{ZENITH LOTTERY}YOUR EMAIL ID HAS WON

Inserito da 19 Agosto, 2010 (0) Commenti

Si tratta di :English Articles,hoaxes

only a scam

 

REF NO: MSW/56B-672GH/EA
BATCH NO: 4583JL/WIN/IDS
LUCKY NO:10/23/44/72/80
Ticket NO:4-18-19-30-48

PROMOTION DATE: of Aug 14 2010
FROM DESK OF PROMOTION {ZENITH LOTTERY}YOUR EMAIL ID HAS WON 450,000,000.00(FOUR HUNDRED FIFTY THOUSA AND EUROS) in the first
category of our computer ballot email lottery. No ticket was sold but it  is to encourage internet claim your winning, the paying
agent office:

Mr.Frank Dorek
Email:vaginfo@aim.com
Tel:+31-647-226-334

Send the following to the claim departmen:

Full names:
Address:
Age:
Occupation:
Phone/Fax

Please note that you will be required to pay for the issuance of your legal back up and legalization of certificate of deposit document in court, All
winnings must be claimed not later than 14 days

Sincerely Yours,

Gina Borst”Mrs”

Categories : English Articles,hoaxes Tags : , , , , , , , , , , , , , ,

“Saving Grace” Finale Lives Up To Show’s Name

Inserito da 22 Giugno, 2010 (0) Commenti

Si tratta di :news

NEW YORK (CBS) After three seasons “Saving Grace” aired its series finale on Monday night with two back-to-back episodes. The gritty TNT series, starring Oscar-winning actress Holly Hunter as Grace Hanadarko, portrayed a flawed Oklahoma cop with a dark side and a last-chance angel named Earl, played by Leon Rippy. Pictures: Holly Hunter If you came into the final episode thinking it would be a happy, uneventful send-off, think again. Officer Grace didn’t have the happy ending we had hoped for. Her journey was full circle as the series culiminated, with her finally getting the chance to rid the town of one more evil figure, even if it meant losing her life. Grace, for better or worse, dies in the final episode. Did evil win, then? Not so likely. Grace took the final step and her life’s calling in this world was fulfilled. This was her ultimate battle. She may have died trying to prevent another major terrorist plot or a mass-killing of many people, but maybe her rationale is that if she takes her life ,she can save the lives of many other people. So in the end, the show’s title lived up to the final showdown. Grace, although taking her own life, did in fact become the “Saving Grace” for the people around her. And that’s a pretty divine way to go out.

source: http://www.cbsnews.com/8301-31749_162-20008401-10391698.html

Categories : news Tags : , , , , , , , , , , , , , , , , , ,

Super Saver wins 136th Kentucky Derby

Inserito da 2 Maggio, 2010 (0) Commenti

Si tratta di :news

LOUISVILLE, Kentucky (AP)

The starting gate sprung open in the Kentucky Derby, with 19 horses scrambling for position. One jockey knew exactly where he was headed.

Calvin Borel deftly tucked Super Saver along the rail Saturday on a track turned into creamy peanut butter by heavy rain. Once again, he was in his favorite spot, getting a clear path all the way through the goo.

That’s why they call him “Bo-rail” and, for the third time in four years, he took the shortest path to the winner’s circle.

Borel found only one horse in his way, and once he steered Super Saver around front-running Conveyance, another Run for the Roses was his.

The most wide-open Derby in years ended with a sure thing – Borel crossing the finish line and punching the air with this right fist, this time raising it toward a leaden sky.

“I knew nothing was going to run him down,” he said, referring to his bay colt.

The jockey’s magic touch on his home track gave trainer Todd Pletcher his first Derby victory after 24 failures with a 2 1/2-length victory over Ice Box.

“Calvin Borel is a great rider anywhere he goes, but at Churchill Downs he’s even five lengths better,” Pletcher said. “He knows how to ride this track and gets along with his colt beautifully.”

Borel’s ride at his home track nearly duplicated the one he turned in last year aboard 50-1 shot Mine That Bird, except he and Super Saver went off at lower odds and were never in last place.

Now the trio heads to Baltimore for the Preakness on May 15.

“Calvin already said he’s going to win the Triple Crown,” Pletcher said, “so I guess we’d better go there.”

The Triple Crown was last won 32 years ago by Affirmed. The last Derby winner to break from Super Saver’s No. 4 post was 1977 Triple Crown winner Seattle Slew.

Borel almost pulled off his own personal triple last year. Mine That Bird won the Derby, then Borel switched to filly Rachel Alexandra to win the Preakness before going back to Mine That Bird in the Belmont Stakes. They finished third as the 6-5 favorite.

