Guadalupi PAGINA 1/93 V

Total Page:16

File Type:pdf, Size:1020Kb

Guadalupi PAGINA 1/93 V Telecommunication Manager 2005-2007 Information Technology Security Solution UTILIZZO DELLE TECNOLOGIE DI SERVER VIRTUALIZATION NELLE PIATTAFORME DI GESTIONE DELLA SICUREZZA Versione e data template DATA Giuseppe Guadalupi PAGINA 1/93 v. 5.1 - 15/06/2007 29/06/2007 Telecommunication Manager 2005-2007 Information Technology Security Solution Indice INDICE..............................................................................................................................................................................2 INDICE DELLE FIGURE............................................................................................................................................... 4 1. PREFAZIONE ..............................................................................................................................................................6 2. L’AZIENDA..................................................................................................................................................................7 2.1 - PROFILO .................................................................................................................................................................. 7 2.2 - TELECOM ITALIA IN BREVE .....................................................................................................................................7 2.2.1 - I numeri del Gruppo (al 31 marzo 2007)........................................................................................................8 2.2.2 - I risultati economici e finanziari (al 31 dicembre 2006) ................................................................................9 2.2.3 - Composizione azionariato (al 31 dicembre 2006)........................................................................................ 10 2.3 - ASSETTO ORGANIZZATIVO .................................................................................................................................... 10 2.3.1 - Funzioni Centrali.......................................................................................................................................... 11 2.3.2 - Operations e Business Unit........................................................................................................................... 12 2.4 - I MECCANISMI DI GOVERNO E DI INTEGRAZIONE DEL GRUPPO ............................................................................... 12 2.5 - COMITATI DI GRUPPO ............................................................................................................................................ 12 3. ORGANIGRAMMA T.TI.SE.SS............................................................................................................................... 14 4. ARGOMENTI TRATTATI....................................................................................................................................... 15 4.1 - FILE SHARING - P2P .............................................................................................................................................. 15 4.1.1 - eDonkey ........................................................................................................................................................ 16 4.1.1.1 - I server ......................................................................................................................................................................16 4.1.1.2 - I client.......................................................................................................................................................................16 4.1.1.3 - Il FileHash ................................................................................................................................................................16 4.1.1.4 - I link eD2K ...............................................................................................................................................................16 4.1.2 - KAD .............................................................................................................................................................. 17 4.1.2.1 - Network protocol ......................................................................................................................................................17 4.1.2.2 - Routing Table ...........................................................................................................................................................17 4.1.2.3 - Contacts ....................................................................................................................................................................18 4.1.2.4 - Bootstrap...................................................................................................................................................................18 4.1.2.5 - Initial handshake.......................................................................................................................................................18 4.1.2.6 - Firewall check...........................................................................................................................................................19 4.1.2.7 - Find buddy................................................................................................................................................................19 4.1.2.8 - Localizzare gli Oggetti..............................................................................................................................................20 4.1.3 - Emule............................................................................................................................................................ 22 4.1.3.1 - Come funzionano i normali programmi P2P.............................................................................................................22 4.1.3.2 - Coda di upload..........................................................................................................................................................23 4.1.3.3 - Collezioni..................................................................................................................................................................23 4.1.3.4 - Commenti .................................................................................................................................................................24 4.1.3.5 - Crediti.......................................................................................................................................................................24 4.1.3.6 - Fonti A4AF...............................................................................................................................................................24 4.1.3.7 - I.C.H. e A.I.C.H........................................................................................................................................................24 4.1.3.8 - Priorità di download..................................................................................................................................................24 4.1.3.9 - Priorità di upload ......................................................................................................................................................25 4.1.3.10 - ID:...........................................................................................................................................................................25 4.1.3.11 - KADEMLIA FIREWALLED:................................................................................................................................26 4.1.4 - Offuscamento del Protocollo ........................................................................................................................ 