotic texts. However, as I show, most pedagogues believed that these songs were worthless as political education: children, they argued, learned not through the logic of texts, but through the immediacy of their bodies and their emotions. These educators believed music to be an especially effective site for children’s political education, as music played to children’s strongest suit: their unconscious minds and their emotions. Many pedagogues, composers, and musicologists thus adapted Weimar-era methods that used mostly non-texted music to instill what they held to be socialist values of collectivism, diligence, open-mindedness, and critical thought. I trace the fates of four of these pedagogical practices—solfège, the Orff Schulwerk, lessons in listening, and newly-composed “Brechtian” children’s operas—demonstrating how educators sought to graft the new demands of the socialist society onto inherited German musical and pedagogical traditions.
    [Show full text]
  • 2021 Hunting and Trapping Regulations
    Effective July through2021 June 30, 2022 Updated 9.10.21 MINNESOTA HUNTING & TRAPPING REGULATIONS SHARE THE PASSION mndnr.gov/hunting #huntmn Paid Advertisement FIREWOOD ALERT! You have the power to protect forests and trees! Pests like the invasive Buy locally harvested firewood at emerald ash borer can or near your destination. hitchhike in your firewood. Buy certified heat-treated firewood You can prevent the spread ahead of time, if available. of these damaging insects and diseases by following Gather firewood on site when these firewood tips: permitted. What might be in your firewood? GYPSY MOTH is a devastati ng pest SPOTTED LANTERNFLY sucks sap from of oaks and other trees. Female dozens of tree and plant species. This pest moths lay tan patches of eggs on loves tree-of-heaven but will feed on black fi rewood, campers, vehicles, pati o walnut, white oak, sycamore, and grape. furniture — anything outside! When Like the gypsy moth, this pest lays clusters these items are moved to new areas, of eggs on just about any dry surface, from this pest gets a free ride. landscaping stone to fi rewood! ASIAN LONGHORNED BEETLE will EMERALD ASH BORER — the infamous tunnel through, and destroy, over killer of ash trees — is found in forests 20 species of trees — especially and city trees across much of the eastern maple trees. The larvae of this and central United States. This insect is beetle bore into tree branches and notoriously good at hitching rides in infested trunks, making it an easy pest to fi rewood. Don’t give this tree-killing bug a accidentally transport in fi rewood.
    [Show full text]
  • Elements of Satire and Irony in the Major Works of George Orwell
    ELEMENTS OF SATIRE AND IRONY IN THE MAJOR WORKS OF GEORGE ORWELL ABSTRACT \ THESIS SUBMITTED FOR THE AWARD OF THE DEGREE OF JBottor of $I)iIo£(opt)p \ : IN ENGLISH V / BY JAWED S. AHMED DEPARTMENT OF ENGLISH ALIGARH MUSLIM UNIVERSITY ALIGARH (INDIA) 2004 .-^•Tb NoT^43.i\?rf Chapter- I: Introduction This chapter explores the English writers' mindset especially during 1920's and 1930's and the background against which they were writing. In this chapter the history of satire has been explored right from the time of Persius, Horace and Juvenal - all considered to be classical masters of satire. Chaucer and Langland also find mention here as they too are renowned in this genre. The Age of Restoration in England was the age of political satire and both Dryden and Pope stand out as towering figures. Swift too holds a special position for his generalized satire. The sole objective of the satirists can rightly be said to correct the vices of society. George Orwell, too set out to highlight the discrepancies in the political system out of a sense of concern for diluting the power of evil in the world of politics. And at the end of the day, we find that he succeeds to a very great extent in expressing his socio-political views, and his commitment to bring about a radical change for the betterment of society. Chapter- II: Social and Political Baclcground In this chapter the causes of Orwell's all-round disillusionment are explored. His experiences are traced beginning with St. Cyprian's, then his bitter experiences as a police officer in Burma; after that his life in Paris and London and Spain.