On Saturday, he was confident enough in his colt and his knowledge of the track to take him off the lead in the early going of the 1 1/4-mile race. In all but one of his six previous races, Super Saver had never been farther back than second in the early stages.

Borel knew that strategy wouldn’t work in a 20-horse Derby field on a tiring, sloppy track that had been pelted by heavy rain early in the day. So they hugged the rail in sixth place, while many of his rivals were well off the fence in the muck.

“We all know what he’s going to do,” said Robby Albarado, who finished 14th aboard Dean’s Kitten. “He just does it anyway.”

Said Borel: “I was just taught it’s the shortest way around.”

Super Saver was timed in 2:04.45 as the 8-1 second-choice behind favorite Lookin At Lucky, whose 6-1 odds tied Harlan’s Holiday in 2002 for the longest priced favorite in 136 runnings. He paid $18, $8.80 and $6.

Pletcher let out a whoop and slapped his hands together after his colt crossed the finish line, snapping a skid the Eclipse Award-winning trainer was eager to end. He watched the race alone on TV in the horseman’s lounge near the paddock.

“It will all soak in in a day or two,” he said. “Now that it’s happened, you just kind of don’t know what to feel or say.”

He seemed to have a lock on his first Derby win until expected favorite Eskendereya was withdrawn last weekend with a swollen leg. That left Pletcher with four horses in the race, but none as highly regarded.

His other finishers were: Mission Impazible, ninth; filly Devil May Care, 10th; and Discreetly Mine, 13th.

Pletcher’s only other Triple Crown race victory was in 2007 at Belmont with the filly Rags to Riches. The lack of a Derby win by the 42-year-old former assistant to D. Wayne Lukas was the most glaring omission on his resume and something he was constantly asked about.

It wasn’t for lack of trying.

In 2007, he saddled five in the Derby, with none finishing higher than sixth.

“It’s the one thing that was important to me,” he said. “The one thing I wanted to do while my parents were still here to see it.”

Borel is the first jockey to win three Derbys in four years; Bill Hartack won three from 1960-64.

“Calvin Borel is amazing. He is fearless,” trainer Bob Baffert said. “He takes control of the race, and you have to give him a lot of credit. He’s a great rider.”

Baffert should know. He thought he had his fourth Derby victory in the bag last year until front-running Pioneerof the Nile was overtaken in the stretch by Borel and Mine That Bird.

Baffert’s Lookin At Lucky wound up sixth, clearly compromised by starting on the rail. His other colt, Conveyance, finished 15th after setting the pace for more than three-quarters of a mile.

“I lost all chance at the post position draw when I drew the one,” Baffert said. “I had a bad feeling about it.”

Trained by Nick Zito, Ice Box returned $11.20 and $8. Paddy O’Prado was another neck back in third and paid $7.40 to show.

“I couldn’t get lucky enough to beat Calvin,” said Zito, a two-time winner.

Make Music for Me was fourth, followed by Noble’s Promise, Lookin At Lucky, Dublin, Stately Victor, Mission Impazible, Devil May Care, American Lion and Jackson Bend.

Discreetly Mine was 13th, followed by Dean’s Kitten, Conveyance, Homeboykris, Sidney’s Candy, Line of David, Awesome Act and Backtalk.

The crowd of 155,804 sought shelter early on from the rain, which had stopped by post time, with sun breaking through the clouds.

source :http://msn.foxsports.com/horseracing/story/calvin-borel-rides-super-saver-to-kentucky-derby-win-050110?GT1=39002

Categories : news Tags : , , , , , , , , , , , , , , , , , , , , , ,

5 suggerimenti dal team di Hotmail per difendersi dai messaggi di posta elettronica indesiderati?

Inserito da 29 Ottobre, 2008 (0) Commenti

Si tratta di :Phishing e Truffe

Ritenendo utile questa e-mail proposta dalla Newsletter, pubblico in versione integrale questa E-mail scritta da Microsoft contro il phishing

Gentile utente,

Hotmail è impegnata a difendere la tua posta dai messaggi indesiderati e ogni giorno vengono bloccati oltre 4,5 miliardi di messaggi in tutto il mondo. Disponiamo di un team dedicato che si adopera costantemente per ridurre ed eliminare i messaggi indesiderati dalle caselle di posta di Hotmail.