27 4.1.4.1 - Impostazioni .............................................................................................................................................................27 4.1.4.2 - Interfaccia grafica .....................................................................................................................................................28 4.2 - VMWARE ............................................................................................................................................................... 29 4.2.1 - Soluzione delle problematiche IT.................................................................................................................. 30 4.2.2 - Prodotti e tecnologie..................................................................................................................................... 31 4.2.3 - Concetti base ................................................................................................................................................ 33 4.2.3.1 - Software e procedure di admin .................................................................................................................................35 4.2.3.2 - Resource variable......................................................................................................................................................36 4.2.4 - Template SunSolaris 10 su x86..................................................................................................................... 37 4.2.4.1 - Creazione nuova vmachine .......................................................................................................................................37
Recommended publications
  • Software to Download from File Sharing Sites 10 Best File Sharing Software for Peer to Peer File Sharing
    software to download from file sharing sites 10 Best File Sharing Software for Peer to Peer File Sharing. Sharing files online isn’t that much easy as it should be, especially, if you have large files with size in GBs. Thankfully, we can use P2P (peer-to- peer) file sharing software to easily share files with anyone online of no matter what size. You can easily upload or download TBs of data without any restrictions. P2P file sharing software can be quite handy, but at the same time, they also have some negative points. These p2p file sharing software also host illegal downloads so that it may lead to any action against you. Furthermore, these peer to peer file sharing software are also known to spread viruses and malware; you will have to be careful about downloading too. Top 10 Best File Sharing Software for Peer to Peer File Sharing. There are dozens of P2P file sharing software to choose from, but it is essential to choose the best P2P file sharing software that is safe and features rich. To help you find the best file sharing software for your needs, we have compiled a list of best file sharing software. You can just select the one that seems right for your needs. 1. uTorrent. Even after being acquired by BitTorrent.inc and becoming closed-sourced with ads, uTorrent is still the leader when it comes to P2P file sharing software. Although you need to subscribe for a premium membership to take full advantage of the client, even its free version offers all the required features to upload and download files without limitations.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • Coopviz: Real Time Visualization of Bittorrent Swarm Dynamics
    CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics Stefano Barbieri CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics Master’s Thesis in Computer Engineering Parallel and Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Stefano Barbieri 3rd September 2009 Author Stefano Barbieri 1397052 [email protected] Title CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics MSc presentation September 09, 2009 Graduation Committee dr. ir. D.H.J. Epema (chair) Faculty EEMCS, Delft University of Technology dr. ir. J. Pouwelse (University Supervisor) Faculty EEMCS, Delft University of Technology dr. ir. G. Gaydadjiev (Committee Member:) Faculty EEMCS, Delft University of Technology Abstract Peer to peer networks are only successful when a significant amount of users is willing to share their resources. In order to have highly efficient file sharing sys- tems, each user should upload to the other peers a number of bytes at least equal to the number of bytes he has downloaded from the community. Unfortunately many users show a selfish behavior, refusing to offer their upload bandwidth to other peers, thus limiting the efficiency of the networks. P2P clients implement different mechanisms in order to mitigate this misbehavior and improve cooperation; often, though, these policies are not enough to enforce altruism in peer-to-peer communi- ties. This thesis explores a new mean to stimulate users to give their fair contribu- tion to the P2P community; the final scope is to generate an emergent self-policing system where users take active part in determining the bandwidth allocation poli- cies. This is achieved by means of a graphical interface, CoopViz, that provides users with up-to-date insights into cooperative behavior of peers and allows the latter to vote on each other, showing their appreciation or disapproval.
    [Show full text]
  • Protection and Restriction to the Internet
    Protection and restriction to the internet Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours ( Weekdays: 8:30am to 5pm ) which: o may potentially pose security hazards o result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community o could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am – 9:30pm) or you may access via the wireless@ucti or wireless@APU network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to [email protected] from your university email with the following details: • Restricted website/application
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]
  • Tackling the Illegal Trade in the Digital World
    Cyber-laundering: dirty money digitally laundered- Tackling the illegal trade in the Digital world Graham Butler Special Presentation to the Academy of European Law Budapest – March 2016 Co-funded by the Justice Programme of the European Union 2014-2020 Graham Butler – Chairman Bitek Group of Companies © 2016 Tackling the illegal trade in the Digital world Supporting the Cyber-Security agenda ERA (Academy of European Law) – Lisbon / Trier / Sofia / Brussels Address: Threats to Financial Systems – VoIP, lawful intercept, money laundering CTO (Commonwealth Telecommunications Organisation) London Address: Working group on strategic development for 2016-2020 ITU High level Experts Group – Cybersecurity Agenda – Geneva (United Nations) Address: VoIP and P2P Security – Lawful Intercept ENFSC (European Network Forensic and Security Conference) - Maastricht Address: Risks of P2P in Corporate Networks CTITF (Counter Terrorism Implementation Taskforce) - Seattle Address: Terrorist use of encrypted VoIP/P2P protocols - Skype Norwegian Police Investigation Section - Oslo Address: Next Generation Networks – VoIP Security (fixed and mobile networks) IGF (Internet Governance Forum) – Sharm El Sheikh, Egypt Address: Threats to Carrier Revenues and Government Taxes – VoIP bypass EastWest Institute Working Group on Cybercrime - Brussels / London Working Groups: Global Treaty on Cybersecurity / Combating Online Child Abuse CANTO (Caribbean Association of National Telecoms Org) – Belize / Barbados Address: Reversing Declines in Telecommunications Revenue ICLN (International Criminal Law Network) - The Hague Address: Cybercrime Threats to Financial Systems CIRCAMP (Interpol / Europol) - Brussels Working Groups: Online Child Abuse – The Fight Against illegal Content Graham Butler – President and CEO Bitek © 2013 1 Tackling the illegal trade in the Digital world The evolution of interception - circuit switched networks 1. Threat to National Security 3.
