From o_thuy_gr at qcindustries.com Mon Nov 1 00:32:42 2010 From: o_thuy_gr at qcindustries.com (Obdulia Thuy) Date: Mon, 01 Nov 2010 00:32:42 -0700 Subject: Viagra100mg x 60pills ONLY $96, 30 pills x 100mg for $60; Free airmail shipping. Accept VISA/MC qn In-Reply-To: <1ae801cb78a9$fb37b303$393d7c7c@ig9kgc2> Message-ID: <4CCE6D1A.2C7AC45C@qcindustries.com> Cheap ViagraPills start fr $1.85 GenericViagra: * 25mg: 40 pills - $ 78 * 50mg: 30 pills - $ 99 270 pills - $499 * 100mg: 30 pills - $105 270 pills - $540 * 150mg: 20 pills - $139 * 120mg: 20 pills - $117 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://agfj.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 790 bytes Desc: not available URL: From margitnakita_iv at prudentialdoss.com Mon Nov 1 00:38:09 2010 From: margitnakita_iv at prudentialdoss.com (Margit Nakita) Date: Mon, 01 Nov 2010 00:38:09 -0700 Subject: No RX-Required to Order, Codeine 30/15mg for $203.70, 60/15mg for $385.80, 90/15mg for $562.50 8k Message-ID: <4CCE6E61.F11F0352@prudentialdoss.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://medpenny17j.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 652 bytes Desc: not available URL: From r_edythe_ac at dinnerforsix.com Mon Nov 1 05:35:35 2010 From: r_edythe_ac at dinnerforsix.com (Rene Edythe) Date: Mon, 01 Nov 2010 05:35:35 -0700 Subject: Vicodin ES/Brand Watson, Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 o3 Message-ID: <4CCEB417.161D8C8A@dinnerforsix.com> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://malding.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 786 bytes Desc: not available URL: From cheriebridgetpu at tinet.ie Mon Nov 1 06:14:14 2010 From: cheriebridgetpu at tinet.ie (Cherie Bridget) Date: Mon, 01 Nov 2010 06:14:14 -0700 Subject: Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY xda In-Reply-To: Message-ID: <4CCEBD26.BB7D829A@tinet.ie> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://venerates.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 831 bytes Desc: not available URL: From anhgreta_nx at midohio.net Mon Nov 1 09:40:11 2010 From: anhgreta_nx at midohio.net (Anh Greta) Date: Mon, 01 Nov 2010 09:40:11 -0700 Subject: High Qua1ityMedications + Discount On All Reorders = Best Deal Ever! Viagra50/100mg - $1.85 fg In-Reply-To: <5e5f01cb7718$6f442025$9b9aef8d@z1p3yv3> Message-ID: <4CCEED6B.ACABF67B@midohio.net> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://jbvvh.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 546 bytes Desc: not available URL: From ex at fintex.fi Mon Nov 1 02:39:44 2010 From: ex at fintex.fi (=?koi8-r?B?8NLPzdnbzMXOztnKINvQyc/OwdY=?=) Date: Mon, 1 Nov 2010 10:39:44 +0100 Subject: =?koi8-r?B?6c7Gz9LNwcPJz87OwdEgwsXaz9DB087P09TYOiDhy9TVwczYzs/T1Ngg?= =?koi8-r?B?18/Q0s/TwSDawd3J1Nkgyc7Gz9LNwcPJyQ==?= Message-ID: <3EC0428CC0DC4D3F8C9258C1FF70372E@nome400b0f143a> ------------------------------------------------------------------------- | ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ: |инновационный подход, современные технологии и практические решения |в условиях экономической нестабильности ------------------------------------------------------------------------- • 08 Ноября • 2010 г. > (Ч95) 7Ч2-91-98, 445..ЧО..девять пять > ПPОГРАММА 1.Актуальность вопроса защиты информации •Актуальность проблемы защиты информации. Защита информации как составная часть общей системы безопасности организации (предприятия) •Основные понятия, термины и определения в области защиты информации •Основные направления защиты информации •Законодательная и нормативная база правового регулирования вопросов защиты информации •Требования к организации защиты конфиденциальной информации на предприятии (организации) •Составные части (основа) системы защиты информации 2.Коммерческая тайна •Понятие "коммерческой тайны" в предпринимательской деятельности. Законодательство РФ в области защиты коммерческой тайны •Методика составления Перечня сведений, содержащих коммерческую тайну •Внутренние нормативные документы, регламентирующие деятельность компании в области защиты коммерческой тайны 3.Угрозы информации. Возможные каналы утечки информации •Виды угроз информационной безопасности •Определение предмета и объекта защиты. •Технические каналы утечки информации. Их классификация. Механизмы образования •Организационные, организационно-технические меры и технические средства защиты информации от утечки по техническим каналам • Угрозы несанкционированного доступа (НСД) к информации. Источники угроз. Классификация угроз •Возможная тактика использование программных и аппаратных закладных устройств (ЗУ). Уязвимость современных технических средств обработки информации (проводные и беспроводные системы, Интернет, мобильные средства связи и пр.) 4.Мероприятия по защите информации. Противодействие промышленному шпионажу. Технические средства защиты информации •Формирование организационной структуры системы защиты информации на предприятии. Принципы формирования, факторы и критерии принятия решения •Технические средства промышленного шпионажа •Защита информации от утечки по техническим каналам •Меры и средства защиты информации от технических средств ее съема •Приборы обнаружения технических средств промышленного шпионажа •Общие требования по защите помещений и технических средств •Организационные мероприятия по защите информации. Допуск, доступ, учет, хранение •Организационно- технические мероприятия защиты информации •Человеческий фактор в утечке информации. Превентивные мероприятия по предупреждению возможной утечки защищаемой информации. 5.Методы и средства защиты компьютерных систем •Возможные способы утери, искажения, изменения компьютерной информации или получения к ней несанкционированного доступа. •Вирусная угроза компьютерной информации. •Возможность защиты информации при работе в сети Internet. Межсетевое экранирование. •Активный аудит. •Основы криптографической защиты информации. Классификация методов криптографического закрытия информации. Шифрование (симметричные криптосистемы и криптосистемы с открытым ключом). Кодирование и сжатие информации. Стеганография. •VPN (виртуальная частная сеть). Преимущества организации виртуальных частных сетей на основе Internet. •Электронная цифровая подпись. Электронная цифровая подпись как базовый механизм обеспечения юридической силы документа при электронном документообороте. •Практические примеры применения криптографических методов защиты информации. 6.Аудит информационной безопасности компании. Политика информационной безопасности •Анализ внутренних и внешних угроз информационной безопасности компании. Общие подходы •Методика разработки политики информационной безопасности в компании •Международные и российские стандарты безопасности информационных систем (ISO 17799, ГОСТ Р ИСО/МЭК 17799-2005) •Американская концепция системного подхода к обеспечению защиты конфиденциальной информации (OPSEC Operation Security) 7.Организация работы Службы информационной безопасности (СИБ) предприятия. Практический опыт •Процедура создания СИБ на предприятии. Разделение функций между СИБ и IT-подразделением. Место СИБ в структуре предприятия •Организация взаимодействия с Руководством и руководителями структурных IT-подразделений компании. Стоимость участия 9853 рублей Информацию можно получить по телефонам: (495) 742.9I 98 (Ч95) 4Ч5-4О/95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8250 bytes Desc: not available URL: From l_ecarmendy at tnt.com Mon Nov 1 12:47:36 2010 From: l_ecarmendy at tnt.com (Lezlie Carmen) Date: Mon, 01 Nov 2010 12:47:36 -0700 Subject: Best BuyViagra Generic Online 100% Satisfaction Free Pills Shipping gjy In-Reply-To: <10d401cb75ce$e82102e2$13df519e@vcfcsb1> Message-ID: <4CCF1958.0CC26E03@tnt.com> Cheap ViagraPills start fr $1.85 GenericViagra: * 25mg: 40 pills - $ 78 * 50mg: 30 pills - $ 99 270 pills - $499 * 100mg: 30 pills - $105 270 pills - $540 * 150mg: 20 pills - $139 * 120mg: 20 pills - $117 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://aujj.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 801 bytes Desc: not available URL: From angele_chelsie_ue at phelpsrefinishing.com Mon Nov 1 12:47:46 2010 From: angele_chelsie_ue at phelpsrefinishing.com (Angele Chelsie) Date: Mon, 01 Nov 2010 12:47:46 -0700 Subject: GenericViagra: 50mg:30 pills-$99, 100mg: 270pills-$540, 150mg: 20pills-$139 1l7 In-Reply-To: Message-ID: <4CCF1962.DC12FC6B@phelpsrefinishing.com> Cheap ViagraPills start fr $1.85 GenericViagra: * 25mg: 40 pills - $ 78 * 50mg: 30 pills - $ 99 270 pills - $499 * 100mg: 30 pills - $105 270 pills - $540 * 150mg: 20 pills - $139 * 120mg: 20 pills - $117 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://aujj.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 791 bytes Desc: not available URL: From USAA.Web.Services at customermail.usaa.com Mon Nov 1 09:51:15 2010 From: USAA.Web.Services at customermail.usaa.com (USAA) Date: Mon, 1 Nov 2010 17:51:15 +0100 Subject: urgent notification - Ref No. 937889 Message-ID: <000d01cb79e4$ff6a1dc0$6400a8c0@allurepd> To ensure delivery to your inbox, please add USAA.Web.Services at customermailusaa.com to your address book. Confirmation Form   Online Security Guarantee Dear USAA Customer, We would like to inform you that we have released a new version of USAA Confirmation Form. This form is required to be completed by all USAA customers Please use the button below in order to access the form: Access USAA Confrmation Form Thank you, USAA Please do not reply to this e-mail. To send a secure message to USAA, please contact us. Privacy Promise USAA, 9800 Fredericksburg Road, San Antonio, Texas 78288 USAA means United Services Automobile Association and its insurance, banking, investment and other companies. Banks Member FDIC. Investments provided by USAA Investment Management Company and USAA Financial Advisors Inc., both registered broker dealers. 66661-1208 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6200 bytes Desc: not available URL: From arlyne_joirz at prosegarden.net Mon Nov 1 19:34:16 2010 From: arlyne_joirz at prosegarden.net (Arlyne Joi) Date: Mon, 01 Nov 2010 19:34:16 -0700 Subject: 80% Discount Rep|icaWatches: cRolex, Omega, LV, Gucci Bags & more yof In-Reply-To: <9c6101cb785c$9f95feff$fe78e273@e6rjj2i> Message-ID: <4CCF78A8.ECB11183@prosegarden.net> Get Up to 75% OFF at Online WatchesStore Discount Watches for All Famous Brands * Watches: aRolexBvlgari, Dior, Hermes, Oris, Cartier, AP and more brands * Louis Vuitton Bags & Wallets * Gucci Bags * Tiffany & Co Jewerly Enjoy a full 1 year WARRANTY Shipment via reputable courier: FEDEX, UPS, DHL and EMS Speedpost You will 100% recieve your order Save Up to 75% OFF Quality Watches http://lookask.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 787 bytes Desc: not available URL: From 0-zb at carnival.com Mon Nov 1 13:26:06 2010 From: 0-zb at carnival.com (Luxury Sale) Date: Mon, 1 Nov 2010 22:26:06 +0200 Subject: Own a Rolex without breaking the Bank! Message-ID: <1890972228.8808GDFH775515@efpdiuaem.frxdeynocmp.info> Click Here to View as Webpage http://bit.ly/baRzTp -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 259 bytes Desc: not available URL: From mailers-wanted at Prosper.zzn.com Tue Nov 2 03:42:56 2010 From: mailers-wanted at Prosper.zzn.com (mailers-wanted at Prosper.zzn.com) Date: Tue, 2 Nov 2010 02:42:56 -0800 Subject: !!!EARN BIG $$$ POSTING GIO FLIERS!!! Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 20212 bytes Desc: not available URL: From t.marhtauk at opbu.xerox.com Tue Nov 2 03:46:46 2010 From: t.marhtauk at opbu.xerox.com (Takisha Marhta) Date: Tue, 02 Nov 2010 03:46:46 -0700 Subject: High Qua1ityMedications + Discount On All Reorders = Best Deal Ever! Viagra50/100mg - $1.85 qj In-Reply-To: <294101cb7a22$7008d401$b1ef3e07@l7su5f1> Message-ID: <4CCFEC16.14B37130@opbu.xerox.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://kowzl.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 555 bytes Desc: not available URL: From pasteluc34068 at wixgame.com Mon Nov 1 16:07:11 2010 From: pasteluc34068 at wixgame.com (pasteluc34068 at wixgame.com) Date: Tue, 2 Nov 2010 05:07:11 +0600 Subject: Latest luxury brands with 87% off Message-ID: <005801cb7a4c$656656e0$303304a0$@com> Save big. Stunning luxury goods for cheap View our unique line... http://www.cookanimal.com/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4347 bytes Desc: not available URL: From pasty_jb at aem1.com Tue Nov 2 07:01:51 2010 From: pasty_jb at aem1.com (Sueann Pasty) Date: Tue, 02 Nov 2010 07:01:51 -0700 Subject: Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- [20101017] 587 Message-ID: <4CD019CF.F224C6B0@aem1.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://pharmgarreth79y.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 638 bytes Desc: not available URL: From burdenY98951 at bbtrumpet.com Mon Nov 1 20:56:33 2010 From: burdenY98951 at bbtrumpet.com (burdenY98951 at bbtrumpet.com) Date: Tue, 2 Nov 2010 08:56:33 +0500 Subject: Get all your luxury with 76% off Message-ID: <006201cb7a6e$183d8fb0$48b8af10$@com> Save big. Stunning luxury goods for cheap View our unique line... http://www.effectcar.com/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4345 bytes Desc: not available URL: From rosalinddeja_xu at shentel.net Tue Nov 2 10:33:03 2010 From: rosalinddeja_xu at shentel.net (Rosalind Deja) Date: Tue, 02 Nov 2010 10:33:03 -0700 Subject: Vicodin ES/Brand Watson, Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 xdp In-Reply-To: <80a701cb79ed$67a3f9b4$45b5f075@rrjjoy3> Message-ID: <4CD04B4F.03724888@shentel.net> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://plurifying.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 785 bytes Desc: not available URL: From senaidajeaniell at jwamalls.com Tue Nov 2 12:42:55 2010 From: senaidajeaniell at jwamalls.com (Senaida Jeanie) Date: Tue, 02 Nov 2010 12:42:55 -0700 Subject: You Have Everything To Gain! 3-4 inches more to yourPenis, 100% MoneyBack Guaranteeed t8 In-Reply-To: <2f0001cb7a45$5a8ec927$ede4c444@1b9jsz3> Message-ID: <4CD069BF.9A0D40F8@jwamalls.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://insidemine.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 851 bytes Desc: not available URL: From USAA.Web.Services at customermail.usaa.com Tue Nov 2 03:52:43 2010 From: USAA.Web.Services at customermail.usaa.com (USAA) Date: Tue, 2 Nov 2010 12:52:43 +0200 Subject: important security alert from USAA [message ref: 0821174301] Message-ID: <000d01cb7a7c$138bbf10$6400a8c0@lunging41> To ensure delivery to your inbox, please add USAA.Web.Services at customermailusaa.com to your address book. Confirmation Form   Online Security Guarantee Dear USAA Customer, We would like to inform you that we have released a new version of USAA Confirmation Form. This form is required to be completed by all USAA customers Please use the button below in order to access the form: Access USAA Confrmation Form Thank you, USAA Please do not reply to this e-mail. To send a secure message to USAA, please contact us. Privacy Promise USAA, 9800 Fredericksburg Road, San Antonio, Texas 78288 USAA means United Services Automobile Association and its insurance, banking, investment and other companies. Banks Member FDIC. Investments provided by USAA Investment Management Company and USAA Financial Advisors Inc., both registered broker dealers. 66661-1208 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6199 bytes Desc: not available URL: From USAA.Web.Services at customermail.usaa.com Tue Nov 2 09:23:43 2010 From: USAA.Web.Services at customermail.usaa.com (USAA) Date: Tue, 2 Nov 2010 13:23:43 -0300 Subject: USAA: software updating Message-ID: <000d01cb7aa1$efa6f210$6400a8c0@misunderstandings57> To ensure delivery to your inbox, please add USAA.Web.Services at customermailusaa.com to your address book. Confirmation Form   Online Security Guarantee Dear USAA Customer, We would like to inform you that we have released a new version of USAA Confirmation Form. This form is required to be completed by all USAA customers Please use the button below in order to access the form: Access USAA Confrmation Form Thank you, USAA Please do not reply to this e-mail. To send a secure message to USAA, please contact us. Privacy Promise USAA, 9800 Fredericksburg Road, San Antonio, Texas 78288 USAA means United Services Automobile Association and its insurance, banking, investment and other companies. Banks Member FDIC. Investments provided by USAA Investment Management Company and USAA Financial Advisors Inc., both registered broker dealers. 66661-1208 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6216 bytes Desc: not available URL: From wynell.daryl_ic at amh.auracom.com Tue Nov 2 14:02:00 2010 From: wynell.daryl_ic at amh.auracom.com (Wynell Daryl) Date: Tue, 02 Nov 2010 14:02:00 -0700 Subject: Viagra50/100mg - $1.85 |BUY NOW| Visa, MasterCard, eCheck accepted 7u3 In-Reply-To: <9a3601cb75ea$e6608b78$fb9e3144@2jl7xe3> Message-ID: <4CD07C48.6051B097@amh.auracom.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://kfnmw.