Recentemente ci è pervenuta una crescente richiesta di verifica della legittimità di messaggi di posta elettronica ricevuti. Abbiamo quindi creato questa guida per aiutare tutti gli utenti di Hotmail a riconoscere i messaggi indesiderati che riescono a eludere i nostri filtri.

1) Diffida dai messaggi che richiedono i tuoi dati personali.
Qualsiasi messaggio di posta in cui sia richiesto il tuo nome, la data di nascita, il codice fiscale, il nome utente e la password di posta elettronica o qualsiasi altro tipo di dato personale, indipendentemente dal mittente, è quasi certamente un messaggio indesiderato.

Se hai motivo di dubitare che un messaggio sia legittimo, non rispondere al messaggio o non selezionare alcun collegamento ipertestuale. Copia e incolla l’URL oppure visita il sito Web della società per ottenere informazioni sui contatti. Non esitare a contattare il canale di supporto della società per confermare la legittimità del messaggio ricevuto.

2) Leggi attentamente i messaggi di posta elettronica che ti sembrano sospetti.
I messaggi che contengono poche parole, errori ortografici o frasi quali “questo non è uno scherzo” oppure “inoltra questo messaggio ai tuoi amici” in genere sono messaggi indesiderati. Talvolta i nomi o marchi delle società sono scritti in modo errato o impreciso, ad esempio, Windows Hotmail anziché Windows Live™ Hotmail.
3) Proteggi la tua password di Hotmail.
Crea una password sicura per l’account di Hotmail utilizzando più di 7 caratteri e utilizzando una combinazione di caratteri maiuscoli e minuscoli, numeri e caratteri speciali, quali i simboli chiocciola (@) o cancelletto (#). È buona norma inoltre modificare la password regolarmente.

Se ricevi una notifica da parte del Supporto tecnico Microsoft che conferma la tua richiesta di modifica della password, ma recentemente non l’hai modificata, significa che qualcuno sta cercando di ottenere l’accesso al tuo account di Hotmail. In questo caso, cambia immediatamente la password. Per modificare la password, visita il sito all’indirizzo http://account.live.com oppure, dall’interno di Hotmail, fai clic su Opzioni, quindi su Visualizza e modifica le informazioni personali. Ti verrà chiesto di eseguire di nuovo l’accesso. Una volta eseguito l’accesso, cerca”Informazioni sulla reimpostazione della password” visualizzata sotto il nome nella parte superiore della finestra. Cambia sia la password che la domanda e la risposta segrete in quanto tutte possono essere state compromesse.

4) Agisci!
Se pensi che qualcuno abbia utilizzato il tuo account di Hotmail, che la pagina di accesso di Windows Live ID sia falsa o se ricevi un messaggio di posta elettronica sospetto che chiede conferma di una modifica di password che non hai autorizzato, cambia immediatamente la password seguendo le istruzioni sopra indicate oppure visita il sito all’indirizzo: http://account.live.com.
5) Aiutaci ad identificare i nuovi messaggi indesiderati.
Se utilizzi la versione completa di Hotmail, puoi selezionare il menu a discesa accanto a “Posta indesiderata”, quindi selezionare “Segnala tentativo di phishing”. In ogni caso non rispondere al mittente del messaggio.
Per ulteriori informazioni sull’argomento, fai clic qui.
Consigliamo vivamente di conservare questo messaggio come riferimento futuro per poter agire correttamente nel caso tu riceva messaggi indesiderati aiutandoci a mantenere sicura e protetta la tua casella di posta.

Distinti saluti,

Il team di Windows Live Hotmail

*Phishing: termine che indica la pratica di attirare persone ignare su un sito Web contraffatto utilizzando messaggi di posta elettronica all’apparenza autentici, talvolta utilizzando il vero logo dell’organizzazione, nel tentativo di appropriarsi di dati personali importanti, quali i numeri delle carte di credito, le password, gli account o altre informazioni.
Categories : Phishing e Truffe Tags : , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

MS Windows Wormable Vulnerability, Out-of-Band Patch Released (MS08-067)

Inserito da 24 Ottobre, 2008 (0) Commenti

Si tratta di :Sicurezza

Threat Type: Malicious Web Site / Malicious Code

Websense® Security LabsTM has received reports of exploits circulating in the wild that take advantage of a serious Windows vulnerability. Microsoft just released an out-of-band patch to address this just hours ago (see MS08-067).

The remote code execution vulnerability is found in netapi32.dll, and carries a severity rating of “Critical” by Microsoft, affecting even fully patched Windows machines. This vulnerability (CVE-2008-4250) allows malicious hackers to write a worm (self-propagating malicious code without need for any user interaction), by crafting a special RPC request. A successful exploitation would result in the complete control of victim machine.