    [Show full text]
  • GAO-05-634 File Sharing Programs: the Use of Peer-To-Peer Networks
    United States Government Accountability Office GAO Report to Congressional Requesters May 2005 FILE SHARING PROGRAMS The Use of Peer-to-Peer Networks to Access Pornography a GAO-05-634 May 2005 FILE SHARING PROGRAMS Accountability Integrity Reliability Highlights The Use of Peer-to-Peer Networks to Highlights of GAO-05-634, a report to Access Pornography congressional requesters Why GAO Did This Study What GAO Found Peer-to-peer (P2P) file sharing According to three popular file sharing Web sites, 134 P2P programs are programs represent a major change available to the public. Of those programs, Warez, Kazaa, and Morpheus in the way Internet users find and were among the most popular, as of February 2005. exchange information. The increasingly popular P2P programs Pornographic images are easily shared and accessed on the three P2P allow direct communication between computer users who can programs we tested—Warez, Kazaa, and Morpheus. Juveniles continue to be access and share digital music, at risk of inadvertent exposure to pornographic images when using P2P images, and video files. These programs. programs are known for having the functionality to share copyrighted Two of the three P2P programs—Kazaa and Morpheus—provided filters digital music and movies, and they intended to block access to objectionable material, but the effectiveness of are also a conduit for sharing the filters varied. Warez did not provide a filter. The filters provided by pornographic images and videos. Kazaa and Morpheus functioned differently: Kazaa filtered words found in Regarding these uses of P2P titles or metadata (data associated with the files that contain descriptive programs, GAO was asked to, information), while Morpheus required the user to enter the specific words among other things to be filtered.
    [Show full text]
  • Web 2.0 Enabled Classroom
    7/16/2010 Agenda Market Evolution and Trends Where to Begin Web Questions?2.0 Enabled Introduction to Unified Performance Management Case Studies Classroom © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 1 7/16/2010 Exinda at a Glance Founded in 2002 Melbourne based Leading provider of WAN optimization solutions Privately held with venture capital financing Market Evolution Over 3,000 customers Questions? Several thousand appliances deployed in 40+ countries & Trends Worldwide distribution © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 2 7/16/2010 Market Evolution & Trends Market Evolution & Trends Top five bandwidth heavy websites were: 1. YouTube – 10% of all bandwidth used 2. Facebook – 4.5% 3. Windows Update – 3.3% “On average, 37% of network capacity has 4. Yimg (Yahoo!'s image server) – 2.7% been occupied by traffic that is not business- 5. Google – 2.5% critical.” - Aberdeen Group, “Application Performance Management: When 250 IT managers were asked about their biggest Getting IT on the C-Level Agenda”, March 2009 security concerns, the top answer was "employees using applications on social networks" while at work. Source: Network Box, 20th April, 2010 © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 3 7/16/2010 Market Evolution & Trends Market Evolution & Trends The Council of Australian University Directors Australia Is Social Networking Capital Of The World of Information Technology (CAUDIT) have TELEGRAPH.CO.UK - Mar 3 - According to Nielsen, indicated that traffic is typically doubling Australia's web users are at the forefront of the social networking craze, posting, poking and every nine months (250 per cent a year).