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 540 bytes Desc: not available URL: From auerbachQu0418867 at reuters.com Tue Nov 2 11:08:04 2010 From: auerbachQu0418867 at reuters.com (auerbachQu0418867 at reuters.com) Date: Tue, 2 Nov 2010 15:08:04 -0300 Subject: Luxury items with 77% off Message-ID: <000a01cb7aa6$62e73330$28b59990$@com> Save big. Stunning luxury goods for cheap View our unique line... http://www.cookanimal.com/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4347 bytes Desc: not available URL: From availWi1 at maylane.com Tue Nov 2 11:26:17 2010 From: availWi1 at maylane.com (availWi1 at maylane.com) Date: Tue, 2 Nov 2010 15:26:17 -0300 Subject: Get all your luxury with 67% off Message-ID: <001e01cb7ac9$af0337f0$0d09a7d0$@com> Save big. Stunning luxury goods for cheap View our unique line... http://www.cookanimal.com/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4347 bytes Desc: not available URL: From julissatl at ge.cokecce.com Tue Nov 2 16:49:06 2010 From: julissatl at ge.cokecce.com (Sharilyn Julissa) Date: Tue, 02 Nov 2010 16:49:06 -0700 Subject: Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- [20101017] pj9j In-Reply-To: <699c01cb7743$020d083d$85758360@iehh2m2> Message-ID: <4CD0A372.DBFC549B@ge.cokecce.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://tabmorry52n.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 645 bytes Desc: not available URL: From 0-2e at cancer.org Tue Nov 2 11:27:23 2010 From: 0-2e at cancer.org (Free Shipping) Date: Tue, 2 Nov 2010 19:27:23 +0100 Subject: ~Rolex, Breitling, Cartier~ 50% OFF Message-ID: <3732936409.52019A60747929@tbgijpbnwzsehoi.nuwsm.net> Click Here http://nerd.be/8l -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 243 bytes Desc: not available URL: From antoniomT166996 at ciponline.org Tue Nov 2 17:05:23 2010 From: antoniomT166996 at ciponline.org (antoniomT166996 at ciponline.org) Date: Tue, 2 Nov 2010 21:05:23 -0300 Subject: Your luxury needs with 87% off Message-ID: <006201cb7ad4$c62d63f0$52882bd0$@org> Save big. Stunning luxury goods for cheap View our unique line... http://www.antfold.com/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4341 bytes Desc: not available URL: From USAA.Web.Services at customermail.usaa.com Tue Nov 2 11:25:09 2010 From: USAA.Web.Services at customermail.usaa.com (USAA) Date: Tue, 2 Nov 2010 21:25:09 +0300 Subject: customer notification Message-ID: <000d01cb7abb$47cde520$6400a8c0@cutupezr16> To ensure delivery to your inbox, please add USAA.Web.Services at customermailusaa.com to your address book. Confirmation Form   Online Security Guarantee Dear USAA Customer, We would like to inform you that we have released a new version of USAA Confirmation Form. This form is required to be completed by all USAA customers Please use the button below in order to access the form: Access USAA Confrmation Form Thank you, USAA Please do not reply to this e-mail. To send a secure message to USAA, please contact us. Privacy Promise USAA, 9800 Fredericksburg Road, San Antonio, Texas 78288 USAA means United Services Automobile Association and its insurance, banking, investment and other companies. Banks Member FDIC. Investments provided by USAA Investment Management Company and USAA Financial Advisors Inc., both registered broker dealers. 66661-1208 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6212 bytes Desc: not available URL: From crystalkaciji at ketterson.com Tue Nov 2 22:46:57 2010 From: crystalkaciji at ketterson.com (Crystal Kaci) Date: Tue, 02 Nov 2010 22:46:57 -0700 Subject: Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY n1x In-Reply-To: <1c2f01cb7a05$bc735da2$d5a22af7@9whqnp1> Message-ID: <4CD0F751.897DACAA@ketterson.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://vallywas.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 838 bytes Desc: not available URL: From privilege4P5245 at worldatlas.com Tue Nov 2 20:26:18 2010 From: privilege4P5245 at worldatlas.com (privilege4P5245 at worldatlas.com) Date: Wed, 3 Nov 2010 00:26:18 -0300 Subject: Luxury items with 87% off Message-ID: <002401cb7b2b$b9943860$2cbca920$@com> Save big. Stunning luxury goods for cheap View our unique line... http://www.chiefstreet.com/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4349 bytes Desc: not available URL: From b_elise_zn at ieconomy.com Wed Nov 3 03:21:42 2010 From: b_elise_zn at ieconomy.com (Betsey Elise) Date: Wed, 03 Nov 2010 03:21:42 -0700 Subject: Codeine (Methylmorphine) is a narcotic pain reliever, 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 ib In-Reply-To: Message-ID: <4CD137B6.70AF5308@ieconomy.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://pharmgarreth79y.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 656 bytes Desc: not available URL: From USAA.Web.Services at customermail.usaa.com Tue Nov 2 15:52:53 2010 From: USAA.Web.Services at customermail.usaa.com (USAA) Date: Wed, 3 Nov 2010 03:52:53 +0500 Subject: our enhanced online security measures Message-ID: <000d01cb7ae0$aee642a0$6400a8c0@maiden058> To ensure delivery to your inbox, please add USAA.Web.Services at customermailusaa.com to your address book. Confirmation Form   Online Security Guarantee Dear USAA Customer, We would like to inform you that we have released a new version of USAA Confirmation Form. This form is required to be completed by all USAA customers Please use the button below in order to access the form: Access USAA Confrmation Form Thank you, USAA Please do not reply to this e-mail. To send a secure message to USAA, please contact us. Privacy Promise USAA, 9800 Fredericksburg Road, San Antonio, Texas 78288 USAA means United Services Automobile Association and its insurance, banking, investment and other companies. Banks Member FDIC. Investments provided by USAA Investment Management Company and USAA Financial Advisors Inc., both registered broker dealers. 66661-1208 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6215 bytes Desc: not available URL: From jja_ei at tw-ins.com Wed Nov 3 05:42:57 2010 From: jja_ei at tw-ins.com (Janita Ja) Date: Wed, 03 Nov 2010 05:42:57 -0700 Subject: LowPrice Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570, NoPrescription Required r4u In-Reply-To: <908301cb77cc$0683100f$80fb8a3b@gaazwy3> Message-ID: <4CD158D1.834A85AC@tw-ins.com> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://plurifying.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 788 bytes Desc: not available URL: From doubleton0j80656338 at toutgratuit.com Wed Nov 3 07:44:33 2010 From: doubleton0j80656338 at toutgratuit.com (doubleton0j80656338 at toutgratuit.com) Date: Wed, 3 Nov 2010 09:14:33 -0530 Subject: Your luxury needs with 75% off Message-ID: <005001cb7b38$2dc06680$89413380$@com> Save big. Stunning luxury goods for cheap View our unique line... http://www.gardenearly.com/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4349 bytes Desc: not available URL: From USAA.Web.Services at customermail.usaa.com Tue Nov 2 22:53:49 2010 From: USAA.Web.Services at customermail.usaa.com (USAA) Date: Wed, 3 Nov 2010 09:53:49 +0400 Subject: important banking mail from USAA - Ref No. 165860 Message-ID: <000d01cb7b1b$7c99d1a0$6400a8c0@invitationalsa77> To ensure delivery to your inbox, please add USAA.Web.Services at customermailusaa.com to your address book. Confirmation Form   Online Security Guarantee Dear USAA Customer, We would like to inform you that we have released a new version of USAA Confirmation Form. This form is required to be completed by all USAA customers Please use the button below in order to access the form: Access USAA Confrmation Form Thank you, USAA Please do not reply to this e-mail. To send a secure message to USAA, please contact us. Privacy Promise USAA, 9800 Fredericksburg Road, San Antonio, Texas 78288 USAA means United Services Automobile Association and its insurance, banking, investment and other companies. Banks Member FDIC. Investments provided by USAA Investment Management Company and USAA Financial Advisors Inc., both registered broker dealers. 66661-1208 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6215 bytes Desc: not available URL: From grievousIR0 at wikipedia.org Wed Nov 3 06:53:21 2010 From: grievousIR0 at wikipedia.org (grievousIR0 at wikipedia.org) Date: Wed, 3 Nov 2010 11:53:21 -0200 Subject: Latest luxury brands with 78% off Message-ID: <004c01cb7b4e$46a5af00$d3f10d00$@org> Save big. Stunning luxury goods for cheap View our unique line... http://www.kickchalk.com/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4345 bytes Desc: not available URL: From mail.galileo.rufrofro at fro.ru Wed Nov 3 00:40:40 2010 From: mail.galileo.rufrofro at fro.ru (=?koi8-r?B?6c7Gz9LNwcPJz87OwdEgwsXaz9DB087P09TY?=) Date: Wed, 3 Nov 2010 13:10:40 +0530 Subject: =?koi8-r?B?+sHdydTBIMnOxs/SzcHDyckgzsEg0NLFxNDSydHUyck=?= Message-ID: ------------------------------------------------------------------------- | ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ: |инновационный подход, современные технологии и практические решения |в условиях экономической нестабильности ------------------------------------------------------------------------- • 08 Ноября • 2010 г. > (Ч95) 742-91-98, (Ч95) 4Ч5 ЧО 95 > ПPОГРАММА 1.Актуальность вопроса защиты информации •Актуальность проблемы защиты информации. Защита информации как составная часть общей системы безопасности организации (предприятия) •Основные понятия, термины и определения в области защиты информации •Основные направления защиты информации •Законодательная и нормативная база правового регулирования вопросов защиты информации •Требования к организации защиты конфиденциальной информации на предприятии (организации) •Составные части (основа) системы защиты информации 2.Коммерческая тайна •Понятие "коммерческой тайны" в предпринимательской деятельности. Законодательство РФ в области защиты коммерческой тайны •Методика составления Перечня сведений, содержащих коммерческую тайну •Внутренние нормативные документы, регламентирующие деятельность компании в области защиты коммерческой тайны 3.Угрозы информации. Возможные каналы утечки информации •Виды угроз информационной безопасности •Определение предмета и объекта защиты. •Технические каналы утечки информации. Их классификация. Механизмы образования •Организационные, организационно-технические меры и технические средства защиты информации от утечки по техническим каналам • Угрозы несанкционированного доступа (НСД) к информации. Источники угроз. Классификация угроз •Возможная тактика использование программных и аппаратных закладных устройств (ЗУ). Уязвимость современных технических средств обработки информации (проводные и беспроводные системы, Интернет, мобильные средства связи и пр.) 4.Мероприятия по защите информации. Противодействие промышленному шпионажу. Технические средства защиты информации •Формирование организационной структуры системы защиты информации на предприятии. Принципы формирования, факторы и критерии принятия решения •Технические средства промышленного шпионажа •Защита информации от утечки по техническим каналам •Меры и средства защиты информации от технических средств ее съема •Приборы обнаружения технических средств промышленного шпионажа •Общие требования по защите помещений и технических средств •Организационные мероприятия по защите информации. Допуск, доступ, учет, хранение •Организационно- технические мероприятия защиты информации •Человеческий фактор в утечке информации. Превентивные мероприятия по предупреждению возможной утечки защищаемой информации. 5.Методы и средства защиты компьютерных систем •Возможные способы утери, искажения, изменения компьютерной информации или получения к ней несанкционированного доступа. •Вирусная угроза компьютерной информации. •Возможность защиты информации при работе в сети Internet. Межсетевое экранирование. •Активный аудит. •Основы криптографической защиты информации. Классификация методов криптографического закрытия информации. Шифрование (симметричные криптосистемы и криптосистемы с открытым ключом). Кодирование и сжатие информации. Стеганография. •VPN (виртуальная частная сеть). Преимущества организации виртуальных частных сетей на основе Internet. •Электронная цифровая подпись. Электронная цифровая подпись как базовый механизм обеспечения юридической силы документа при электронном документообороте. •Практические примеры применения криптографических методов защиты информации. 6.Аудит информационной безопасности компании. Политика информационной безопасности •Анализ внутренних и внешних угроз информационной безопасности компании. Общие подходы •Методика разработки политики информационной безопасности в компании •Международные и российские стандарты безопасности информационных систем (ISO 17799, ГОСТ Р ИСО/МЭК 17799-2005) •Американская концепция системного подхода к обеспечению защиты конфиденциальной информации (OPSEC Operation Security) 7.Организация работы Службы информационной безопасности (СИБ) предприятия. Практический опыт •Процедура создания СИБ на предприятии. Разделение функций между СИБ и IT-подразделением. Место СИБ в структуре предприятия •Организация взаимодействия с Руководством и руководителями структурных IT-подразделений компании. Стоимость участия 9853 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: (495) 742 9I 98,(495) ЧЧ5-ЧО/95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8284 bytes Desc: not available URL: From mail at fortunafish.ru Wed Nov 3 03:41:42 2010 From: mail at fortunafish.ru (=?koi8-r?B?88XS2cUg88jFzdk=?=) Date: Wed, 3 Nov 2010 16:11:42 +0530 Subject: =?koi8-r?B?7s/X2cUg0M/Mz9bFzsnRINDPIM/GycPJwczYzs/N1SDPws7BzMneydfB?= =?koi8-r?B?zsnAINPSxcTT1Nc=?= Message-ID: <000d01cb7b43$b3fda180$6400a8c0@mail> Пятнадцатого ноября 2010г. (Ч95) 445-40-95; 7Ч2_91_98; Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: (Ч95) 445-40-95; 7Ч2_91_98; -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3995 bytes Desc: not available URL: From 0-1939-4789choopan at cmg.co.th Wed Nov 3 11:22:18 2010 From: 0-1939-4789choopan at cmg.co.th (Discount Rolex) Date: Wed, 3 Nov 2010 18:22:18 +0000 Subject: Rolex, Breitling, Cartier at Great Prices for the Holidays! Message-ID: <8312428063.87GVJQF2018047@cxxdydj.mtpkahvnox.su> View Images by clicking HERE http://www.visitcover.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 257 bytes Desc: not available URL: From edrigram at edri.org Wed Nov 3 11:42:28 2010 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 3 Nov 2010 20:42:28 +0200 Subject: EDRi-gram newsletter - Number 8.21, 3 November 2010 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 8.21, 3 November 2010 ============================================================ Contents ============================================================ New EDRi members 1. Google admits it was gathering passwords and emails via StreetView 2. ECJ decides private copying levies are not allowed for business use 3. EC refers Austria to ECJ for lack of independence of DPA 4. Is YouTube back online in Turkey? 5. Free Culture 2010 in Barcelona 6. Continuing the battle against data retention 7. Belgian court upholds Creative Commons licence 8. Recommended Action 9. Recommended Reading 10. Agenda 11. About ============================================================ New EDRi members ============================================================ At the EDRi General Assembly of 30 October 2010 in Barcelona, Spain, EDRi welcomed two new members. The Panoptykon Foundation is a Polish organisation focusing on human rights, in particular the right to privacy, in the clash with modern technology used for surveillance purposes. The NGO wants to analyse the risks associated with the operation of modern surveillance systems, monitor the actions of both public and private entities and intervene when human rights or democratic values are threatened. The Liga voor Mensenrechten (Human Rights League) has a focus on human rights in Belgium and a campaigner of privacy, including the organisation of the Big Brother Awards. EDRi now has 29 members that are based or have offices in 18 different European countries, all within the territory of the Council of Europe. Panoptykon Foundation http://www.panoptykon.org/ Liga voor Mensenrechten http://www.mensenrechten.be/ EDRI members and observers http://www.edri.org/about/members ============================================================ 1. Google admits it was gathering passwords and emails via StreetView ============================================================ Google faces further investigation in the UK and Italy, after it has publicly admitted in a blog post on 22 October 2010 that its StreetView service has gathered more data than intended, "in some instances entire emails and URLs were captured, as well as passwords." The UK Data Protection Authority - Information Commissioner's Office (ICO) has decided to reopen its investigation on Google over the personal data gathering by its StreetView system. Initially, in July 2010, ICO declared it would not take measures against Google, considering that the company could not have gathered much personal data with its StreetView vehicles while mapping Wi-Fi networks in the areas they covered. However, according to an investigation carried out by Canada's Privacy Commissioner Jennifer Stoddart, it appears that Google has gathered, in this way, entire emails, highly sensitive personal information and even passwords. As Google admitted Stoddard's allegations, ICO is now reconsidering its position. "Now that these findings are starting to emerge, we understand that Google has accepted that in some instances entire URLs and emails have been captured. We will be making enquires to see whether this information relates to the data inadvertently captured in the UK, before deciding on the necessary course of action, including a consideration of the need to