    [Show full text]
  • Journal of Irish and Scottish Studies After the Homecoming
    Journal of Irish and Scottish Studies Volume 5: Issue 2 After the Homecoming AHRC Centre for Irish and Scottish Studies, University of Aberdeen JOURNAL OF IRISH AND SCOTTISH STUDIES Volume 5, Issue 2 Spring 2012 After the Homecoming Published by the AHRC Centre for Irish and Scottish Studies at the University of Aberdeen in association with The universities of the The Irish-Scottish Academic Initiative ISSN 1753-2396 Printed and bound in Great Britain by CPI Antony Rowe, Chippenham and Eastbourne Journal of Irish and Scottish Studies General Editor: Cairns Craig Issue Editor: Michael Brown Editorial Advisory Board: Fran Brearton, Queen’s University, Belfast Eleanor Bell, University of Strathclyde Ewen Cameron, University of Edinburgh Sean Connolly, Queen’s University, Belfast Patrick Crotty, University of Aberdeen David Dickson, Trinity College, Dublin T. M. Devine, University of Edinburgh David Dumville, University of Aberdeen Aaron Kelly, University of Edinburgh Edna Longley, Queen’s University, Belfast Shane Alcobia-Murphy, University of Aberdeen Ian Campbell Ross, Trinity College, Dublin Graham Walker, Queen’s University, Belfast International Advisory Board: Don Akenson, Queen’s University, Kingston Tom Brooking, University of Otago Keith Dixon, Université Lumière Lyon 2 Marjorie Howes, Boston College H. Gustav Klaus, University of Rostock Peter Kuch, University of Otago Graeme Morton, University of Guelph Brad Patterson, Victoria University, Wellington Matthew Wickman, Brigham Young David Wilson, University of Toronto The Journal
    [Show full text]
  • Virtual Futures for Design, Construction & Procurement
    P1: SFK/RPW P2: SFK/RPW QC: SFK/RPW T1: SFK BLUK143-FM BLUK143-Brandon January 18, 2008 10:30 Virtual Futures for Design, Construction & Procurement i P1: SFK/RPW P2: SFK/RPW QC: SFK/RPW T1: SFK BLUK143-FM BLUK143-Brandon January 18, 2008 10:30 ii P1: SFK/RPW P2: SFK/RPW QC: SFK/RPW T1: SFK BLUK143-FM BLUK143-Brandon January 18, 2008 10:30 Virtual Futures for Design, Construction & Procurement Edited by Peter Brandon Director of Salford University Think Lab and Centre for Virtual Environment and Director Strategic Programmes School of the Built Environment University of Salford, UK Tuba Kocaturk¨ Coordinator of Digital Design Programmes in Architecture Co-chair FFD International (IASS) School of the Built Environment University of Salford, UK Foreword by William J. Mitchell Massachusetts Institute of Technology iii P1: SFK/RPW P2: SFK/RPW QC: SFK/RPW T1: SFK BLUK143-FM BLUK143-Brandon January 18, 2008 10:30 c 2008 by Blackwell Publishing Ltd Blackwell Publishing editorial offices: Blackwell Science Ltd, 9600 Garsington Road, Oxford OX4 2DQ, UK Tel: +44 (0) 1865 776868 Blackwell Publishing Inc., 350 Main Street, Malden, MA 02148-5020, USA Tel: +1 781 388 8250 Blackwell Science Asia Pty Ltd, 550 Swanston Street, Carlton, Victoria 3053, Australia Tel: +61 (0)3 8359 1011 The right of the Author to be identified as the Author of this Work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.
    [Show full text]
  • We Love Big Brother: an Analysis of the Relationship Between Orwell's Nineteen Eighty-Four and Modern Politics in the United S
    University of Connecticut OpenCommons@UConn Honors Scholar Theses Honors Scholar Program Spring 5-4-2018 We Love Big Brother: An Analysis of the Relationship between Orwell’s Nineteen Eighty- Four And Modern Politics in the United States and Europe Edward Pankowski [email protected] Follow this and additional works at: https://opencommons.uconn.edu/srhonors_theses Part of the Literature in English, North America Commons, and the Political Theory Commons Recommended Citation Pankowski, Edward, "We Love Big Brother: An Analysis of the Relationship between Orwell’s Nineteen Eighty-Four And Modern Politics in the United States and Europe" (2018). Honors Scholar Theses. 559. https://opencommons.uconn.edu/srhonors_theses/559 We Love Big Brother: An Analysis of the Relationship between Orwell’s Nineteen Eighty-Four And Modern Politics in the United States and Europe By Edward Pankowski Professor Jennifer Sterling-Folker Thesis Adviser: Professor Sarah Winter 5/4/2018 POLS 4497W Abstract: In recent months since the election of Donald Trump to the Presidency of the United States in November 2016, George Orwell’s Nineteen Eighty-Four has seen a resurgence in sales, and terms invented by Orwell or brought about by his work, such as “Orwellian,” have re- entered the popular discourse. This is not a new phenomenon, however, as Nineteen Eighty-Four has had a unique impact on each of the generations that have read it, and the impact has stretched across racial, ethnic, political, and gender lines. This thesis project will examine the critical, popular, and scholarly reception of Nineteen Eighty-Four since its publication 1949. Reviewers’ and commentators’ references common ideas, themes, and settings from the novel will be tracked using narrative theory concepts in order to map out an understanding of how the interpretations of the novel changed over time relative to major events in both American and Pankowski 1 world history.