To date, we have seen attacks installing a Trojan (Gimmiv) upon successful exploitation. At the time of this alert, only 25% of 36 anti-virus vendors could detect this malicious code. Blocking TCP ports 139 and 445 at the firewall is only a partial solution because most desktops have file/printer sharing turned on. The out-of-band patch release by Microsoft testifies to the severity of this vulnerability and the urgency for an immediate fix.

Websense is monitoring the development of this attack, and has classified the corresponding Web sites and malicious code that the exploit downloads.

More information:

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250

http://blogs.technet.com/mmpc/archive/2008/10/23/get-protected-now.aspx

http://blogs.technet.com/swi/archive/2008/10/23/More-detail-about-MS08-067.aspx

http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx

Categories : Sicurezza Tags : , , , , , , , , , , , , , , , , , , , , , ,

Vulnerabilita’ in Microsoft Windows Kernel (954211)

Inserito da 23 Ottobre, 2008 (0) Commenti

Si tratta di :Sicurezza

Descrizione del problema

Questo aggiornamento di sicurezza risolve tre vulnerabilita’
relative al Microsoft Kernel.

Le vulnerabilita’ consentono ad un attaccante locale di ottenere
il controllo completo del sistema.
:: Software e Sistemi affetti

Microsoft Windows 2000 SP4

Microsoft Windows XP SP2
Microsoft Windows XP SP3

Microsoft Windows XP Professional x64
Microsoft Windows XP Professional x64 SP2

Microsoft Windows Server 2003 SP1
Microsoft Windows Server 2003 SP2

Microsoft Windows Server 2003 x64
Microsoft Windows Server 2003 x64 SP2

Microsoft Windows Server 2003 per Itanium SP1
Microsoft Windows Server 2003 per Itanium SP2

Microsoft Windows Vista
Microsoft Windows Vista SP1

Microsoft Windows Vista x64
Microsoft Windows Vista x64 SP1

Microsoft Windows Server 2008 per sistemi 32-bit
Microsoft Windows Server 2008 per sistemi x64
Microsoft Windows Server 2008 per sistemi Itanium

:: Impatto

Esecuzione di codice arbritario con privilegi superiori

:: Soluzioni

Applicare la patch segnalata nel bollettino Microsoft MS08061
http://www.microsoft.com/technet/security/Bulletin/MS08061.mspx

:: Riferimenti

Microsoft Security Bulletin MS08061
http://www.microsoft.com/technet/security/Bulletin/MS08061.mspx

FrSirt:
http://www.frsirt.com/english/advisories/2008/2812

Secunia:
http://secunia.com/advisories/32247/

SecurityFocus:
http://www.securityfocus.com/bid/31653

CVE Mitre:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2250
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2251
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2252

Categories : Sicurezza Tags : , , , , , , , , , , , , ,

Vulnerabilita’ in Microsoft Active Directory (957280)

Inserito da 23 Ottobre, 2008 (0) Commenti

Si tratta di :Sicurezza

Descrizione del problema

Questo aggiornamento di sicurezza risolve una vulnerabilita’
nell’implementazione di Active Directory su Microsoft Windows
2000 Server.

La vulnerabilita’ consente da remoto esecuzione di codice
arbitrario se un attaccante ottiene accesso ad una rete affetta.
Questa vulnerabilita’ interessa soltanto i server Microsoft Windows
2000 configurati come domain controller.

:: Software e Sistemi affetti

Microsoft Windows 2000 Server Service Pack 4

:: Impatto

Esecuzione di codice arbritario

:: Soluzioni

Applicare la patch segnalata nel bollettino Microsoft MS08-060
http://www.microsoft.com/technet/security/Bulletin/MS08-060.mspx

:: Riferimenti

Microsoft Security Bulletin MS08-060
http://www.microsoft.com/technet/security/Bulletin/MS08-060.mspx

FrSirt:
http://www.frsirt.com/english/advisories/2008/2821

Secunia:
http://secunia.com/advisories/32242/

SecurityFocus:
http://www.securityfocus.com/bid/31609

CVE Mitre:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4023

Categories : Sicurezza Tags : , , , , , , , , , , , , , , , , , ,

Aggiornamento cumulativo per Internet Explorer (956390)

Inserito da 21 Ottobre, 2008 (0) Commenti

Si tratta di :Sicurezza

Descrizione del problema

Questo aggiornamento di sicurezza risolve sei vulnerabilita’
relative a Microsoft Internet Explorer.