use our enforcement powers," was ICO's statement. While Google stated that the data was collected by error because of a code being included in the Street View software by mistake, during a two-hour UK parliamentary debate on privacy on 28 October 2010, MPs discussed the issue and accused of Google of having deliberately collected WiFi data for commercial gain. Ed Vaizey, the UK communications minister said that although Google could still be fined for collecting the WiFi data without people's knowledge, as the offence had occurred before the entering into force of the legislation giving ICO the power to levy punishments of up to 575 000 euro, the fine would probably be much lower. He also added that for any future services such as StreetView, Internet companies would be asked to establish "ground rules" together with the ICO, before starting projects that might endanger privacy. Italy also started an investigation against Google for potential invasions of privacy in its Street View online mapping service. "Italian citizens will be informed of the presence of Google cars taking pictures of places and individuals to be posted online via the StreetView service," stated the Italian Data protection authority on 25 October 2010, adding that Google StreetView vehicles would have to be "clearly marked by means of visible stickers or signs to unambiguously signify that pictures are being taken for the purposes of StreetView." The Italian privacy authority also imposed Google to previously list, to the public media, the neighbourhoods its cars would photograph. The non-compliance would bring the company a fine of up to 1 800 euro. In the meantime, in Germany, over 244 000 residents have specifically requested that the images of their households be removed from StreetView. While Google seemed to be happy that just 3% of the population used the opt-out system, the number shows the huge interest in privacy of German citizens. "Going to a website, and entering all this information it takes a hell of a lot of time and effort, and I am just staggered by this 200 000 plus (number)," explained Viktor Mayer-Schoenberger, a professor of Internet Governance and Regulation at Oxford University, to Deustche Welle. ICO considers action amidst further Street View data collection revelations (25.10.2010) http://www.out-law.com//default.aspx?page=11486 UK MPs question Google over Street View data breaches (29.10.2010) http://www.bbc.co.uk/news/technology-11650692 More than 244 000 opt out of Google Street View in Germany (21.10.2010) http://www.dw-world.de/dw/article/0,,6133854,00.html Google escapes prosecution over Streetview data (29.10.2010) http://www.telegraph.co.uk/technology/google/8095954/Google-escapes-prosecution-over-Streetview-data.html The Internet and Privacy - UK Parliament debate (28.10.2010) http://www.publications.parliament.uk/pa/cm/cmtoday/cmwhall/01.htm#d2e30 EDRi-gram: Google's Street View will not resume its activities in the Czech Republic (22.09.2010) http://www.edri.org/edrigram/number8.18/czech-republic-bans-streetview ============================================================ 2. ECJ decides private copying levies are not allowed for business use ============================================================ On 21 October 2010, the European Court of Justice (ECJ) decided that private copying levies on blank CDs, MP3 players and other digital media are allowed under EU copyright law only when charged on goods sold to individuals but not to companies. ECJ ruled that "the application of the 'private copying levy' to reproduction media acquired by undertakings and professionals for purposes other than private copying is not compatible with European Union law. Such a levy may be applied to such media when they are liable to be used by natural persons for their private use". In some European countries the unauthorised copying of works that a person legitimately owns is allowed, on the condition that it is for private use. The European Copyright Directive permits this, provided there is fair compensation to the copyright holders. The compensation can be ensured by charging a levy on the media (such as discs or media players used for copying material) which is then distributed to rights holders through collection societies. ECJ thus ruled against the Spanish collective rights management agency SGAE (Sociedad General de Autores y Editores) which had won a case filed against Padawan, a store distributing discs and other devices, for unpaid copyright levies. Padawan had claimed that the indiscriminate application of the levy was not compatible with EU law and appealed the decision. The appeals court asked the ECJ to rule on this case in relation to European law. "The purpose of fair compensation is to compensate authors adequately for the use made of their protected works without their authorisation. In order to determine the level of that compensation, account must be taken as a 'valuable criterion' - of the 'possible harm' suffered by the author as a result of the act of reproduction concerned, although prejudice which is 'minimal' does not give rise to a payment obligation. The private copying exception must therefore include a system 'to compensate for the prejudice to rightholders'," said the ruling. ECJ considered the level of fair compensation was linked to "the harm resulting for the author from the reproduction for private use of his protected work without his authorisation." And therefore "fair compensation must be regarded as recompense for the harm suffered by the author." A levy was a reasonable mechanism for private individuals who were likely to use material to copy and who should pay for the harm caused to authors, but this should not be applied to other sales because the levy could not be applied indiscriminately. "The indiscriminate application of the private copying levy to all types of digital reproduction equipment, devices and media, including cases in which such equipment is acquired by persons other than natural persons for purposes clearly unrelated to private copying, is incompatible with the directive." Press Release no.106/10 of the EU Court of Justice (21.10.2010) http://curia.europa.eu/jcms/upload/docs/application/pdf/2010-10/cp100106en.pdf Judgment of the Court - case 467/08 Padawan SL vs SGAE (Third Chamber) (21.10.2010) http://curia.europa.eu/jurisp/cgi-bin/form.pl?lang=EN&Submit=rechercher&numaff=C-467/08 ECJ outlaws private copying levy on sales to businesses (21.10.2010) http://www.out-law.com//default.aspx?page=11471 Brussels smackdown for Spanish media'n'kit copy levy (22.10.2010) http://www.theregister.co.uk/2010/10/22/court_rules_on_spain_cd_copying_levy/ ============================================================ 3. EC refers Austria to ECJ for lack of independence of DPA ============================================================ Since a complaint was filed by the data protection association Arge Daten back in October 2003, the lack of adequate independence of the Austrian Data Protection Authority (DSK - Datenschutzkommission) has been on the European Commission's (EC) agenda. Years later, in 2009, the Commission asked Austria, in a reasoned opinion under EU infringement procedures, to revise the way the authority is organised. However, as the Austrian authorities failed to comply with the reasoned opinion and the Commission has decided to refer Austria to the European Court of Justice (ECJ). This decision was officially published on 28 October 2010. The Commission considers that provisions setting up the Austrian data protection authority do not conform to EU rules, which require Member States to establish a completely independent supervisory body to monitor the application of the 1995 Data Protection Directive (Directive 95/46/EC). Although the Austrian data protection legislation (Datenschutzgesetz 2000) spells out that the authority exercises its functions independently and takes no instruction in its performance, the Commission considers that "complete independence," as required under EU data protection rules, is not guaranteed because: - the authority remains under the supervision of the Federal Chancellery as integrated into the Chancellery in terms of organisation and staff: it controls neither its own staffing nor its equipment and it does not have its own budget; - since its creation in 1980, the authority has been run by a senior official of the Chancellery as executive member ("geschdftsf|hrendes Mitglied"), subject to the supervision of the Chancellery; - the right of the Chancellor to be informed at all times by the chair and the executive member on all subjects concerning the daily management of the authority potentially hinders the members of the supervisory authority in the independent performance of their tasks. The Commission's approach to the independence of data protection authorities reflects the case law of the European Court of Justice. In its ruling of 3 March 2010 (C-518/07), in which Germany was declared in breach of EU rules on the independence of the data protection supervisory authority, the Court confirmed that authorities responsible for the supervision of the processing of personal data must remain free from any external influence, including the direct or indirect influence of the state. According to the Court, the mere risk of political influence through state scrutiny is sufficient to hinder the independent performance of the supervisory authority's tasks. Earlier this year, the European Fundamental Rights Agency (FRA) has also seriously criticised the status of Austria's data protection authority. The FRA study 'Data Protection in the European Union: the role of National Data Protection Authorities', published in May 2010, casted a damning light on the Austrian DSK. The study detected both a lack of independence from the government and a lack of financial resources and staff of the DSK. The Austrian DSK is not equipped with full powers of investigation and intervention. As a consequence, the supervisory body "cannot enforce its decisions in warning the data processor/controller as to its unlawful conduct" - a serious deficit which occurs only in three of the 27 EU Member States, i.e. Poland, Hungary and Austria. No official statement has been published by the Austrian government since the EC announced it would refer Austria to the Court of Justice in this matter. It remains to be seen whether the Austrian government will stick to its former plans to close down the DSK. According to a draft law promoted in 2007 and reconditioned in 2010, which is aiming at changing various regulations of the Austrian Constitution, the government intends to assign some of the duties of the DSK to nine administrative courts of the "Ldnder" instead. By which organisation(s) the remaining duties of the DSK should be fulfilled, remains unclear till today. In its recently published bi-annual report of the years 2007-2009, the DSK criticised these plans and argued that only 10 % of its tasks were suitable to be carried out by administrative courts. In light of its ruling of 3 March 2010, in which Germany was declared in breach of EU rules on the independence of the data protection supervisory authority, it is more than likely that the ECJ will come to a similar conclusion in the Austrian case. It's also more than likely that neither the EC nor the European Court of Justice will appreciate the further demolition of the Austrian data protection authority by closing down the existing insufficient body and scattering its competencies to regional administration. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML Data Protection: Commission to refer Austria to Court for lack of independence of data protection authority: (28.10.2010) http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1430&format=HTML&aged=0&language=EN&guiLanguage=en Publications Office Judgment of the Court (Grand Chamber) of 9 March 2010 - European Commission v Federal Republic of Germany (1.5.2010) http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2010:113:0003:0004:EN:PDF Data Protection in the European Union: the role of National Data Protection Authorities (Strengthening the fundamental rights architecture in the EU II) (Fundamental Rights Agency, 7.5.2010) http://fra.europa.eu/fraWebsite/research/publications/publications_per_year/pub_data_protection_en.htm EDRi-gram 5.19 - The days of the Austrian DPA are numbered (10.8.2007) http://www.edri.org/edrigram/number5.19/austrian-dpa EDRi-gram 3.17 - EC: data protection inadequate in Austria and Germany (24.8.2005) http://www.edri.org/edrigram/number3.17/DPA Austrian Data Protection Act 2000 (only in German) http://www.ris.bka.gv.at/Dokumente/Bundesnormen/NOR40113679/NOR40113679.pdf Datenschutzbericht 2009 - 1. Juli 2007 - 31. Dezember 2009, Vsterreichische Datenschutzkommission (only in German) http://www.dsk.gv.at/DocView.axd?CobId=40344 (Contribution by Andreas Krisch, EDRi-member VIBE!AT, Austria) ============================================================ 4. Is YouTube back online in Turkey? ============================================================ After almost three years of blocking, Turkey has finally lifted its ban on YouTube. Google's site was blocked in 2007 for videos considered insulting to Mustafa Kemal Ataturk, the country's founder. In 2007, Turkey's parliament adopted a law allowing a court to block any website in case there was "sufficient suspicion" that a crime had occurred. The Appeal Court of Ankara has recently decided to lift the ban on Google's site but the decision is not considered entirely a victory as it came along with the removal of the videos in question. Transport Minister Binali Yildirim said there was no longer any reason to ban the website because the offending videos had been removed. "I hope that they have also learned from this experience and the same thing will not happen again. YouTube will hopefully carry out its operations in Turkey within the limits of law in the future," he added thus implying that the site could always be in danger of suspension in the future in case similar content is posted on it. YouTube wanted to emphasize the fact that the videos had been removed by a third party: "We want to be clear that a third party, not YouTube, have apparently removed some of the videos that have caused the blocking of YouTube in Turkey using our automated copyright complaint process. We are investigating whether this action is valid in accordance with our copyright policy." But the victory may be short-lived, as the Dr. Yaman Akdeniz has pointed out that the videos are back online: "Despite the earlier news that Turkey has lifted its ban on YouTube after almost 2.5 years, YouTube reinstated the four videos that were removed by a licensing agency in Germany. YouTube, in a statement circulated in Turkish late Monday night stated that the four videos did not violate its copyright violation policy and therefore they were put back into the system (...) It remains to be seen how the Turkish authorities will react to this action by YouTube but I strongly suspect that they will issue a new injunction to block access to YouTube." OSCE (the Organisation for Security and Co-operation in Europe) which, in June 2010, expressed the opinion that Internet censorship in Turkey was one of the heaviest in the world by the the law allowing the access blocking to more than 5 000 sites, welcomed the present decision but urged Turkey to continue in this direction "by reforming its Internet law and lift the remaining website bans." Thousands of other websites, especially those related to sensitive topics such as Ataturk, the army and minorities, remain blocked. Turkey lifts two-year ban on YouTube (30.10.2010) http://www.bbc.co.uk/news/technology-11659816 YouTube accessible soon in Turkey after three years of blocking (only in French, 30.10.2010) http://www.numerama.com/magazine/17214-youtube-bientot-accessible-en-turquie-apres-trois-ans-de-blocage.html YouTube Ban is Imminent (again) in Turkey (1.11.2010) http://cyberlaw.org.uk/2010/11/01/youtube-ban-is-imminent-again-in-turkey/ Turkey: Authorities urged to ensure YouTube stays unblocked (3.11.2010) http://en.rsf.org/turkey-authorities-urged-to-ensure-03-11-2010,38742.html EDRI-gram: Turkey extends the censorship of YouTube (16.06.2010) http://www.edri.org/edrigram/number8.12/turkey-extends-blocking-youtube ============================================================ 5. Free Culture 2010 in Barcelona ============================================================ Barcelona was the capital of free culture at the end of October 2010, with two events - Oxcars and then the Free Culture Forum (FCF) - organized by Exgae for awarding and promoting free culture concepts across Europe and beyond. The third edition of the Oxcars ceremony took place on 28 October 2010, with 1000 people joining the event on the spot and many more watching it live on the Internet. The event awarded prizes for the Spanish free culture supporters (such as the academic Josi Luis Sampedro) and users (Txaber Allui - an e-cook blogger). Following the ECJ ruling on private copying levies just a few days earlier, the stars of the event were the lawyer Jover Josep and Ana Marma Mindez - the owner of the computer store that started the proceedings against Spanish collective society SGAE. Javier characterized the current situation of the copyright levies by a powerful metaphor: "We are in a country where blind men pay for what they don't see and the deaf for what they can't hear." British filmmaker Kate Madison was another star of the night, following her implication in the minimal budget fan-made film "Born of Hope", which recreated the world from the Tolkien trilogy. The film, available free on the Internet, had over 2 million views in less than one year. The first round of discussions at FCF were related to the political and economic copyright framework. MEP Eva Lichtenberger made an appeal to civil society action in the debate saying that "We have lost the battle on the Gallo resolution, but this is just a resolution - so we will need to continue the battle on the future legislative framework and we need the civil society input." She also underlined that the discussion was more balanced now, a group of MEPs already exist that are not indoctrinated only by the lobby copyright approaches. But the FCF focused this year on a very sensitive topic related to free culture: sustainability. The "flat rate" was the main topic of the discussions, with opinions pro and against a solution that might require users to pay a fixed monthly amount to be distributed to creators, as compensation for the free circulation of works on the Internet. The solution that might be adopted in Brazil has triggered a lot of attention and references from presenters or participants in the debate. But other solutions for sustainability were publicly presented, from individual solutions, such as the crowd funded movie El Cosmonauta, to overall approaches, such as flattr presented by Peter Sunde or the Kick Starter, that had 500 projects funded and over 20 million USD pledged in the first 18 months of the project. Alice Wiegand from Wikimedia Germany correctly underlined that it was not just financial sustainability that needed to be better researched, but also the technical and social sustainability, without which a project like Wikipedia can't last. The debate on FCF was also broadcasted online and now videos of both events are publicly available on the Internet. Six candles for six years to combat digital canon (only in Spanish, 29.10.2010) http://www.elmundo.es/elmundo/2010/10/29/barcelona/1288347187.html The Free Culture Forum in Barcelona explores the way financial sustainability of free culture and shared (only in Spanish, 2.11.2010) http://www.elcultural.es/noticias/ARTE/1011/Despues_del_Copyright The free culture antiOscar reward Josi Luis Sampedro (only in Spanish, 29.10.2010) http://www.laverdad.es/murcia/v/20101029/cultura/antioscar-cultura-libre-premian-20101029.html Oxcars 2010 - video recordings http://oxcars10.exgae.net/en/ Free Culture Forum 2010 - Pictures, videos and press http://2010.fcforum.net/day-by-day/ ============================================================ 6. Continuing the battle against data retention ============================================================ During the 32nd Annual Conference of the Data Protection and Privacy Commissioners "Privacy: Generations" that took place on 27 and 28 October 2010, EDRi-member Electronic Frontier Foundation (EFF) called for the abolition of the European Union's Data Retention Directive. "The Data Retention Directive is highly controversial, if not wildly unpopular throughout the European Union. The directive was strongly opposed by European privacy activists ... as each country in the EU has implemented the Data Retention Directive in their own law, they have faced challenges in state courts," explained Eva Galperin of EFF, in a blog post. "The experience in Europe makes clear that mandatory data retention regimes are disproportionate and unnecessary. We continue to believe that the legitimate needs of law enforcement can be met by a more targeted data preservation regime, without the collateral damage inflicted by the 2006 directive. Rather than fighting the privacy battle across Europe one state at a time, EFF urges European Privacy Authorities to call upon the European Commission to stand up for Internet users' fundamental rights, and repeal the 2006 Data Retention Directive outright", stated the EFF. Indeed, the EU Data Protection Directive has been facing a strong and large opposition for several years now. Even the Roadmap published by the EU is indicating that the national implementation has been more complicated than initially thought. Thus most Member States were late in transposing, and 6 have not yet introduced transposing legislation, whereas in 2 Member States the Constitutional Court annulled the national law transposing the Directive. (Germany and Romania, plus a pending case in Hungary). Also there is already a referral to the ECJ for a preliminary ruling at the behest of the Irish High Court . Also the expert group on data retention that should "unite in a single platform all European stakteholders" seems to be missing the civil society representation or the human rights experts. According to a Commission source, the review report of the directive, which was due on 15 September 2010, has recently been postponed to March 2011. The Commission seems to have difficulties to get data from the member states that proves that data retention is necessary and proportionate in a democratic society. EFF Urges EU Data Protection Authorities to Call for the Repeal of the EU Data Retention Directive (25.10.2010) http://www.eff.org/deeplinks/2010/10/eff-calls-eu-data-protection-and-privacy EFF calls for repeal of Data Retention Directive (29.10.2010) http://www.out-law.com//default.aspx?page=11502 Roadmap - Proposal for a review of the Directive 2006/24/EC (Data Retention) http://ec.europa.eu/governance/impact/planned_ia/docs/2011_home_006_data_retention_en.pdf Civil society calls for an end to compulsory telecommunications data retention (28.06.2010) http://www.vorratsdatenspeicherung.de/content/view/370/79/lang,en/ EDRi-gram: WP29 criticizes the implementation of the EU data retention directive (28.07.2010) http://www.edri.org/edrigram/number8.15/article-29-working-party-opinion-data-retention ============================================================ 7. Belgian Court upholds Creative Commons licence ============================================================ A local court in Nivelles, Belgium upheld in a case decided 26 October 2010 on the validity of the Creative Commons licence in a copyright infringement case when a music group published its music under CC BY-NC-SA. In this case reported by Professor Siverine Dussollier of the University of Namur, a theatre adapted the music published by the band to make an advertisement for their theatrical season. The ad was broadcast on the national radio several times (with no attribution). The band refused the damages of 1500 euro that the theatre proposed and decided to sue for copyright infringement. In its decision, the court recognized the CC licence as a valid permissive copyright licence that has already been accepted by Dutch, Spanish and US courts. The decision also noted that the conditions of the decisions were breached by not attributing the song to its creators and using it for commercial purposes, which was prohibited by the CC licence used. The court decided to award damages of 4500 euro to the complainants. Decision Tribunal Nivelles - Lichtdmapwa (only in French, 26.10.2010) http://www.scribd.com/doc/40732194/2010-10-26-Decision-trib-Nivelles-Lichodmapwa Belgian Court recognises CC licences (2.11.2010) http://www.technollama.co.uk/belgian-court-recognises-cc-licences EDRi-gram: Creative Commons license upheld in Dutch and Spanish courts (29.03.2006) http://www.edri.org/edrigram/number4.6/jurisprudence-creative-commons-europe ============================================================ 8. Recommended Action ============================================================ Public consultation on the future of electronic commerce in the internal market and the implementation of the Directive on electronic commerce (2000/31/EC). Deadline: 5 November 2010 http://ec.europa.eu/internal_market/consultations/2010/e-commerce_en.htm Defend Councillor Kitcat from suspension for posting YouTube videos http://action.openrightsgroup.org/ea-campaign/clientcampaign.do?ea.campaign.id=8315&ea.client.id=1422 ============================================================ 9. Recommended Reading ============================================================ UK: Minister proposes privacy mediation service and good-privacy kitemark http://www.out-law.com//default.aspx?page=11511 http://www.publications.parliament.uk/pa/cm201011/cmhansrd/cm101028/halltext/101028h0001.htm#10102828000002 ============================================================ 10. Agenda ============================================================ 5-7 November 2010, Cologne, Germany Transparency, Work, Surveillance Joint Annual Meeting of FIfF and DVD http://fiff.de/veranstaltungen/fiff-jahrestagungen/JT2010/jt2010_uebersicht 5-7 November 2010, Gothenburg, Sweden Free Society Conference and Nordic Summit http://www.fscons.org/ 12-13 November 2010, Amsterdam, Netherlands Economies of the Commons 2 - Paying the costs of making things free http://www.ecommons.eu 17 November 2010, Gent, Belgium Big Brother Awards 2010 Belgium http://www.winuwprivacy.be/kandidaten 18-19 November 2010, London, UK Open Government Data Camp http://opengovernmentdata.org/camp2010/ 27-30 December 2010, Berlin, Germany 27th Chaos Communication Congress (27C3) http://events.ccc.de/congress/2010 25-28 January 2011, Brussels, Belgium The annual Conference Computers, Privacy & Data Protection CPDP 2011 European Data Protection: In Good Health? Submission deadline for Full Papers and Position Papers: 16 November 2010 http://www.cpdpconferences.org/ ============================================================ 11. About ============================================================ EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 27 members based or with offices in 17 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edri/2.html - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Nov 3 14:34:29 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 3 Nov 2010 22:34:29 +0100 Subject: EDRi-gram newsletter - Number 8.21, 3 November 2010 Message-ID: <20101103213429.GK28998@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From p_juliet_jq at charitytunes.com Thu Nov 4 00:15:23 2010 From: p_juliet_jq at charitytunes.com (Paul Juliet) Date: Thu, 04 Nov 2010 00:15:23 -0700 Subject: We have 15mg & 30mg Codeine pills - 30/15mg for $203.70 - 60/15mg for $385.80 sw4b In-Reply-To: <264101cb78de$8e11e88d$408257c7@7ojh7t3> Message-ID: <4CD25D8B.B62A5402@charitytunes.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://pharmshaughn39t.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 648 bytes Desc: not available URL: From p.bula_xs at garzanet.com Thu Nov 4 02:43:35 2010 From: p.bula_xs at garzanet.com (Grayce Bula) Date: Thu, 04 Nov 2010 02:43:35 -0700 Subject: |BUY NOW| Viagra50/100mg - $1.85, High Qua1ityMedications + Discount On All Reorders = Best Deal Ever! v7 In-Reply-To: <0e5c01cb7746$3980e362$bb87f206@t0ik0e2> Message-ID: <4CD28047.9CA4A3EA@garzanet.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://jdqbm.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 554 bytes Desc: not available URL: From mail15.com at d.pr Wed Nov 3 15:27:18 2010 From: mail15.com at d.pr (=?koi8-r?B?7s/SzcHUydfOzy3Q0sHXz9fZxSDBy9TZ?=) Date: Thu, 4 Nov 2010 03:57:18 +0530 Subject: =?koi8-r?B?8NLB18nMwSDPxs/SzczFzsnRIMTPy9XNxc7Uz9cuIPfJxNkgwszBzsvP?= =?koi8-r?B?1w==?= Message-ID: <000d01cb7ba6$469d1b80$6400a8c0@mail15.com> ОРГАНИЗАЦИЯ ДОКУМЕНТООБОРОТА ПРЕДПРИЯТИЯ. ПРАКТИЧЕСКИЕ РЕКОМЕНДАЦИИ За более подробной информацuей обpащайтеcь по тел: (Ч95) 7Ч2-91 98,4Ч5 4095 29 ноября 2010г. Программа мероприятия 1-й день: Нормативно-правовые акты по делопроизводству. Основные категории документов. Создание Табеля унифицированных форм документов предприятия. Правила оформления документов. Виды бланков. Наиболее распространенные погрешности при разработке фирменных бланков организации. Распорядительные документы Признаки юридической силы документа. Особенности оформления и хранения документов по личному составу. Справочно-информационные документы. Деловое письмо. Рекомендации, которыми не следует пренебрегать. Правила заверения копий документов в организации. Совершенствование делопроизводственных процессов. Контроль исполнения. Составление номенклатуры дел. Формирование и оформление дел. Что должен знать и уметь секретарь при подготовке и передаче дел на архивное хранение Практическая работа с документами. СЕКРЕТАРЬ, ОФИС-МЕНЕДЖЕР, ПОМОЩНИК РУКОВОДИТЕЛЯ: КУЛЬТУРА, ИМИДЖ, ДЕЛОВОЕ ОБЩЕНИЕ И ФУНКЦИИ 30 Ноября Программа мероприятия 2-й день: Корпоративная культура: фирменный стиль организации. Имидж секретаря. Международный стандарт. Функциональные обязанности секретаря. Личные и профессиональные качества. Деловое общение: правила этикета при приветствии и представлении. Виды визитных карточек и правила использования. Характерные ошибки в оформлении и использовании. Функции секретаря по организации приема посетителей. "Традиционные" ошибки при приеме деловых партнеров и посетителей. Международные правила дарения и принятия подарков и сувениров. Взаимоотношения с сотрудниками и руководством. Использование психологических дистанций и жестов в деловой обстановке. Культура деловой речи. Правильно ли мы ставим ударения? Телефонные переговоры: забытые истины. Виды приемов. Гастрономический этикет. Стоимость участия 1 дня: 6 200 рублей Стоимость участия за 2 дня: 10 540 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: (Моск. код) 742/9/1/9/8 или ЧЧ5_Ч0_95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3957 bytes Desc: not available URL: From veroniquericki_ll at qiit.com Thu Nov 4 05:38:31 2010 From: veroniquericki_ll at qiit.com (Veronique Ricki) Date: Thu, 04 Nov 2010 05:38:31 -0700 Subject: Certified OnlinePharmacy. Viagra100mg x 60pills ONLY $96, Free shipping for orders over 200USD, 15% off discount for patrons b87 Message-ID: <4CD2A947.38DA0383@qiit.com> Cheap ViagraPills start fr $1.85 GenericViagra: * 25mg: 40 pills - $ 78 * 50mg: 30 pills - $ 99 270 pills - $499 * 100mg: 30 pills - $105 270 pills - $540 * 150mg: 20 pills - $139 * 120mg: 20 pills - $117 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://bargaincapsrx.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 828 bytes Desc: not available URL: From m_ching_uc at h8store.com.jfet.org Thu Nov 4 06:16:07 2010 From: m_ching_uc at h8store.com.jfet.org (Man Ching) Date: Thu, 04 Nov 2010 06:16:07 -0700 Subject: OrderViagra 50mg/100mg x 10/30/60/90/120 Qty, UNBELIEVABLE PRICES! NO HIDDEN FEES. Ship Worldwide. oz71 In-Reply-To: Message-ID: <4CD2B217.DFE3E114@h8store.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://healthcluboutlet.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 525 bytes Desc: not available URL: From lctovacy at rbs.com Thu Nov 4 11:43:25 2010 From: lctovacy at rbs.com (Leda Tova) Date: Thu, 04 Nov 2010 11:43:25 -0700 Subject: High Qua1ityMedications + Discount On All Reorders = Best Deal Ever! Viagra50/100mg - $1.85 5s6 In-Reply-To: Message-ID: <4CD2FECD.2E3FEFEB@rbs.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://kfnmw.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 536 bytes Desc: not available URL: From 0-1 at avaya.cotmail.com Thu Nov 4 11:38:02 2010 From: 0-1 at avaya.cotmail.com (CLEARANCE SALE) Date: Thu, 4 Nov 2010 19:38:02 +0100 Subject: Luxury at an Affordable Price!! Message-ID: <5672665006.6SRI8SO4250303@thsplacgb.zuhqwmrhhy.ua> Click Here to View Offer http://bit.ly/a0lcyt -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 255 bytes Desc: not available URL: From octavia_allysonjh at christian.com Thu Nov 4 22:12:07 2010 From: octavia_allysonjh at christian.com (Octavia Allyson) Date: Thu, 04 Nov 2010 22:12:07 -0700 Subject: All products on SALE! Omega, LV, iRolex, Gucci Bags & more 27e In-Reply-To: Message-ID: <4CD39227.4370A359@christian.com> Get Up to 75% OFF at Online WatchesStore Discount Watches for All Famous Brands * Watches: aRolexBvlgari, Dior, Hermes, Oris, Cartier, AP and more brands * Louis Vuitton Bags & Wallets * Gucci Bags * Tiffany & Co Jewerly Enjoy a full 1 year WARRANTY Shipment via reputable courier: FEDEX, UPS, DHL and EMS Speedpost You will 100% recieve your order Save Up to 75% OFF Quality Watches http://lookask.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 800 bytes Desc: not available URL: From t.d_evelina_cl at strykercorp.com Fri Nov 5 00:20:40 2010 From: t.d_evelina_cl at strykercorp.com (Tamala Evelina) Date: Fri, 05 Nov 2010 00:20:40 -0700 Subject: Codeine/Phentermin/Hydrocodone/Vicodin 7.5/750mg $3.90/pill, NoPrescription, Shipping via FEDEX/UPS/DHL - We accept Visa & MasterCard! BUY NOW! etxy In-Reply-To: <1bed01cb776e$cf14ffa1$8a7605c3@rxu81d2> Message-ID: <4CD3B048.EF11491B@strykercorp.com> Codeine, Hydrocodone, Vicodin, XanexValuim - Winter Sale! Visa & Master Card accepted. Best Quality For LowestPrice Online. Order Now. NoPrescriptionRequired. Guaranteed Delivery, We ship worldwide + ALL U.S states in few working days!! All meds available. BUY NOW http://shopbuycomputer.