    [Show full text]
  • Matérialité Et Travail Institutionnel Des Consommateurs. Le Cas De L’Industrie De La Musique Enregistrée Face À La ”Dématérialisation” (1994-2014) Anne Vancaelemont
    Matérialité et travail institutionnel des consommateurs. Le cas de l’industrie de la musique enregistrée face à la ”dématérialisation” (1994-2014) Anne Vancaelemont To cite this version: Anne Vancaelemont. Matérialité et travail institutionnel des consommateurs. Le cas de l’industrie de la musique enregistrée face à la ”dématérialisation” (1994-2014). Gestion et management. Université Paris sciences et lettres, 2016. Français. NNT : 2016PSLED039. tel-01526687 HAL Id: tel-01526687 https://tel.archives-ouvertes.fr/tel-01526687 Submitted on 23 May 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE DE DOCTORAT de l’Université de recherche Paris Sciences et Lettres PSL Research University Préparée à l’Université Paris-Dauphine Matérialité et travail institutionnel des consommateurs Le cas de l’industrie de la musique enregistrée en France face à la « dématérialisation » (1994-2014) École Doctorale de Dauphine — ED 543 Spécialité Sciences de gestion COMPOSITION DU JURY : Isabelle HUAULT Professeure, Université Paris Dauphine Directrice de thèse François-Xavier de VAUJANY Professeur, Université Paris Dauphine Président du jury Eva BOXENBAUM Professeure, Ecole des Mines Paristech Rapporteure Philippe MONIN Professeur, EM Lyon Rapporteur Soutenue le 5 déc. 2016 Gazi ISLAM par Anne VANCAELEMONT Professeur associé, Grenoble EM Membre du jury Dirigée par Isabelle HUAULT L’Université n’entend donner aucune approbation ni improbation aux opinions émises dans les thèses : ces opinions doivent être considérées comme propres à leurs auteurs.
    [Show full text]
  • Limewire Case Study
    MARYLAND STATE POLICE COMPUTER FORENSICS LABORATORY MDSP-CFL2006 DIGITAL MEDIA ANALYSIS OF GNUTELLA PEER-TO-PEER NETWORKS LIMEWIRE CASE STUDY David B. Heslep Detective Sergeant DO NOT DISSEMINATE WITHOUT THE EXPRESS PERMISSION OF THE AUTHOR Copyright © 2006, David B. Heslep, All Rights Reserved MDSP-CFL 2006 Gnutella Peer-to-Peer Networks: Limewire D/Sgt. David Heslep 2 of 32 6/13/2006 Contents TITLE - Digital Media Analysis – Gnutella Peer-to-Peer Networks: Limewire................................3 Introduction.........................................................................................................................................3 Intended Audience..............................................................................................................................3 Goals and Objectives .........................................................................................................................3 The Gnutella Protocol.........................................................................................................................4 Gnutella Descriptors ...............................................................................................................4 Handshaking .....................................................................................................................................5 Gnutella Handshake ...............................................................................................................5 Ultrapeer Handshaking......................................................................................................................6
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, on page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for October 1, 2018. Protocol / Client Client Version Group Classification Supported from Application Release ABSCBN ABSCBN 7.1.2 Streaming Streaming-video ADC Plugin (Android) 2.28.990 Unclassified ABSCBN (iOS) 10.3.3 ABSCBN (Web) — Peer-to-Peer Protocol and Application Detection Support 1 Peer-to-Peer Protocol and Application Detection Support New in this Release Protocol / Client Client Version Group Classification Supported from Application Release Smashcast Smashcast 1.0.13 Streaming
    [Show full text]
  • These Vancaelemont 2016 Anonyme
    THÈSE DE DOCTORAT de l’Université de recherche Paris Sciences et Lettres PSL Research University Préparée à l’Université Paris-Dauphine Matérialité et travail institutionnel des consommateurs Le cas de l’industrie de la musique enregistrée en France face à la « dématérialisation » (1994-2014) École Doctorale de Dauphine — ED 543 Spécialité Sciences de gestion COMPOSITION DU JURY : Isabelle HUAULT Professeure, Université Paris Dauphine Directrice de thèse François-Xavier de VAUJANY Professeur, Université Paris Dauphine Président du jury Eva BOXENBAUM Professeure, Ecole des Mines Paristech Rapporteure Philippe MONIN Professeur, EM Lyon Rapporteur Soutenue le 5 déc. 2016 Gazi ISLAM par Anne VANCAELEMONT Professeur associé, Grenoble EM Membre du jury Dirigée par Isabelle HUAULT L’Université n’entend donner aucune approbation ni improbation aux opinions émises dans les thèses : ces opinions doivent être considérées comme propres à leurs auteurs. 1 2 Matérialité et travail institutionnel des consommateurs Le cas de l’industrie de la musique enregistrée en France face à la « dématérialisation » (1994-2014) Anne Vancaelemont Sous la Direction de Isabelle Huault REMERCIEMENTS …………………………………………………………………………..…. 5 TABLE DES MATIERES …………………………………………………………………………. 8 INTRODUCTION ……………………………………………………………………..……….. 17 PREMIERE PARTIE : CADRE CONCEPTUEL CHAPITRE 1 : APPREHENDER L'ACTION DU CONSOMMATEUR ……………………………….. 31 CHAPITRE 2 : PRENDRE EN CONSIDERATION LA MATERIALITE ……………………..………… 55 CHAPITRE 3 : PROBLEMATISATION ET PROBLEMATIQUE ………………………………….….
    [Show full text]