Former countries of the East block behind the Iron wall are still trying to develop better laws to serve their citizens. Sometimes from this struggle are comming results that will make your hair grey in young age. Slovakia, for example, is trying to make an amendment to the Health care Act .
What has health care to do with Zone-H? Let me explain you.
As lekvar in his blog on community website blackhole.sk stated: “George Orwell has been finally beaten…”. In the proposed amendment there is great part talking about building “National registers and ascertainings with list of personal data, purpose of usage and perimeter of affected persons”. Strange name, that is covering national databases of persons with specific diseases, their disease’s progress, personal data…
Today security industry is as interesting as never before and people are into it for different reasons. Some of us are into it because of endless opportunity to learn, some are because that special knowledge can gain them fame, then there are people with malicious intentions, and finally there are people doing it for cash.
While its not our job to tell you who is bad and who is not we often think about future of this “business”. Researching takes up time, and time is cash, it also require knowledge and experience.
But is the talent and as we called it before — special knowledge — really required in security?
Zone-h is starting the new mirror that will cover the whole Arab community: arab.zone-h.org. It will be officially announced at the 3. ICT Security Forum in Damascus, Syria, that will happen on July 30th-31-th, 2007.
Zone-H will start to bring it’s training programs to the Arab community. The first training sessions will be soon announced, and will be held in Damascus in cooperation with Platinum Inc..
Those who are interested in collaborating with Zone-H editorial staff can write to the worldwide mirror manager minor () , Arabic mirror managers Bassel Hamideh and Iyadh Houshi or Halfmoon () , the coordinator of Zone-H international programs and business opportunities.
Subject: cyber crime
Length article: 25 lines sheet A4 format
Digital article: word
Publication Area: IT SEC News
Author: first name last name /nick name
Policy Zone-H In order to send an article it is necessary be a registered user. Each article shall be controlled by Zone-H staff, it can be approved/not approved; offensive sentences, photos, comments shall also be cancelled. In case of substantial changes within the article received, zone-h staff undertakes to share with the author the updating of article for its next release. It is also necessary to indicate the source of the information (e.g. extract/cited by..) even if partial.If the article is interesting, the zone-h staff shall ask the author for a disclaimer.It is understood that:
- Article Rights shall be granted for free, only the publication of the name/nickname author’s shall be guaranteed
- Zone-h can use the Article for any reproduction and/or reprint in any form and technology
- All contents and photographs, which will be provided, must be lawfully used, as the ownership and the contents must not infringe the rights of third parties.
Sending the Article to firstname.lastname@example.org implies the acceptance of above conditions.
iPhone from Apple is for many a masterpiece. It has WiFi, screen that turns when you turn the phone. It has so many wonderful features, that also Steve Wozniak would make it to his primary number, and really, on first day were approx. 200 000 pieces sold.
But soon after releasing iPhone to public, many researchers tried to make their own research, one disassembled it, another one smashed the new iPhone against the ground. And, there are lot of researchers that took a look on operating system.