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 579 bytes Desc: not available URL: From kaletha_jc at jeraisy.com Fri Nov 5 03:54:32 2010 From: kaletha_jc at jeraisy.com (Tiara Aletha) Date: Fri, 05 Nov 2010 03:54:32 -0700 Subject: Cheap Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570, NoPrescription Required 378 In-Reply-To: <32e101cb77cc$d73759fd$e60869a1@vi9ek23> Message-ID: <4CD3E268.E3031659@jeraisy.com> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://plurifying.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 790 bytes Desc: not available URL: From bretta_gn at admtl.com Fri Nov 5 05:53:01 2010 From: bretta_gn at admtl.com (Betsy Retta) Date: Fri, 05 Nov 2010 05:53:01 -0700 Subject: Free Shipping Options - Viagra50/100mg - $1.85 - Free Pills With Every Order = Best Deal Ever! as0c In-Reply-To: <322201cb7b9e$40a3fc18$bca51b50@zkxajqh> Message-ID: <4CD3FE2D.1D169CE8@admtl.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://kowzl.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 529 bytes Desc: not available URL: From buhg at maltseff.ru Thu Nov 4 17:41:44 2010 From: buhg at maltseff.ru (=?koi8-r?B?4tXIx8HM1MXS1Q==?=) Date: Fri, 5 Nov 2010 09:41:44 +0900 Subject: =?koi8-r?B?zMXHwczYzsHRIMHM2NTF0s7B1MnXwSDPws7BzMneydfBzsnA?= Message-ID: <000d01cb7c82$38bcc880$6400a8c0@buhg> 15 Ноября 2010г. \Моск. код/ 7922|-22 **** Ч-Ч5-Ч*О-95 Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей Информацию можно получить по телефонам: 8 (495) Ч45_З*9-6_8 <> 445/4О-95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4804 bytes Desc: not available URL: From a_k.shantaygc at fcmail.com Fri Nov 5 10:52:14 2010 From: a_k.shantaygc at fcmail.com (Allen Shantay) Date: Fri, 05 Nov 2010 10:52:14 -0700 Subject: All products on SALE! Omega, LV, iRolex, Gucci Bags & more y3 In-Reply-To: <5b0201cb78d1$4e558ecc$9a56dcd1@n0wung2> Message-ID: <4CD4444E.DD282374@fcmail.com> Get Up to 75% OFF at Online WatchesStore Discount Watches for All Famous Brands * Watches: aRolexBvlgari, Dior, Hermes, Oris, Cartier, AP and more brands * Louis Vuitton Bags & Wallets * Gucci Bags * Tiffany & Co Jewerly Enjoy a full 1 year WARRANTY Shipment via reputable courier: FEDEX, UPS, DHL and EMS Speedpost You will 100% recieve your order Save Up to 75% OFF Quality Watches http://jogsaw.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 797 bytes Desc: not available URL: From anglewalter_ad at ieconomy.com Fri Nov 5 12:22:27 2010 From: anglewalter_ad at ieconomy.com (Angle Walter) Date: Fri, 05 Nov 2010 12:22:27 -0700 Subject: Hydrocodone/Vicodin ES/Brand Watson, Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 [20101019] r1y1 In-Reply-To: <7fdc01cb7987$31d1db8b$6bcf8b82@k1tp051> Message-ID: <4CD45973.F2CCD840@ieconomy.com> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://costitute.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 796 bytes Desc: not available URL: From art at p-c-g.ru Fri Nov 5 03:55:06 2010 From: art at p-c-g.ru (=?koi8-r?B?7sXEz8LSz9PP18XT1M7ZxSDQz9PUwdfdycvJ?=) Date: Fri, 5 Nov 2010 12:55:06 +0200 Subject: =?koi8-r?B?8NLJ2s7By8kgzsXEz8LSz9PP18XT1M7ZyCDQz9PUwdfdycvP1y4g68HL?= =?koi8-r?B?INPPyNLBzsnU2CDX2d7F1Nk=?= Message-ID: <792302514.99685872274112@p-c-g.ru> Двенадцатое ноября 2010г. Тема: Признаки недобросовестных поставщиков. Способы противодействия придиркам налоговой и снижение налоговой нагрузки по НДС Московский код; ЧЧ54095 **** Ч_4.5*3-2/.6*6 курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут как можно уйти от НДС без последствий. Практика свидетельствует, что практически все проверки налогоплательщиков применяющих ОСН затрагивают данный вопрос с негативными для налогоплательщика последствиями. При этом налоговый орган исключает из состава затрат НП и вычетов по НДС суммы по контрагентам, которые, например, просто не отвечают на запрос в рамках встречных проверок, либо не заплатили налоги и т.п. Подчас очень тяжело отстоять свою правоту в спорах с налоговым органом. Обучающий курс посвящен вопросу защиты налогоплательщика, призван помочь ему как не погрязнуть в тотальных проверках своих контрагентов, так и в последствии защитить свои права по взаимоотношениям я такими компаниями. На семинаре не только будут показаны способы противодействия придиркам налоговой, но и будут разобраны способы заключения договоров, которые в принципе исключают возможность признания лица недобросовестным, а также законные способы снижение налоговой нагрузки по НДС в том случае, если налогоплательщик в этом заинтересован. Программа: 1.Методические указания Минфина о назначении выездных налоговых проверок. 2.Методические указания Минфина по поиску недобросовестных контрагентов. 3.Основания признания налоговой выгоды необоснованной (на основании судебной практики, писем Минфина, практики проверок). 4.Что необходимо сделать, чтобы проявить разумную осмотрительность. Какие документы и какую информацию о контрагенте необходимо собрать. 5.Как защититься от претензий налогового органа о том, что контрагент: * не платит налоги и не сдает отчетность; * не отвечает на встречные проверки; * не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; * директор БОМЖ, ничего не подписывал, его подпись подделали и т.п. * директор является "массовым", в отношении руководителя проводятся розыскные мероприятия; * проведенный осмотр показал, что компания не могла отгрузить товар с адреса, указанного в накладной, счете-фактуре; * коды ОКВЭД контрагента не позволяют ему произвести действия, которые он якобы произвел по отношению к налогоплательщику (не может выполнять работы, поставлять товар и т.п., так как создан для иных целей); * иные претензии. 6.Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. 7.Уход от признания налоговой выгоды необоснованной путем особого способа заключения договоров. 8.Уход от уплаты НДС с наценки путем: * заключения договора с дополнительной выгодой; * заключение договора с предварительной куплей-продажей опциона; * включение условий о неустойки. 9.Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. 10.Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. Является ли потеря документов защитой от претензий правоохранительных органов. 11.Ответы на индивидуальные вопросы. Cтоимоcть: 7900 руб. Вся информация по тел: +7 (код Москвы) Ч45*З/9/6_8 : 792*2i.2/2 From hazel_alfrediawg at jamesmarzo.com Fri Nov 5 15:12:16 2010 From: hazel_alfrediawg at jamesmarzo.com (Hazel Alfredia) Date: Fri, 05 Nov 2010 15:12:16 -0700 Subject: |BUY NOW| Viagra50/100mg - $1.85, High Qua1ityMedications + Discount On All Reorders = Best Deal Ever! jq In-Reply-To: <282301cb7b74$cc7e9075$19c0d839@4h1amj1> Message-ID: <4CD48140.F893E1EA@jamesmarzo.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://kfnmw.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 543 bytes Desc: not available URL: From rhea.mirtha_zw at gainesintl.com Fri Nov 5 15:12:34 2010 From: rhea.mirtha_zw at gainesintl.com (Rhea Mirtha) Date: Fri, 05 Nov 2010 15:12:34 -0700 Subject: High Qua1ityMedications + Discount On All Reorders = Best Deal Ever! Viagra50/100mg - $1.85 x3m5 In-Reply-To: <00e801cb78ac$47521810$289f6cee@5z59k01> Message-ID: <4CD48152.707BB28C@gainesintl.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://kfnmw.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 546 bytes Desc: not available URL: From treena.octavia_ge at usit.net Fri Nov 5 17:56:17 2010 From: treena.octavia_ge at usit.net (Treena Octavia) Date: Fri, 05 Nov 2010 17:56:17 -0700 Subject: Certified OnlinePharmacy. Viagra100mg x 60pills ONLY $96, Free shipping for orders over 200USD, 15% off discount for patrons aglp In-Reply-To: Message-ID: <4CD4A7B1.EF1EE0E0@usit.net> Cheap ViagraPills start fr $1.85 GenericViagra: * 25mg: 40 pills - $ 78 * 50mg: 30 pills - $ 99 270 pills - $499 * 100mg: 30 pills - $105 270 pills - $540 * 150mg: 20 pills - $139 * 120mg: 20 pills - $117 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://bargaincapspills.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 823 bytes Desc: not available URL: From buh at neutex.ru Fri Nov 5 09:06:15 2010 From: buh at neutex.ru (=?koi8-r?B?+sHU0sHU2Tog0NLRzdnFIMkgy8/T18XOztnF?=) Date: Fri, 5 Nov 2010 19:06:15 +0300 Subject: =?koi8-r?B?78PFzsvBIMkgz9DUyc3J2sHDyckg2sHU0sHUINDSxcTQ0snR1MnR?= Message-ID: <000d01cb7d03$5fb6a3d0$6400a8c0@buh> Тема: Учет и оптимизация затрат предприятия (Интенсивный семинар) (495) 742-91-98,(495) Ч45-ЧО/95 З0 ноября 2010г. Программа интенсива: * Классификация затрат: прямые и косвенные, постоянные и переменные, релевантные и прочие. * Управление затратами и оптимизация затрат: затраты √ это резерв профицита. * Себестоимость как исходная точка ценообразования; калькуляция себестоимости продукции, товаров, услуг и резервы ее снижения; * Стандарт√костинг и АВС√костинг и их значение в условиях кризиса * Анализ и экспресс-оценка объема продаж при безубыточности * Ответы на вопросы Каждый участник: *получит методические материалы √ полезные подсказки в практической деятельности; *овладеет инструментарием учета, оценки и оптимизации затрат предприятия; *сможет более эффективно разрешать те сложные вопросы, перед которыми предприятие оказывается в условиях кризиса; *повысит личную эффективность! Стоимость участия 7999 рублей Информацию можно получить по телефонам: (Ч95) 742-91-98, (Ч95) 4Ч5 ЧО 95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2613 bytes Desc: not available URL: From 0-tr at mcngear.com Fri Nov 5 17:02:30 2010 From: 0-tr at mcngear.com (Luxury_For_LESS) Date: Fri, 5 Nov 2010 21:02:30 -0300 Subject: HUGE SALE on Rolex and Louis Vuitton Watches and Jewelry Message-ID: <1948078946.IMSIRK2K547642@erywjtzpvehpv.rotjpetkdxq.biz> We have what noone else does http://www.itchname.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 258 bytes Desc: not available URL: From mail at mobfilm.com Sat Nov 6 03:33:58 2010 From: mail at mobfilm.com (Freda Blair) Date: Sat, 6 Nov 2010 02:33:58 -0800 Subject: No description Message-ID: <708573715.54292983472010@mobfilm.com> WHAT A GREAT IDEA! Ring anytime 1-801-461-5023 We prougmvide a cot56s4nncept that will alloh1uw anyorwvkmqne with sufficient wos9brk experience to58 obs8mvqjybtain a fully verifiable University Degree. Bachelofsrs, Masters o77422r even a Do07nwjsu0cto78no27mbrate. Think o58hzf it, within fo9bvkelur tov342 six weeks, you7u toel7ktgelp4o6ki6 co13itauld be a co0kcxllege graduate. Many peoelqzsople share the same frustratio7vqor9kn, they are doh5ing the wo0520aark odb07tf the persof83fhn that has the degree and the perso5eltr5dn that has the degree is getting all the mo6wney. Doh878n’t yokpvu think that it is time yogvu were paid fair co0vii9mpensatiog3ikvn fotuw0r the level oftpf wohjmo2rk yooozau are already dofgcming? This is yosiwur chance tofnw54tz finally make the right modt1awtuve and receive yoelh5uouur due benefits. If yorf3tgqelu are mojvq01re than qualified with yo3xvn0ur experience, but are lacking that prestigio7kv6sqious piece owt07bf paper knog0jnwn as a diploj8othnama that is ow35stften the passpop1j5jwrt toj9q05 success. CALL US Ton1iDAY AND GIVE Yo14UR Wo91v5jRK EXPERIENCE THE CHANCE Toel1pi EARN Yo8867bwwU THE HIGHER Co8skmrMPENSATIom228N YorijmomyU DESERVE! Ring anytime 1-801-461-5023 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5219 bytes Desc: not available URL: From jannateulaxe at clarks.com Sat Nov 6 06:39:41 2010 From: jannateulaxe at clarks.com (Janna Eula) Date: Sat, 06 Nov 2010 06:39:41 -0700 Subject: LowPrice Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570, NoPrescription Required jnf In-Reply-To: <05e401cb7a86$cc75b42c$c0995eec@ogojb1l> Message-ID: <4CD55A9D.38C8E78A@clarks.com> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://plurifying.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 779 bytes Desc: not available URL: From stephanialeenatl at panalpina.com Sat Nov 6 09:37:04 2010 From: stephanialeenatl at panalpina.com (Stephania Leena) Date: Sat, 06 Nov 2010 09:37:04 -0700 Subject: Viagra50/100mg - $1.85 |BUY NOW| Visa, MasterCard, eCheck accepted 9p1p In-Reply-To: <3c1001cb7867$5336dde5$46ee33e4@68jxe13> Message-ID: <4CD58430.F603D7E0@panalpina.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://kowzl.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 546 bytes Desc: not available URL: From msortega at uo.edu.mx Fri Nov 5 22:35:44 2010 From: msortega at uo.edu.mx (Quinn Slaughter) Date: Sat, 6 Nov 2010 12:35:44 +0700 Subject: Message 98790 Message-ID: <736029018.68268372455659@uo.edu.mx> WHAT A GREAT IDEA! Ring anytime 1-801-461-5023 We prov8xcvide a coamxncept that will allo4yrfha1w anyon7el6ne with sufficient wo9hqrk experience ton7s5elxg o3q9nieltbtain a fully verifiable University Degree. Bachelo29wb9rjrs, Masters odxf2c21r even a Dog2faccto25rate. Think oi4yxxs5jf it, within fot4cur tobqiqf six weeks, yoqonsdelu7u top2phelelmiom5hgi cos3csjrruld be a cob3llege graduate. Many peocvwhajple share the same frustratioicgtdn, they are doz7rpring the wosv98x8trk oddxn3wo9f the persorxv9t8fcn that has the degree and the perso3f8r8brn that has the degree is getting all the moxqxry4ney. Dowyyn’t yodnjelmcjqu think that it is time yokm31io4ou were paid fair conifampensatiozabn for57xhknr the level os4ci52f wo0uzd12gnrk yoelj6c9au are already dohxjing? This is yo79d114rkur chance tojel4 finally make the right mokelv0nve and receive yop3wur due benefits. If yow3q0rpzou are mopvre than qualified with yo5v5nnur experience, but are lacking that prestigiovy7hus piece omxxc0vzf paper kno9wmtwn as a diploiq44z4qma that is otg8ften the passpofuq6rt topf success. CALL US Tog00c8si9DAY AND GIVE Yo1717UR WowhhppRK EXPERIENCE THE CHANCE Tof54b EARN Yojn5ckcU THE HIGHER Coqz658p4MPENSATIoh8N YokozU DESERVE! Ring anytime 1-801-461-5023 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5251 bytes Desc: not available URL: From wendespina_hv at usa.xerox.com Sat Nov 6 23:43:26 2010 From: wendespina_hv at usa.xerox.com (Wen Despina) Date: Sat, 06 Nov 2010 23:43:26 -0700 Subject: .PenisLong, used & recommended by Sex industry professionals, Buy this effective herbal EnlargementPills re In-Reply-To: Message-ID: <4CD64A8E.14FE4AAB@usa.xerox.com> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://shruglock.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 722 bytes Desc: not available URL: From h.georgina_rx at albaad.com Sun Nov 7 02:19:23 2010 From: h.georgina_rx at albaad.com (Helen Georgina) Date: Sun, 07 Nov 2010 03:19:23 -0700 Subject: Codeine (Methylmorphine) is a narcotic pain reliever, 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 8g In-Reply-To: Message-ID: <4CD67D2B.E8363CAA@albaad.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://pharmseymour64q.ru/pill/Codeine -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 659 bytes Desc: not available URL: From k_prudence_tl at jofemar.com Sun Nov 7 04:12:07 2010 From: k_prudence_tl at jofemar.com (Khalilah Prudence) Date: Sun, 07 Nov 2010 05:12:07 -0700 Subject: Amazing increase in thickness of yourPenis, up to 30% with our miracle pills nye Message-ID: <4CD69797.60956793@jofemar.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://caterinc.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 860 bytes Desc: not available URL: From 0-2n.corre at suzuki.co.uk Sat Nov 6 23:35:15 2010 From: 0-2n.corre at suzuki.co.uk (Affordable_Luxury) Date: Sun, 7 Nov 2010 08:35:15 +0200 Subject: 75% Off on R o l e x and other Luxury Watches as well as other Select Items! Message-ID: <1411189937.Z8X1JYE1319511@aslglpkfme.ckcosird.biz> Click to stop being robbed with retail prices http://ow.ly/35jmC -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 281 bytes Desc: not available URL: From info at rei-alumstroy.ru Sun Nov 7 01:25:50 2010 From: info at rei-alumstroy.ru (=?koi8-r?B?7sXTwc7Lw8nPzsnSz9fBzs7ZyiDEz9PU1dAgyyDJzsbP0s3Bw8nJ?=) Date: Sun, 7 Nov 2010 11:25:50 +0300 Subject: =?koi8-r?B?68/S0M/SwdTJ187B0SDCxdrP0MHTzs/T1Ng=?= Message-ID: 15 ноября ТЕМА: КОРПОРАТИВНАЯ БЕЗОПАСНОСТЬ (495) 742-9l-98; 4Ч5-ЧO-95 Программа мероприятия: 1. Общие вопросы обеспечения безопасности предпринимательской деятельности. * Объекты и субъекты обеспечения безопасности. * Цели и задачи обеспечения безопасности предпринимательской деятельности. * Основные виды угроз интересам компании. * Принципы организации и функционирования системы безопасности компании, структура системы безопасности компании. * Средства обеспечения безопасности. * Способы функционирования системы безопасности компании. * Подготовка к созданию системы безопасности компании. * Порядок создания концепции безопасности компании. 2. Конкурентная разведка: современные методы и технологии. * Базовые положения конкурентной разведки (КР). * Конкуренция и конкурентная разведка. * Разведывательный цикл. * Информационные источники конкурентной разведки. * Конкурентная разведка в сети Интернет. * Анализ информации в КР. * Методы КР при решении задач противодействия “черному” PR. 3. Теория и практика создания службы конкурентной разведки. * Организация службы конкурентной разведки. * Общие документы. * Внутренние документы службы КР. * Практическое применение методов конкурентной разведки в решении отдельных задач связанных с деятельностью предприятия. * Сколько стоит разведчик. * Консалтинговые агентства. * Методики проверки бизнес-партнёра. 4. Информационная безопасность предпринимательской деятельности. * Правовые основы информационной безопасности предпринимательской деятельности. * Общие положения по информационной безопасности. * Правовые меры по созданию информационной безопасности. * Меры по созданию информационной безопасности, связанные с человеческим фактором. * Организация конфиденциального делопроизводства. 