    [Show full text]
  • COUVERTURE Ok.Indd
    Haras Abolengo 1 Withdrawn 1 Blushing Groom Red God Candy Stripes Bubble Company Lyphard EQUAL STRIPES Equalize Northern Jove COORDINA TODO Equity Elysee El Gran Capitan Filly - Chesnut Cryptoclearance Fappiano 16 September 2017 Ride The Rails Herbalesian Herbager COORDINADA Ringaro Caro 2002 Coqueterie Croquignole El Califa EQUAL STRIPES, 1999. Winner of the Stakes Sire List in 2018. Sire of 17 G1 Winners, inc.: COOPTADO [Champion], GAMUZA FINA [Champion], CARE LADY [Mare of the Year], PAULINHO [Champion], KEANE [Champion], BLUES TRAVELER [G1], POSITIVE MIND [G1], SCHOOLMISTRESS [G1], NICHOLAS [G1], FOR THE TOP [G1], SHYSTER [G1], COORDENADA [G1], GRAN ENZO [G1], FOGGY STRIPES [G1], BALOMPIE [G1], etc. 1st dam COORDINADA [f. Ride The Rails]. Unraced, Half sister to COQUELIZE [G1]. Dam of COOPTADO [c. Equal Stripes], Champion 3 Y-Old”, winner of 3 races at Palermo at 3 y-old, including Gran Premio Nacional [G1], Clásico Miguel Cané [G2], 2nd Gran Premio Polla de Potrillos [G1], Gran Premio Jockey Club [G1], then winner in Dubai in The Entisar [UAE-L], tambien winner of 3 races in Singapore, Singapore Gold Cup [SGP-1], 2nd Queen Elizabeth II Cup [SGP-1], Causeway Classic Stakes [SGP-3]; in USA, winner of the Tenacious Stakes [USA]. COORDENADA [f. Equal Stripes], winner of 2 races at 2 y-old at Palermo, including Gran Premio Estrellas Juvenile Fillies [G1]. Dam of: CONSPIRADA [f. Lizard Island], winner of 2 races at 3 y-old at San Isidro. COOPERADOR [c. Equal Stripes], winner of 2 races at 3 y-old, at Maroñas. 2nd dam COQUETERIE [f. Ringaro]. Winner at Palermo, half sister to PEINADORA.
    [Show full text]
  • Jornal Do Turfe Completa 26 Anos Na Semana De Seu Leilão De Coberturas
    Edição Nacional Ano 27 - Nº 1.355 - 6 de Abril de 2021 Distribuição Gratuita JORNAL DO TURFE COMPLETA 26 ANOS NA SEMANA DE SEU LEILÃO DE COBERTURAS Remate acontecerá nesta quinta-feira, 8, com transmissão pela TV Jockey/www.tvleilao.net é reconhecida e forte, apoia- O comando do martelo Marcos Rizzon da pelos criadores e proprie- estará a cargo do José Luis tários etc. Lobo e conta com o apoio do Parece que foi ontem. O Mas aqui é tudo diferente. Amarildo Silva e seu site JORNAL DO TURFE nasceu Temos que agradecer nossos www.horsesales.com.br, sendo impresso em Cachoei- patrocinadores (cada vez em onde você poderá dar seu pré- ra do Sul, depois em Gravataí menor número), nossos cola- lance até as 18h desta e, hoje, por causa da pande- boradores e a vocês nossos quinta. A partir das 20h, pela mia, estamos circulando digi- leitores. TV Jockey e www.tvleilao. talmente, alcançando se- O JT possui hoje três ar- net (Dorival Conde Jr.) você manalmente 9 mil pessoas recadações e a menor de poderá, além de assistir, dar por whatsapp, 3 mil por e- todas é o patrocínio mensal. seu lance e colaborar com mail, além de estarmos mun- O que nos garante é uma pro- este periódico. dialmente no www.jornaldo- moção anual e o nosso Lei- Muito obrigado a to- turfe.com.br. lão de Coberturas que che- dos que participaram O turfe em todo o mundo ga nesta quinta-feira, 8 de destes 26 anos de cami- está dando certo, a imprensa abril, a sua 24ª Edição.