Queste vulnerabilita’ consentono l’intercettazione e la disseminazione
di informazioni oppure l’esecuzione remota di codice arbitrario dopo
aver indotto un utente a visitare siti web malevoli.

Gli account utente configurati con meno privilegi sul sistema
potrebbero essere meno affetti rispetto ad utenti con privilegi di
amministratore.
:: Software e Sistemi affetti

Software:

Microsoft Internet Explorer 5.01 su Microsoft Windows 2000 SP4

Microsoft Internet Explorer 6 SP1 su Microsoft Windows 2000 SP4

Microsoft Internet Explorer 6 su Microsoft Windows XP SP2
Microsoft Internet Explorer 6 su Microsoft Windows XP SP3
Microsoft Internet Explorer 6 su Microsoft XP Professional x64
Microsoft Internet Explorer 6 su Microsoft XP Professional x64 SP2
Microsoft Internet Explorer 6 su Microsoft Windows Server 2003 SP1
Microsoft Internet Explorer 6 su Microsoft Windows Server 2003 SP2
Microsoft Internet Explorer 6 su Microsoft Windows Server 2003 x64
Microsoft Internet Explorer 6 su Microsoft Windows Server 2003 x64 SP2

Microsoft Internet Explorer 7 su Microsoft Windows XP SP2
Microsoft Internet Explorer 7 su Microsoft Windows XP SP3
Microsoft Internet Explorer 7 si Microsoft Windows XP Professional x64
Microsoft Internet Explorer 7 su Microsoft Windows Server 2003 SP1
Microsoft Internet Explorer 7 su Microsoft Windows Server 2003 SP2
Microsoft Internet Explorer 7 su Microsoft Windows Server 2003 x64
Microsoft Internet Explorer 7 su Microsoft Windows Server 2003 x64 SP2
Microsoft Internet Explorer 7 su Microsoft Windows Vista SP0 SP1
Microsoft Internet Explorer 7 su Microsoft Windows Vista x64 SP1
Microsoft Internet Explorer 7 su Microsoft Windows Server 2008

:: Impatto

Accesso ad informazioni sensibili
Accesso al sistema
Esecuzione remota di codice arbritario

:: Soluzioni

Applicare la patch segnalata nel bollettino Microsoft MS08-058
http://www.microsoft.com/technet/security/bulletin/ms08-058.mspx

:: Riferimenti

Microsoft Security Bulletin MS08-058
http://www.microsoft.com/technet/security/bulletin/ms08-058.mspx

FrSirt:
http://www.frsirt.com/english/advisories/2008/2809

SecurityFocus:
http://www.securityfocus.com/bid/29960

CVE Mitre:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2947
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3473
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3474
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3476

Categories : Sicurezza Tags : , , , , , , , , , , , , , , , , , , , , , ,

Vulnerabilita’ in Microsoft Ancillary Function Driver (956803)

Inserito da 19 Ottobre, 2008 (0) Commenti

Si tratta di :Sicurezza

Descrizione del problema

Questo aggiornamento di sicurezza risolve una vulnerabilita’
relativa a Microsoft Ancillary Function Driver.

La vulnerabilita’ consente ad un attaccante locale di ottenere
il controllo completo del sistema.

La vulnerabilita’ consente ad un attaccante locale di ottenere
il controllo completo del sistema.

:: Software e Sistemi affetti

Microsoft Windows XP SP2
Microsoft Windows XP SP3

Microsoft Windows XP Professional x64
Microsoft Windows XP Professional x64 SP2

Microsoft Windows Server 2003 SP1
Microsoft Windows Server 2003 SP2

Microsoft Windows Server 2003 x64
Microsoft Windows Server 2003 x64 SP2

Microsoft Windows Server 2003 per Itanium SP1
Microsoft Windows Server 2003 per Itanium SP2

:: Impatto

Esecuzione di codice arbritario con privilegi superiori

:: Soluzioni

Applicare la patch segnalata nel bollettino Microsoft MS08-066
http://www.microsoft.com/technet/security/Bulletin/MS08-066.mspx

:: Riferimenti

Microsoft Security Bulletin MS08-066
http://www.microsoft.com/technet/security/Bulletin/MS08-066.mspx

FrSirt:
http://www.frsirt.com/english/advisories/2008/2817

Secunia:
http://secunia.com/advisories/32261/

SecurityFocus:
http://www.securityfocus.com/bid/31673

CVE Mitre:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3464

Categories : Sicurezza Tags : , , , , , , , , , , , , , ,