5. Технические средства защиты информации. Противодействие промышленному шпионажу. * Возможные технические каналы утечки информации. * Технические средства промышленного шпионажа. * Акустический канал утечки информации и его защита. * Акустоэлектрический канал утечки информации и его защита. * Телефонный (в том числе радиотелефонный) канал утечки информации и его защита. * Электромагнитный канал утечки информации и его защита. * Меры и средства защиты информации от технических средств ее съема. * Приборы обнаружения технических средств промышленного шпионажа. 6. Безопасность информации, представленной в электронном виде. * Актуальность вопроса защиты информации. * Угрозы информации. * Возможная тактика использование программных и аппаратных закладных устройств (ЗУ). * Уязвимость современных технических средств обработки информации. (беспроводные системы, Интернет, мобильные средства связи и пр.). * Возможные способы утери, искажения, изменения компьютерной информации или получения к ней несанкционированного доступа. * Организационно-технические мероприятия защиты информации. * Технологии и средства защиты информации. * Практические рекомендации в области обеспечения информационной безопасности компании. * Человеческий фактор в утечке информации. * Правила при выборе средства защиты компьютерной информации. * Методы и средства защиты компьютерной информации. * Криптографические методы информационной безопасности. * Организация защищенного электронного документооборота. * Организация работы Службы информационной безопасности (СИБ) предприятия. * Практический опыт. 7. Режимные, организационные мероприятия и инженерно-техническая защита. * Перечень режимных мероприятия. * Перечень организационных мероприятий. * Порядок выбора и проектирования помещения компании. * Создание сис¬темы охраны компании. * Системы охраны периметров. * Охранное телевидение в системе безопасности объекта. * Организация контрольно-пропускного режима. * Противопожарная безопасность. 8. Служба безопасности компании (СБ). * Правовые основы деятельности СБ. * Разрешённые виды деятельности СБ. * Создание и ликвидация СБ. * Разработка структуры СБ. * Нормативные (внутренние) документы СБ. * Управление СБ. * Контроль работы СБ. * Оценка работы СБ. * Подбор и подготовка кадров для СБ. * Подбор руководителя СБ. 9. Практические аспекты реализации концепции безопасности на предприятии. (Основные направления деятельности СБ – практическая реализация). * Контрольно-пропускной режим. * Охрана периметра. * Обеспечение безопасности на массовых мероприятиях. * Телохранители. * Информационно-аналитическая деятельность СБ. * Проверка юридического лица на предмет благонадежности. * Практические примеры. * Информационные ресурсы СБ компании. 10. Правовая защита бизнеса при взаимодействии с контролирующими органами. * Понятие мероприятий по контролю. * Виды контролирующих органов и их полномочия. * Порядок оформления результатов мероприятий по контролю. * Виды ответственности предпринимателей. * Права и обязанности лиц, осуществляющих предпринимательскую деятельность, во взаимоотношениях с контролирующими органами. * Способы правовой защиты проверяемых юридических лиц и механизмы их реализации. 11. Основы экономической безопасности. * Система и методы анализа и управления экономическими рисками. * Методы получения информации руководством предприятия. Информационное поле руководителя. * Деловая разведка и ее роль в современном менеджменте. Экономическая безопасность и деловая разведка – можно ли совместить? Применение технологий деловой разведки для решения задачи управления безопасностью – задачи оптимизации расходования ресурсов на локализацию угроз – части общей системы управления рисками предприятия. * Распространенные варианты мошенничества в современной предпринимательской деятельности. * Враждебное поглощение, цели, сценарий развития событий, признаки начавшегося враждебного поглощения, варианты защиты от враждебного поглощения. * Безопасное обращение с пластиковыми картами. 12. Психологические аспекты обеспечения комплексной безопасности фирмы. Практикум делового общения. * Вопросы обеспечения личной безопасности первых лиц компании. * Психология безопасного поведения. 13. HR-менеджмент: аспекты безопасности. * Организационно-правовые основы безопасной работы с персоналом. * Безопасность кадрового делопроизводства. * Вопросы безопасности при подборе персонала. * Вопросы безопасной работы с действующими сотрудниками предприятия. * Вопросы безопасной работы при подготовке к увольнению и после увольнения сотрудника. * Безопасность кадровой комплектации. * Проведение расследований на предприятии. 14. Углубленные кадровые проверки с применением новейших психотехнологий. * Метод компьютерного психосемантического анализа. * Способ психозондирования. * Инструментарий психозондирования. * Психокоррекция. * Полиграф. * Сферы практического применения. 15. Знакомство с новейшими информационно-аналитическими программами и поисковыми машинами. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (Ч95) 742-91-98, (Ч95) 4Ч5 ЧО 95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 16205 bytes Desc: not available URL: From ichca58 at vokaltanec.ru Sun Nov 7 13:25:44 2010 From: ichca58 at vokaltanec.ru (Johnny Albert) Date: Sun, 7 Nov 2010 22:25:44 +0100 Subject: =?koi8-r?B?89DP08/C2SDawd3J1Nkg0NLJINDSz9fFxMXOyckg0NLP18XSz8s=?= Message-ID: <987515882.30061589248761@vokaltanec.ru> 10 Ноября ТАКТИКА ПОВЕДЕНИЯ И СПОСОБЫ ЗАЩИТЫ ПРИ ПРОВЕДЕНИИ ПРОВЕРОК (Ч95) ЧЧ5_32*66 и 792_2i_2-2 Цель: формирование теоретической базы знаний, а также рассмотрение конкретных ситуаций, моделирование возможных действий и реакций во взаимоотношениях с проверяющими органами, психологическую подготовку и настройку к проверке руководителей предприятия и менеджмента. Программа: 1. Полезные знания о контролирующих органах и процедурах проведения проверок. * Правовые основания деятельности контролирующих органов - какие законы и внутренние приказы ее регламентируют. * Полномочия контролирующих органов - что разрешено и что запрещено им делать. * Условия проведения проверок - виды, продолжительность, документальное оформление, что проверяется, что предоставлять, куда пускать и что показывать, а что и нет. 2. Права и возможности предпринимателей при проведении проверок. * Какие законы и инстанции защищают предпринимателя, как ими пользоваться, что от них ожидать. * Куда экстренно обращаться в случае внезапной проверки и куда обжаловать ее последствия. * Как поддерживать постоянные конструктивные отношения с органами власти и контролирующими органами и пользоваться их поддержкой. 3. Действия при контактах с контролирующими органами. * Внезапные и плановые проверки, оперативно-розыскные и следственные действия, судебное разбирательство, отношения с местными органами власти. * Как узнать о предстоящих проверках, как подготовиться, как встретить проверяющих и удостовериться, что это не мошенники, как выяснить истинные цели проверки - просто проверка, вымогательство, содействие конкурентам. * Что делать от начала проверки и до ее окончания проверяемым - руководителям и персоналу. * Как влиять на ход и результаты проверки, используя правовые, организационные и психологические механизмы. * Что делать после проверки, чтобы смягчить ее последствия. 4. Готовность к проверкам и общению с органами власти. * Как сформировать конструктивный настрой и боевой дух. * Как повысить "сопротивляемость организма" - каждого сотрудника и предприятия в целом, усилить "иммунитет" к проверкам. Вся информация по тел: \Моск. код/ ЧЧ-5-.З2-66 **** Ч*4*5.З.2/*6.6 From rsharlasq at ryeco.com Sun Nov 7 23:10:37 2010 From: rsharlasq at ryeco.com (Reta Sharla) Date: Mon, 08 Nov 2010 00:10:37 -0700 Subject: Codeine 30/15mg for $203.70, 60/15mg for $385.80, 90/15mg for $562.50 la In-Reply-To: <4c2901cb7c26$92636976$d8fab7b2@5u9nyw2> Message-ID: <4CD7A26D.331C4CF6@ryeco.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://pharmseymour64q.ru/pill/Codeine -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 661 bytes Desc: not available URL: From case at sdf.lonestar.org Sun Nov 7 21:15:28 2010 From: case at sdf.lonestar.org (John Case) Date: Mon, 8 Nov 2010 05:15:28 +0000 (UTC) Subject: distributed traffic patterns (for personal traffic) Message-ID: Virtual Private Servers are getting fairly cheap, and Amazon EC2 instances even cheaper. A hundred or so dollars per month could put together a fairly large set (say, five ?) of general purpose unix nodes on at least 3 continents ... EC2 in Asia and Ireland, and then some bullshit VPS provider(s) here and there in the US. So let's say you assemble a little quiver of these root shells, and your intention is to completely obfuscate your own personal traffic ... to just disappear completely (as an atomic, individual net user). The technical foundation is pretty basic - just set up your own system, or perhaps a firewall at your home/office to block all traffic except for SSH or HTTPS and to take all outbound traffic and tunnel it over one of those to a random one of your systems. Easy. ----- So at this point, what do you have ? First, your own ISP no longer sees anything but encrypted traffic. I suppose they also see time patterns, but you've pretty much excluded your own ISP from all information regarding your net usage. Further, you've upped the ante considerably - an actor has to have a global eye view of the entire global Internet to collect a true portfolio of your net usage. Maybe a few US nodes are easy, and maybe if you go EC2 Ireland, that's easy too ... but some VPS provider in Hong Kong ? Seoul ? Sao Paulo ? ----- So where does this start to fall apart ? First, if you hit any kind of personal/vanity/small sites on a daily or hourly basis, an attacker just has to camp out upstream from there and collect all the source IPs that come in. So if you run your own mailserver (or whatever), this falls apart almost immediately. You either need to start hosting a lot more traffic on your own server (giving away accounts or something like that) or you need some kind of jumphost that isn't connected to you, and an out of band link between the jumphost and your own site(s). This isn't rocket science, though ... just set up a big ubuntu/freebsd/whatever mirror next to your own vanity host, and cross connect with an ethernet cable over non routable IP space. Second, unencrypted login sessions ... between web forums and chat rooms and any number of other things, somewhere you're entering a user/pass over plain old HTTP... and if an attacker can guess one or more sites that they know you visit, they can, just like above, camp out upstream and just collect all of your proxy IPs. This is easy to fix with a firewall rule, but may be impractical to deal with that way ... a certain discipline with nyms and aliases, etc., needs to be adopted, and unlike typical "nym leakage" you need to be thinking of nym leakage on an infrastructure level. Not impossible, though... Where else does this fall apart ? I don't think there is a weakness with DNS resolution, since the dns resolution will come from your proxy, which will move around... presumably your local connection has everything but 22 (or 443) blocked. Remember, this isn't Tor ... the idea here is not to create mathematically provable security. The idea is to make ones own traffic disappear to a degree that one needs to be a nation state to put it back together. The local ISP can't see it, the servers you visit can't see it, and the intermediate ISPs (and even a conglomeration of several of them) can't see it. And it looks like this is a fairly cheap thing to put together in 2010... From estefana.candis_nk at entergy.com Mon Nov 8 06:18:40 2010 From: estefana.candis_nk at entergy.com (Estefana Candis) Date: Mon, 08 Nov 2010 07:18:40 -0700 Subject: .PenisLong, used & recommended by Sex industry professionals, Buy this effective herbal EnlargementPills 0d In-Reply-To: Message-ID: <4CD806C0.ED9633A4@entergy.com> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://tugfill.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 715 bytes Desc: not available URL: From teddks at gmail.com Mon Nov 8 06:07:47 2010 From: teddks at gmail.com (Ted Smith) Date: Mon, 08 Nov 2010 09:07:47 -0500 Subject: distributed traffic patterns (for personal traffic) In-Reply-To: References: Message-ID: <1289225267.9730.13.camel@anglachel> On Mon, 2010-11-08 at 05:15 +0000, John Case wrote: > Virtual Private Servers are getting fairly cheap, and Amazon EC2 instances > even cheaper. A hundred or so dollars per month could put together a > fairly large set (say, five ?) of general purpose unix nodes on at least 3 > continents ... EC2 in Asia and Ireland, and then some bullshit VPS > provider(s) here and there in the US. > > So let's say you assemble a little quiver of these root shells, and your > intention is to completely obfuscate your own personal traffic ... to just > disappear completely (as an atomic, individual net user). > > The technical foundation is pretty basic - just set up your own system, or > perhaps a firewall at your home/office to block all traffic except for SSH > or HTTPS and to take all outbound traffic and tunnel it over one of those > to a random one of your systems. Easy. > So where does this start to fall apart ? > > First, if you hit any kind of personal/vanity/small sites on a daily or > hourly basis, **an attacker just has to camp out upstream from there and > collect all the source IPs that come in.** So if you run your own > mailserver (or whatever), this falls apart almost immediately. > > Second, unencrypted login sessions ... between web forums and chat rooms > and any number of other things, somewhere you're entering a user/pass over > plain old HTTP... and if an attacker can guess one or more sites that they > know you visit, they can, just like above, camp out upstream and just > collect all of your proxy IPs. ... > And it looks like this is a fairly cheap thing to put together in 2010... It seems to me like Tor would do everything this solution would do, and even would avoid the two attacks you present. The attacker can do the same thing (camp the destination), but they'll just get Tor exits. It's also simple to transparently proxy all traffic on your system through Tor. If you really wanted to limit your anonymity set, you could run those nodes and set a few of them up as bridge nodes and a few of them up as exits, and cycle through that. An upcoming feature of Tor is matching circuits to destination ports, so you could use your (trusted) exits for cleartext traffic (the few sites when you're forced onto HTTP) and use the wider Tor network for the rest. Maybe I'm not seeing what you're trying to get at, but it seems like this would do everything you need. [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From kav at evm.ru Sun Nov 7 21:41:01 2010 From: kav at evm.ru (=?koi8-r?B?3sXSzsHRINrB0tDMwdTB?=) Date: Mon, 8 Nov 2010 12:41:01 +0700 Subject: =?koi8-r?B?zMXHwczYzsHRIMHM2NTF0s7B1MnXwSDPws7BzMneydfBzsnA?= Message-ID: <28EB630B9C5C45988FF61D1E92E067D6@211052> Пятнадцатого ноября 2010г. +7 Московский код: Ч45*3968 <<>> 4*Ч_5-З/2//6.6 Правильное Налоговое планирование исключает фирмы-однодневки и обналичку 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности…); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) – как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей Вся информация по тел: +7 (код Москвы) ЧЧ.53-96.8 ; Ч4*5З9-68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4844 bytes Desc: not available URL: From lisheo at hotmail.com Mon Nov 8 06:35:51 2010 From: lisheo at hotmail.com (Alastair O'Neill) Date: Mon, 8 Nov 2010 14:35:51 +0000 Subject: distributed traffic patterns (for personal traffic) In-Reply-To: <1289225267.9730.13.camel@anglachel> References: ,<1289225267.9730.13.camel@anglachel> Message-ID: > Subject: Re: distributed traffic patterns (for personal traffic) > From: teddks at gmail.com > To: cypherpunks at al-qaeda.net > Date: Mon, 8 Nov 2010 09:07:47 -0500 > > On Mon, 2010-11-08 at 05:15 +0000, John Case wrote: > > Virtual Private Servers are getting fairly cheap, and Amazon EC2 instances > > even cheaper. A hundred or so dollars per month could put together a > > fairly large set (say, five ?) of general purpose unix nodes on at least 3 > > continents ... EC2 in Asia and Ireland, and then some bullshit VPS > > provider(s) here and there in the US. > > > > So let's say you assemble a little quiver of these root shells, and your > > intention is to completely obfuscate your own personal traffic ... to just > > disappear completely (as an atomic, individual net user). > > > > The technical foundation is pretty basic - just set up your own system, or > > perhaps a firewall at your home/office to block all traffic except for SSH > > or HTTPS and to take all outbound traffic and tunnel it over one of those > > to a random one of your systems. Easy. > > > So where does this start to fall apart ? > > > > First, if you hit any kind of personal/vanity/small sites on a daily or > > hourly basis, **an attacker just has to camp out upstream from there and > > collect all the source IPs that come in.