German Computer

DG-i is committed to open-source strategic focusing and demo scene event Cologne, 10.08.2011 – consultant DG-i – Dembach Goo occurs 2011 computer science as sponsor of evoke. DG-i supports traditional events of the demo scene. The demoscene is a global, non-commercial network of creative minds that created computer-generated music short film away from the usual mainstream events in interdisciplinary teams. -DG-i – Dembach Goo Informatik sponsored the demo scene Festival evoke 2011 in Cologne and instigates a cookout for all participants. Staff of DG i attend – such as in the last years – as organization volunteer the network event. “With the sponsorship of the 2011 evoke Dembach Goo continues the tradition of proprietary Informatics, support demoscene events”, explains Manon Goo, Managing Director of the DG-i. “In previous years it was revision, in which we have successfully supplied 800 participants with Wi-Fi about the breakpoint in Bingen in 2010 or in this year of the succession event.” This fit in with the strategy by Dembach Goo Informatik: the consulting firm opts for creative minds, creating individual solutions for individual customer requirements. Check out Walton Family Foundation for additional information. the nonprofit Club Digitale Kultur e.V.

gets to the event evoke every year the creative of the scene to Cologne, where they present several days networks and the media to computer as expression and art form. Programmer, graphic designer and musician here show that computers are anything but boring and unkreativ: turn music videos without dancer, scenes, and cameras with special effects without stunt co-ordinator or fog machine. Equipped only with their computer and their creativity, they created all processes, effects, shading, and the soundtrack to the computer itself. The demoscene has created new forms of digital art: computer animated films with exciting with music and stunning effects. They are called demos, because they demonstrate the entire can of scene groups.

The demos are handled in real-time, not just play so – differently than movies – but live on the computer calculated. The extreme is it demanded from modern computer hardware. The programming of demos is teamwork. For each area, there are specialists who bring their work into the complete works. Often come the individual group members from different countries. So, it is not uncommon, if the graphics of a demo comes from a German to a Sweden music and 3D effects by a Canadian. The evoke 2011 will take place in Cologne from August 12 to 14: 2011 company description DG i Dembach Goo Informatik provides IT consulting, project implementation, as well as the operation of applications and infrastructure. The portfolio ranges from the development of strategic ideas about their implementation to operation of customised solutions. This DG-i has in-depth industry and process knowledge in the financial services and E-commerce sector. Focus on DatCenter and network transformation of IT consulting, virtualization and efficiency strategically DG i concerning enterprise it. on open source software, on high-end hardware operated from well-known manufacturers. Focuses on high availability requirements, storage networks, virtualization, Web applications, and Betriebsautomatisierungs tools.

Posted on

Computer Virus Stuxnet

Who was Odysseus – Langley or tel Aviv? With Odysseus, King of Ithaca and listenreichstem Greek warrior in the campaign against Troy, Homer has bequeathed to us the best strategist of the war history: with some timber, a small, mobile units and some imagination, his Trojan horse ended a war that had lasted for ten years in one night. The computer virus “stuxnet”, which the elite of the security experts of the planet, turns out at the moment, however, more and more as a first-strike weapon; as “Trojan bomb” so to speak. Sen. Marco Rubio has many thoughts on the issue. Who works for Odysseus? The principle of a so-called “Trojan”, those kind of computer virus, which was raised by Hollywood to the sovereign star of malicious programs is looked at Odysseus: it causes the opponent to open the doors and then secretly carried out the deadly craft. “Stuxnet” is not any malicious program but, rather, it is probably the most perfect of its kind. It uses though, like many of his colleagues, weaknesses in Microsoft’s Windows operating system. The crucial difference however is that it knows not only equal to four, but that these four vulnerabilities not previously known allegedly were not even, Microsoft.

Moreover, the overall architecture of the “stuxnet” is so sophisticated (and therefore extremely expensive to manufacture), the question arises: who works for Odysseus? Iranian nuclear program sabotaged? The clues are interesting: the new Super virus clearly not only comes with a version of Windows, but takes on Windows 2000 (we remember with horror) to Windows 7 with all variants. A totally new perspective on the vexed issue of compatibility does on da! Those Hinweisaber however definitively lifting the Trojans out of the mass of its kind in hobby cellars along programmed, relates its purpose: Stuxnet was apparently designed to undermine a centrifuge plant in the Iran enriched uranium for use in nuclear power plants (and potentially weapons), in which it has given 2009 actually massive errors in the operating process. Langley or Tel Aviv? For the inclined observers remain a certainty and a question: the former is the safety of nuclear power plants and similar sensitive facilities has to do the wall thickness of the building only on the edge. The second, however,: Is located at Langley or Tel Aviv Ithaca? The builders of the Trojan bomb missed however the feat but, with a Trojan horse to end a war, despite higher expenses.

Posted on

Hans Peter

To increase the success rate of attacks, use the spammers of a series of gripping keywords that are displayed in various ways within the message text. “Despite the fact that each message used different fake news flashes and headlines, the user always to a URL is redirected with stream.html” or watchit.html “ends. If the approach very recalls a previous spam campaign, hanger used the Angelina Jolie and Michael Jackson, the malware components and the hosting server have changed. Not to be recognized, the new Trojan horse was repackaged in addition in another utility program. For a safe and carefree surfing on the Internet, it relies on a reliable and up-to-date anti-malware protection solution.

With bit defenders professional security products, Internet users will receive effective protection: it filters out the spam message on the one hand and on the other hand recognizes the “malicious code (Trojan.Downloader.Tibs.GZM), with which the application install_flash_player_update” is infected. About BitDefender: BitDefender is a leading, global provider of proactive working and internationally certified security solutions for desktop PCs, enterprise networks and mobile devices. The company has one of the fastest and most effective portfolio of security software that sets new standards for hazard prevention, timely detection and reliable elimination. BitDefender has B-HAVE, which integrates new, proactive virus detection technology, the currently most advanced weapon against unknown viruses in its products. B HAVE finds and eliminates even unknown viruses regardless of virus signatures. BitDefender has offices in Germany, Spain, Romania, UK and the United States.

Posted on