    [Show full text]
  • MISCELLANEOUS NOTICES/HEARINGS Notice of Abandoned Property ENTITY NAME: TRI-STAR DEVELOPMENT GROUP, INC
    MISCELLANEOUS NOTICES/HEARINGS Notice of Abandoned Property ENTITY NAME: TRI-STAR DEVELOPMENT GROUP, INC. Received by the State Comptroller REINSTATE: 01/06/12 DIS BY PROC: 01/28/09 Pursuant to provisions of the Abandoned Property Law and related laws, the Office of the State Comptroller receives unclaimed monies COUNTY: BRONX and other property deemed abandoned. A list of the names and last known addresses of the entitled owners of this abandoned property is ENTITY NAME: ADVENTURE COURSES, INC. maintained by the office in accordance with Section 1401 of the REINSTATE: 01/30/12 Abandoned Property Law. Interested parties may inquire if they ap- DIS BY PROC: 10/27/10 pear on the Abandoned Property Listing by contacting the Office of Unclaimed Funds, Monday through Friday from 8:00 a.m. to 4:30 ENTITY NAME: BACK CAB CORP. p.m., at: REINSTATE: 02/16/12 1-800-221-9311 DIS BY PROC: 03/31/82 or visit our web site at: www.osc.state.ny.us ENTITY NAME: BRONXWOOD LAUNDER CENTER CORP. Claims for abandoned property must be filed with the New York REINSTATE: 03/08/12 State Comptroller's Office of Unclaimed Funds as provided in Sec- DIS BY PROC: 01/27/10 tion 1406 of the Abandoned Property Law. For further information contact: Office of the State Comptroller, Office of Unclaimed Funds, ENTITY NAME: CARDIOLOGY UNLIMITED, P.C. 110 State St., Albany, NY 12236. REINSTATE: 02/22/12 NOTICE OF ANNULMENT DIS BY PROC: 04/27/11 OF DISSOLUTION OF ENTITY NAME: EMBARQUE TENARES CORP. CERTAIN BUSINESS CORPORATIONS REINSTATE: 02/14/12 Under the Provisions of Section 203-a of the Tax Law, As Amended DIS BY PROC: 10/27/10 The Secretary of State hereby provides notice that the following corporations, which were duly dissolved in the manner prescribed by ENTITY NAME: FULL CIRCLE BROKERAGE, INC.
    [Show full text]
  • Gran Venta 2019 Gran Venta 2019
    GRAN VENTA S E L E C T A 2019 J U E V E S 2 1 D E M A R Z O , 1 6 h s - S A N I S I D R O TRANSMISION EN VIVO: www.arg-sales.com 2 Estimados Amigos Los Haras Abolengo y Haras Vacación tenemos el placer de invitarlos a nuestra primera venta selecta, con la participación, expertise y auspicio de la reconocida firma internacional ARQANA. La historia de ambos haras está representada por una gran cantidad de campeones nacionales e internacionales en la que, como sus mayores exponentes, se destacan los extraordinarios Candy Ride y Paseana, entre otros. El denominador común es y será el constante esfuerzo y placer que implica criar un sangre pura de carrera, donde ambos priorizamos “la selección“, que entendemos es la base del mejoramiento de la raza. Sin embargo, en el turf todo es materia opinable, un caballo bien criado, con un buen pedigree y el irreemplazable aporte de un peón vareador, galopador, herrero, veterinario, entrenador y jockey puede tener como resultado el tan deseado campeón o no. Desde hace unos años nuestros haras han coordinado sus ventas anuales. En Mayo de 2017, por intermedio de Diego Zavaleta y Matias Villamil, conocimos a Eric Hoyeau, Presidente de Arqana. A partir de esa reunión empezamos a trabajar en objetivos concre- tos a mediano y largo plazo. - Tener una fecha reconocida en el calendario mundial donde se comercialicen los mejo- res potrillos y potrancas Argentinos y, eventualmente en el futuro, de la región. -Promover la industria del turf, dada su reconocida importancia social y la calidad indis- cutible de los caballos que se crían en nuestro país.
    [Show full text]