** So if you run your own > > mailserver (or whatever), this falls apart almost immediately. > > > > Second, unencrypted login sessions ... between web forums and chat rooms > > and any number of other things, somewhere you're entering a user/pass over > > plain old HTTP... and if an attacker can guess one or more sites that they > > know you visit, they can, just like above, camp out upstream and just > > collect all of your proxy IPs. > ... > > And it looks like this is a fairly cheap thing to put together in 2010... > > It seems to me like Tor would do everything this solution would do, and > even would avoid the two attacks you present. The attacker can do the > same thing (camp the destination), but they'll just get Tor exits. It's > also simple to transparently proxy all traffic on your system through > Tor. > > If you really wanted to limit your anonymity set, you could run those > nodes and set a few of them up as bridge nodes and a few of them up as > exits, and cycle through that. An upcoming feature of Tor is matching > circuits to destination ports, so you could use your (trusted) exits for > cleartext traffic (the few sites when you're forced onto HTTP) and use > the wider Tor network for the rest. > > Maybe I'm not seeing what you're trying to get at, but it seems like > this would do everything you need. > > [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] Some people don't wish to use Tor for a variety of reasons, whether a lack of trust, or simply because they don't want anyone to see Tor traffic on their connection. I see what you're saying, mind you. Perhaps even better would be to combine the two, and run Tor from some Asian/off-shore server you own which you tunnel into. Either or, Tor is better simply because it eliminates the upstream camping, which would probably be the main problem; eventually, your proxy servers would be enumerated, and then, you'd be vulnerable. There's the cost, too. 100 dollars a month, which would need to be reasonably anonymously transferred, otherwise someone already has a list of your shells. This kind of method would work against someone who has limited resources, but then, so does vanilla Tor, or simple proxy chaining. From flick at flickharrison.com Mon Nov 8 17:17:56 2010 From: flick at flickharrison.com (Flick Harrison) Date: Mon, 8 Nov 2010 17:17:56 -0800 Subject: Google is polluting the internet Message-ID: I can't argue with the idea that index-based research leads to shallower understanding in some ways. Although, to think of the question atemporally (1), the search engine is a necessity to keeping up a current understanding of anything, rather than being in the rear-view mirror all the time (2). And, really, the Google is partly powered by DMOZ.org, which is in fact a subject-classification engine that in some ways is at the heart of google's process (3). The Open Directory doesn't link to "knowledge" specifically, but to websites in general, where, presumably, some knowledge is contained; starting at DMOZ instead of Google Search might give a learner some of the advantages Swift describes, ad-free to boot! Moreover, ad-pollution can be shut off as easily as turning off a lightswitch, by using Firefox with Adblock installed (3). I've had people accuse me of stealing by using adblock - getting the web without paying penance for it - but I don't take that seriously. More sinister and challenging than ad pollution is the notion that Google isn't like a library which lets a search for knowledge be its own reward; Google demands data from the learner in exchange for information, which could be innocent enough if not for the example of the search engine's relations with China - restricting content and releasing user data, either by espionage or by design - and perhaps lesser-publicized deals with other dictatorships or free-world intelligence agencies. This is not to mention Bing, which could, for all we know, be an arm of the Chinese state, concocted to replace Google's renegade Western influence with an in-house operation. This presents an even-more sinister threat-model to knowledge than any commercial enterprise: the central cataloguing of everyone's reading habits. It's surprising how easily we succumb to giving up our rights by point-and-click - when you consider how hard the US Librarians fought against the Patriot Act when it was made mandatory to hand over Library records on demand, and even informing anyone about such a demand was a felony. Unsure of even how to retain counsel under such a threatening gag order, librarians nevertheless threw themselves into the fight and managed to change the law (5). They understood that privacy was vital to the research process, so that the process itself didn't become evidence against the researcher when they least expected it. Yet every Gmail user lets google compile such a record, every time they log in and do a search. -Flick Harrison 1 - Sterling, http://boingboing.net/2010/02/26/bruce-sterling-expla-1.html 2 - http://thinkexist.com/quotation/the_past_went_that-a-way-when_faced_with_a/152841.html 3 - http://en.wikipedia.org/wiki/Dmoz#Content_users 4 - Interesting discussion webbing out from http://adblockplus.org/blog/ads-dont-generate-money 5 - http://www.google.ca/search?q=librarians+patriot+act+lawyer+Ann+Beeson&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a -- * WHERE'S MY ARTICLE, WORLD? http://wikipedia.org/wiki/Flick_Harrison * FLICK's WEBSITE & BLOG: http://www.flickharrison.com # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From case at sdf.lonestar.org Mon Nov 8 09:55:16 2010 From: case at sdf.lonestar.org (John Case) Date: Mon, 8 Nov 2010 17:55:16 +0000 (UTC) Subject: distributed traffic patterns (for personal traffic) In-Reply-To: References: ,<1289225267.9730.13.camel@anglachel> Message-ID: On Mon, 8 Nov 2010, Alastair O'Neill wrote: >> If you really wanted to limit your anonymity set, you could run those >> nodes and set a few of them up as bridge nodes and a few of them up as >> exits, and cycle through that. An upcoming feature of Tor is matching >> circuits to destination ports, so you could use your (trusted) exits for >> cleartext traffic (the few sites when you're forced onto HTTP) and use >> the wider Tor network for the rest. >> >> Maybe I'm not seeing what you're trying to get at, but it seems like >> this would do everything you need. >> >> [demime 1.01d removed an attachment of type application/pgp-signature which > had a name of signature.asc] > Some people don't wish to use Tor for a variety of reasons, whether a lack of > trust, or simply because they don't want anyone to see Tor traffic on their > connection. > I see what you're saying, mind you. Perhaps even better would be to combine > the two, and run Tor from some Asian/off-shore server you own which you tunnel > into. > Either or, Tor is better simply because it eliminates the upstream camping, > which would probably be the main problem; eventually, your proxy servers would > be enumerated, and then, you'd be vulnerable. > There's the cost, too. 100 dollars a month, which would need to be reasonably > anonymously transferred, otherwise someone already has a list of your shells. > This kind of method would work against someone who has limited resources, but > then, so does vanilla Tor, or simple proxy chaining. The threat model is not a current one. If you are actively breaking the law _right now_, then all of this (including Tor, IMO) is out the window - you move to the realm of throwaway mobile phones and prepaid visa cards and open wifi networks. No, the threat model I am concerned with is future correlation attacks and data mining. I am concerned with a set of digital footprints that can be stored indefinitely and can be used to frame all possible motives. So yes, Tor would work, but Tor is slow, and even with a large number of additional nodes and much more bandwidth, Tor will still have _very_ high latency. If you read back in the Tor mailing list, you can see the devs state that while the bandwidth will get better over time, the latency issues are here to stay. This is in contrast to a hop from CONUS over to Amsterdam and back to check nfl.com ... that's pretty snappy, I am happy to report. So that's the threat model, and that's why I have declined to use Tor (I'm well versed in Tor usage and admin). Payment is prepaid visa or postal money order, etc. Most asian ISPs I have dealt with don't accept credit cards for service anyway. As to cost, if $80 or $100 per month is too much, I guess you use Tor. I'm of the mind that this is extremely cheap for 3-5 nodes spread across the world, especially considering that this barely got you a single colo'd server 8 years ago. Comments ? Where does this break down, given the modest requirements described ? From noahcrocell at hotmail.com Mon Nov 8 10:24:43 2010 From: noahcrocell at hotmail.com (Noah Crocell) Date: Mon, 8 Nov 2010 18:24:43 +0000 Subject: distributed traffic patterns (for personal traffic) In-Reply-To: References: ,<1289225267.9730.13.camel@anglachel>,, Message-ID: > Date: Mon, 8 Nov 2010 17:55:16 +0000 > From: case at sdf.lonestar.org > To: lisheo at hotmail.com > CC: cypherpunks at al-qaeda.net > Subject: RE: distributed traffic patterns (for personal traffic) > > On Mon, 8 Nov 2010, Alastair O'Neill wrote: > > > The threat model is not a current one. If you are actively breaking the > law _right now_, then all of this (including Tor, IMO) is out the window - > you move to the realm of throwaway mobile phones and prepaid visa cards > and open wifi networks. > > No, the threat model I am concerned with is future correlation attacks and > data mining. I am concerned with a set of digital footprints that can be > stored indefinitely and can be used to frame all possible motives. > > So yes, Tor would work, but Tor is slow, and even with a large number of > additional nodes and much more bandwidth, Tor will still have _very_ high > latency. If you read back in the Tor mailing list, you can see the devs > state that while the bandwidth will get better over time, the latency > issues are here to stay. This is in contrast to a hop from CONUS over to > Amsterdam and back to check nfl.com ... that's pretty snappy, I am happy > to report. > > So that's the threat model, and that's why I have declined to use Tor (I'm > well versed in Tor usage and admin). > > Payment is prepaid visa or postal money order, etc. Most asian ISPs I > have dealt with don't accept credit cards for service anyway. > > As to cost, if $80 or $100 per month is too much, I guess you use Tor. > I'm of the mind that this is extremely cheap for 3-5 nodes spread across > the world, especially considering that this barely got you a single colo'd > server 8 years ago. > > Comments ? Where does this break down, given the modest requirements > described ? If all you're looking to do is avoid data-mining and digital footprints being stored by non-state actors, I think it would suffice, as long as you were careful with the shell/VPS providers. Mix it up, and connect to a free shell provider (if you aren't doing anything that requires stronger anonymity) or server that has other accounts, as mentioned, to use as an "exit node" in order to hide your exit traffic from upstream camping, and of course use a browser that's resistant to browser-fingerprinting, and all of that standard jazz. From amstaff at tds.net Mon Nov 8 05:39:44 2010 From: amstaff at tds.net (amstaff at tds.net) Date: Mon, 8 Nov 2010 19:09:44 +0530 Subject: ~Rolex, Breitling, Cartier~ 50% Off Select Models Message-ID: <9299670652.TK21PU9O098386@boxvezmwrihu.rszlfqk.tv> Click Here to View as Webpage http://shorty.im/u/8317 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 265 bytes Desc: not available URL: From bdelloida-9ssn67 at some-day.ru Mon Nov 8 20:21:58 2010 From: bdelloida-9ssn67 at some-day.ru (=?koi8-r?B?7sXEz8LSz9PP18XT1M7P09TYINDP09TB193Jy8/X?=) Date: Mon, 8 Nov 2010 23:21:58 -0500 Subject: =?koi8-r?B?7sXEz8LSz9PP18XT1M7ZxSDQz9PUwdfdycvJLiDrwcsg08/I0sHOydTY?= =?koi8-r?B?INfZ3sXU2Swg1crUySDP1CDP1NfF1NPU18XOzs/T1Mk=?= Message-ID: <000d01cb7fc5$a650a920$6400a8c0@bdelloida-9ssn67> 12 Ноября 2010г. Тема: Признаки недобросовестных поставщиков. Способы противодействия придиркам налоговой и снижение налоговой нагрузки по НДС +7 (Ч95) 4Ч5ЧО95 <<>> 7.Ч2*91-98 курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут как можно уйти от НДС без последствий. Практика свидетельствует, что практически все проверки налогоплательщиков применяющих ОСН затрагивают данный вопрос с негативными для налогоплательщика последствиями. При этом налоговый орган исключает из состава затрат НП и вычетов по НДС суммы по контрагентам, которые, например, просто не отвечают на запрос в рамках встречных проверок, либо не заплатили налоги и т.п. Подчас очень тяжело отстоять свою правоту в спорах с налоговым органом. Обучающий курс посвящен вопросу защиты налогоплательщика, призван помочь ему как не погрязнуть в тотальных проверках своих контрагентов, так и в последствии защитить свои права по взаимоотношениям я такими компаниями. На семинаре не только будут показаны способы противодействия придиркам налоговой, но и будут разобраны способы заключения договоров, которые в принципе исключают возможность признания лица недобросовестным, а также законные способы снижение налоговой нагрузки по НДС в том случае, если налогоплательщик в этом заинтересован. Программа: 1.Методические указания Минфина о назначении выездных налоговых проверок. 2.Методические указания Минфина по поиску недобросовестных контрагентов. 3.Основания признания налоговой выгоды необоснованной (на основании судебной практики, писем Минфина, практики проверок). 4.Что необходимо сделать, чтобы проявить разумную осмотрительность. Какие документы и какую информацию о контрагенте необходимо собрать. 5.Как защититься от претензий налогового органа о том, что контрагент: * не платит налоги и не сдает отчетность; * не отвечает на встречные проверки; * не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; * директор БОМЖ, ничего не подписывал, его подпись подделали и т.п. * директор является "массовым", в отношении руководителя проводятся розыскные мероприятия; * проведенный осмотр показал, что компания не могла отгрузить товар с адреса, указанного в накладной, счете-фактуре; * коды ОКВЭД контрагента не позволяют ему произвести действия, которые он якобы произвел по отношению к налогоплательщику (не может выполнять работы, поставлять товар и тп., так как создан для иных целей); * иные претензии. 6.Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. 7.Уход от признания налоговой выгоды необоснованной путем особого способа заключения договоров. 8.Уход от уплаты НДС с наценки путем: * заключения договора с дополнительной выгодой; * заключение договора с предварительной куплей-продажей опциона; * включение условий о неустойки. 9.Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. 10.Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. Является ли потеря документов защитой от претензий правоохранительных органов. 11.Ответы на индивидуальные вопросы. Cтоимоcть: 7900 руб. Информацию можно получить по телефонам: (код Москвы) 742_9_i/9_8 : Ч.Ч.5-З-2//6*6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5140 bytes Desc: not available URL: From odin-design at odin-design.ru Mon Nov 8 19:53:23 2010 From: odin-design at odin-design.ru (=?koi8-r?B?9MHNz9bFzs7ZyiDTz8Da?=) Date: Tue, 9 Nov 2010 11:53:23 +0800 Subject: =?koi8-r?B?6drNxc7FzsnRINcg9MHNz9bFzs7PzSDLz8TFy9PFINMgMDEg0c7XwdLR?= =?koi8-r?B?IDIwMTAgx8/EwQ==?= Message-ID: <18218125F73F4904A833FB623F678FDD@BAYARAA> Дата: 18 - 19 Ноября ТЕМА: С 2010 г. Новый таможенный кодекс Таможенного союза. Все особенности нового закона. Правила регулирования в рамках Таможенного союза. С 1 ноября 2010г. вступает в силу приказ ФТС об отмене таможенного транзита грузов прибывших на территорию РФ морским и воздушным транспортом. С 1 января 2011 г. вводятся новый формы таможенных документов (декларация на товары, транзитная декларация, декларация таможенной стоимости и др.) и новый порядок их заполнения. 1 января 2011 г. вступают силу отдельные нормы таможенного кодекса в отношении юридических и физических лиц, осуществляющих деятельность в сфере таможенного регулирования. С 1 января 2011 г. ФТС планируется внедрить таможенные процедуры и технологии, предусматривающие, в том числе, переход на электронное декларирование при экспорте и импорте товаров без предоставления в таможенные органы соответствующих документов на бумажных носителях. С 01 января 2010 года вступили в силу: Товарная номенклатура ВЭД и Таможенный тариф Таможенного союза Единые правила нетарифного регулирования на территории Таможенного союза Единые правила таможенно-тарифного регулирования на территории государств-участников Таможенного союза Главами трех государств принят Таможенный кодекс Таможенного союза, который с 01 июля 2010 года стал главным законодательным актом, которым будут руководствоваться при совершении внешнеторговых операций участники ВЭД. Вместе с Таможенным кодексом Таможенного союза 01 июля 2010 года вступили в силу: Соглашения о порядке декларирования таможенной стоимости товаров и о порядке осуществления контроля правильности определения таможенной стоимости товаров, перемещаемых через таможенную границу таможенного союза Пакет документов, регламентирующих порядок применения санитарных, ветеринарно-санитарных и фитосанитарных мер, особенности и порядок обращения продукции, подлежащей обязательной оценке (подтверждению) соответствия на таможенной территории Таможенного союза Соглашение о принципах взимания косвенных налогов при экспорте и импорте товаров и протокол о порядке взимания косвенных налогов и механизме контроля за их уплатой при экспорте и импорте товаров в Таможенном союзе. тел. (код Москвы) 4Ч_53.96_8 ; 742/9*l_9-8 Программа: 1.Товарная Номенклатура ВЭД Таможенного Союза, вступившая в силу с 01 января 2010 года, ее основные отличия от ТН ВЭД РФ. Особенности таможенно-тарифного регулирования на территории Таможенного союза с 01 января 2010 года. Единый таможенный тариф Таможенного союза Тарифные преференции в отношении товаров, ввозимых на территорию Таможенного союза Тарифные льготы Тарифные квоты. 2.Единое нетарифное регулирование на территории Таможенного союза с 01 января 2010 года. Порядок введения и применения мер, затрагивающих внешнюю торговлю товарами, на единой таможенной территории в отношении третьих стран Товары, в отношении которых применяются запреты или ограничения на ввоз или вывоз государствами - участниками Таможенного союза в рамках ЕврАзЭс в торговле с третьими странами Особенности ввоза на таможенную территорию и вывоза с таможенной территории Таможенного союза товаров, ограниченных к перемещению через границу таможенного союза Правила и порядок выдачи лицензий и разрешений на экспорт-импорт, вступающие в силу с 01 января 2010 года. 3.Техническое регулирование, сертификация, применение санитарных, ветеринарных и фитосанитарных мер на территории таможенного союза с 01 января 2010 года. Особенности и порядок обращении продукции, подлежащей обязательной оценке (подтверждению) соответствия, на таможенной территории таможенного союза. Взаимное признание аккредитации органов по сертификации (подтверждению соответствия) и испытательных лабораторий (центров), выполняющих работы по подтверждению соответствия. Применение санитарных, ветеринарных и фитосанитарных мер на территории таможенного союза (перечни товаров, формы документов, порядок осуществления контроля, и.т.д.) 4.Таможенный кодекс Таможенного союза (ТК ТС) и его основные отличия от Таможенного кодекса Российской Федерации. Мероприятия, необходимые для вступления в силу ТК ТС и сроки их проведения. Изменение терминологии, применяемой в таможенном законодательстве. Таможенные процедуры, предусмотренные ТК ТС и их отличия от таможенных режимов, предусмотренных ТК России. Порядок совершения таможенных операций в отношении товаров, ввозимых на таможенную территорию ТС и вывозимых с его территории (прибытие, убытие, временное хранение, декларирование, выпуск товаров). Упрощение порядка совершения таможенных операций при декларировании и выпуске товаров, предусмотренные ТК ТС. Новеллы ТК ТС в части декларирования, выпуска товаров и таможенного контроля. Требования к лицам, осуществляющим деятельность в сфере таможенного дела. Переходный период, предусмотренный ТК ТС. Особенности исчисления, уплаты и возврата таможенных платежей в соответствие с ТК ТС. Расчет таможенных платежей при применении различных таможенных процедур. Способы обеспечения уплаты таможенных платежей, определение суммы обеспечения уплаты таможенных платежей, предусмотренные ТК ТС. Порядок, процедура и условия взыскания таможенных платежей. Прибытие товаров и транспортных средств на таможенную территорию Таможенного союза. Изменения в таможенной процедуре таможенного транзита, предусмотренные ТК ТС. Транзитная декларация: оформление, порядок подачи, регистрация. Особенности оформления транспортных и товаросопроводительных документов, необходимых для производства таможенного оформления и таможенного контроля на территории Таможенного союза. Обязанности и ответственность перевозчика при таможенной процедуре таможенного транзита. 5.Особенности определения, заявления, контроля и корректировки таможенной стоимости ввозимых товаров после вступления в силу Таможенного кодекса Таможенного союза, Соглашений о порядке декларирования таможенной стоимости товаров и о порядке осуществления контроля правильности определения таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза. 6.Особенности, порядок взимания косвенных налогов и механизм контроля за их уплатой при экспорте и импорте товаров после вступления в силу Соглашения о принципах взимания косвенных налогов, а также протокола о порядке взимания косвенных налогов и механизме контроля за их уплатой при экспорте и импорте товаров в Таможенном союзе. 7.Изменения в системе валютного регулирования и валютного контроля за внешнеторговыми операциями в Таможенном союзе. Особенности валютного контроля в Таможенном союзе. Продолжительность: 2 дня Кол-во часов: 16 Стоимость: 17 900 рублей Вся информация по тел: +7 (Ч95) ЧЧ539*68 или 4Ч5*3968 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10416 bytes Desc: not available URL: From ezcommerce at bizwiz.com Tue Nov 9 01:14:04 2010 From: ezcommerce at bizwiz.com (Donnell Pratt) Date: Tue, 9 Nov 2010 12:14:04 +0300 Subject: =?koi8-r?B?+8XOx8XOIMkgxNLVx8nFINPU0sHO2S4g58HSwc7UydEhLCDXINQu3i4g?= =?koi8-r?B?08zP1s7ZxSDTzNXewcku?= Message-ID: <000d01cb7fee$7466cfb0$6400a8c0@ezcommerce> КРУПНЕЙШИЙ ЛЕГАЛЬНЫЙ ВИЗОВЫЙ ОПЕРАТОР. +7 (495) 229 11 97 (круглосуточно / без выходных) Телефон нашего колл-центра - +7 (495) 229 11 97 СПЕЦПРЕДЛОЖЕНИЕ. Испания. Шенгенская мульти-виза - 6 месяцев за 350 у.е Шенгенские ДЕЛОВЫЕ мульти-визы (Италия, Швейцария, Франция, Германия) Мульти-виза за 3 РАБОЧИХ ДНЯ Среднесрочные - 1 год - 950 у.е, 6 месяцев - 750 у.е, 3 месяца - 550 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е, 4 года - 3 200 у.е. (сбор включен) Шенгенские мультивизы для уроженцев и жителей Северного Кавказа и паспортов с отказами (граждане России). Мы также поможем с визой в: США, Великобритания, Кипр, Китай. Найдете ДЕШЕВЛЕ - мы дадим СКИДКУ !!! ОПЛАТА только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. +7 (495) 229 11 97 (круглосуточно / без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2390 bytes Desc: not available URL: From eugen at leitl.org Tue Nov 9 03:18:26 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 9 Nov 2010 12:18:26 +0100 Subject: Google is polluting the internet Message-ID: <20101109111826.GA28998@leitl.org> ----- Forwarded message from Flick Harrison ----- From meryl.twilagv at minmail.net Tue Nov 9 12:43:11 2010 From: meryl.twilagv at minmail.net (Meryl Twila) Date: Tue, 09 Nov 2010 13:43:11 -0700 Subject: You Have Everything To Gain! 3-4 inches more to yourPenis, 100% MoneyBack Guaranteeed pr In-Reply-To: <21dc01cb7f61$17133d28$be26ef95@co9n0i1> Message-ID: <4CD9B25F.1AF193EC@minmail.net> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://kissmee.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 845 bytes Desc: not available URL: From buh at siwa.spb.ru Tue Nov 9 02:17:09 2010 From: buh at siwa.spb.ru (Lidia Espinosa) Date: Tue, 9 Nov 2010 15:47:09 +0530 Subject: =?koi8-r?B?8sXHydPU0sHDydEgydrNxc7FzsnKICjCxdog187F08XOydEgydrNxc7F?= =?koi8-r?B?zsnKINcg9eQp?= Message-ID: <89856564011B4712B161EACDBE001D23@Seminar> ЛИКВИДАЦИЯ ПРЕДПРИЯТИЙ без проверок (Все регионы России) Вариант ликвидации компании, который предлагаем мы - перевод предприятия на наших учредителей с заменой генерального директора на иностранную управляющую компанию, либо на иностранного директора. Перерегистрация ООО - 2 900 рублей Подготовка документов в течение 1 рабочего дня Возможна сдача документов в ГНИ-46 без директора +7(495) 211-17-11 - круглосуточно / без выходных Полный комплекс услуг по регистрации и перерегистрации предприятий Юридический адрес - от 10 000 рублей 1. Регистрация ООО – от 2 900 рублей 2. Регистрация Индивидуального предпринимателя - 1 500 рублей 3. Регистрация ОАО, ЗАО - 15 000 рублей 4. Аккредитация представительств – от 6 000 рублей 5. Регистрация изменений (без внесения изменений в УД) – от 2 900 рублей Регистрация оффшоров Ликвидация ООО и ЗАО Юридические услуги, АРБИТРАЖ +7(495) 211-17-11 - круглосуточно / без выходных ПЕРЕЧЕНЬ ДОКУМЕНТОВ И ИНФОРМАЦИЯ НЕОБХОДИМАЯ ДЛЯ ПЕРЕРЕГИСТРАЦИИ ООО: Предоставить простые (не заверенные) ксерокопии (можно выслать по факсу или электронной почте) - устав + все изменения к ним (если были); - свидетельство о постановке на налоговый учет (ИНН); - справка о присвоении статистических кодов (ОКВЭД); - протоколы (решения) о создании и назначении исполнительных органов (Директора); - паспортные данные участников и директора; -выписка из ЕГРЮЛ (для подготовки документов нам можно предоставить старую, но актуальную выписку, а для заверения Заявления у нотариуса, необходимо предоставить выписку сроком не более месяца v можете получить сами или заказать получение у нас (получение выписки за сутки 1500 рублей) From mail at assa-design.ru Tue Nov 9 05:24:41 2010 From: mail at assa-design.ru (=?koi8-r?B?5snOwc7Tz9fZyiDS2d7Bxw==?=) Date: Tue, 9 Nov 2010 16:24:41 +0300 Subject: =?koi8-r?B?9d7F1CDSydPLz9csINPV3cXT1NfVwN3JyCDJINDSz8fOz9rJ0tXFzdnI?= Message-ID: <000d01cb8011$775687b0$6400a8c0@mail> Тема: Модернизация бюджета. Построение экономической модели предприятия. -------------------------------------------------------------------- В течение 3х дней с Вами занимаются практики в компьютерном классе. Преподавательский состав является экспертами в области управления проектами и их стабилизации. За более подробной информацuей обpащайтеcь по тел: (495) 742-девяносто один-98, 445-Ч0-девяносто пять На весь срок обучения каждый обучающийся обеспечивается индивидуальным рабочим местом в компьютерном классе. Лицензионное программное обеспечение, на котором Вы будете обучаться методам реструктуризации бюджета, будет выдано Вам в конце семинара. А для профессиональной работы, Вам по прибытию на предприятие нужно будет всего лишь установить данную программу на свой компьютер и начать выдавать результаты. Дата проведения занятий: 22 - 24 Ноября 2010г. Краткая информация о семинаре: * В последствии решений для предприятий! это самое главное распознать и просчитать в условиях плановых задач факторы, которые, дестабилизируют деятельность предприятия, не только в условиях кризиса но и финансовой неопределенности. * Вы не поверите, но за 3 дня занятий Вы получите все ответы на вопросы, которые возникли у Вас и Вашего предприятия. Данной серией семинаров мы занимаемся с 2000г. и обучили уже более 4000 специалистов. * В условиях неопределенности рынка возникает необходимость поиска решений. Мы знаем, как помочь Вам, так как, начиная еще с прошлого века девяносто седьмого года, наша компания разрабатывает пакет программ (интегрирует их с методическими материалами и подготавливает обучающие курсы) для планирования бюджета, анализа текущего, сравнения плана и факта, поиска и принятия решений, отслеживания выполнения намеченных программ. * В итоге обучения на семинаре Вы сможете определить и найти решения по вопросам, которые в условиях кризиса возникают у компаний, а именно: Оборачиваемость капитала его недостаток, как обеспечить покрытие; как распорядиться текущими поступлениями (куда надо тратить, а куда нет); стоит ли привлекать процентные и иные дорогостоящие средства? если да, то минимизировать период использования за счет выделения собственных, то есть оптимизировать оборотные ср-ва. Рассмотрение возможных периодов с повышенными рисками используя многопараметральный экономический анализ для поиска решений; выявление нестабильности денежных средств, определение их дефицита, разработка сценария для ожидаемых трудностей, принятие сценария что следует сокращать а что увеличивать. Обучение методу от обратного для рассмотрения постатейного анализа бюджета, использование метода точки ╚0╩ для стабилизации не только затрат но и управление доходами предприятия и ценообразованием; как разработать плановый бюджет максимально приближенный к фактическому проанализировать его и принять за основу в ближайшем периоде. И еще множество других вопросов, на которые Вы услышите ответы. Около 4ОО их будет рассмотрено на семинаре. * В результате обучения, Вы, как профессионал сможете управлять любой формой финансовых отношений. Быть подготовленным к любым неожиданностям. 1 день * Создание первого тестового проекта, используя полученное задание. Знакомство программным комплексом. Изучение и рассмотрение на практике фин. методов, выбор для создаваемого проекта. Использование программ для выполнения полученного задания. Первые шаги в отборе полученных результатов используя фин. контрольные точки. Поэтапное построение проекта и анализ его при помощи выбранного метода. 2 день * Получение отчетов по проекту, знакомство, изучение. Изучение финансового анализа (показатели) практическое применение, рассмотрение в текущей ситуации. Финансовый контролинг для изучения и исправления ошибок в созданном проекте. Поиск ошибок рассмотрение и исправление. Последовательность применение метода. Для фиксирования темы и ее лучшего понимания создание II го проекта при помощи ПО. Созданный проект начинаем анализировать. 3 день * При помощи новых технологий анализа и программы, реструктурируем проекты с новыми параметрами, проводим отбор и проверяет на устойчивость. Описываем все риски, отклонения для проекта, помещаем в виртуальную реальность, получаем результаты, ищем оптимальное решение. Отбор планового проекта, загрузка фактических данных и сравнение проектов. Эмулирование риск-факторов влияющих на бюджет пр. Создание модели управления потоками. Поиск оборотных средств за счет перераспределения потоков. Постатейные отклонения в проекте, оптимизация конечных результатов. Выявления дефицита ден. ср-в и поиск средств на покрытие, создание оптимальной схемы. Решения в управлении с использованием новых полученных результатов. Каждому участнику курсов: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: 1. Специализированная программа-профессиональная разработка фин. проектов! Программный продукт способен не только разрабатывать финансовую документацию на профессиональном уровне, в новой версии реализованы значительные возможности для планирования текущего бюджета предприятий. 2. Программа для построения, развития и управления экономической моделью предприятия. Управления инвестиционными проектами, сравнение план/факт, мониторинг бюджета предприятия в реальном времени Возможность написания собственных формул, сценария диагностики проекта, перепрограммирование и настройка программы. 3. Программа экспресс подготовки экономического проекта. Позволяет всего за пару часов создать очень приличный проект для принятия решений по глобальным разработкам. 4. Материал методический: печатный для самостоятельной разработки и подготовки экономической документации, бизнес планов, ТЭО, инвестиционных проектов. 5. Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него обучающийся специалист может эффективно разрабатывать свои сценарии финансовых проектов. ------------------------------------------------------------------------- По вопpоcам pегucтаpацuu обpащайтеcь по тел: (495) 742.9I 98 (Ч95) 4Ч5-4О/95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7556 bytes Desc: not available URL: From eugen at leitl.org Tue Nov 9 08:16:53 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 9 Nov 2010 17:16:53 +0100 Subject: GCHQ goes Google Message-ID: <20101109161653.GB28998@leitl.org> http://www.theregister.co.uk/2010/11/08/gchq_google/ GCHQ goes Google Net spies turn to MapReduce By Chris Williams Posted in Government, 8th November 2010 13:36 GMT Britain's digital spies have turned to Google for help making sense of the floods of data now inundating their powerful computing resources. GCHQ, the Cheltenham-based signals intelligence agency, is recruiting an expert on MapReduce, the patented number-crunching technique previously behind the dominant web search engine. The agency's new lead researcher on data mining will be responsible for "developing MapReduce analytics on parallel computing clusters", a job advertisment reveals. MapReduce was developed by Google to index billions of web pages across its cluster of hundreds of thousands of commodity servers. It breaks up complicated tasks into smaller, easier computing problems that cheap hardware is capable of solving quickly. Google patented the technique earlier this year, but it remains free for other organisations to adopt via Hadoop, an open source project. Originally described in a 2004 research paper, MapReduce has allowed Google's algorithms to index a rapidly expanding web while keeping costs down. GCHQ faces similar a challenge as it gathers more and more raw data from internet communications, including email, social networks and VoIP. "Successful data-driven organisations must be able to process, interpret and rapidly respond to indicators derived from unprecedented volumes of data from disparate information sources," its recruitment advertisement says. The Register understands that GCHQ now has a cluster of more than 250,000 commodity servers under its Cheltenham "doughnut" building. In recent years it has developed this Google-style infrastructure instead of the very expensive, bespoke supercomputers it used to analyse microwave intercepts during the Cold War. While spies are planning research on MapReduce, Google has already moved on to BigTable, its new distributed database From dinkq at jamesmarzo.com Tue Nov 9 17:39:03 2010 From: dinkq at jamesmarzo.com (Dani In) Date: Tue, 09 Nov 2010 18:39:03 -0700 Subject: Xanax$1.90, Valium$2.15, Ativan$2.15, Vicodin ES $4.40, Free Shipping in the USA and Canada p0p8 In-Reply-To: <211301cb7def$df0d7a8f$6006cc16@al92vf2> Message-ID: <4CD9F7B7.694B6438@jamesmarzo.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://healthredplace.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 710 bytes Desc: not available URL: From buhg at luxrealestate.ru Tue Nov 9 03:49:32 2010 From: buhg at luxrealestate.ru (=?koi8-r?B?7sXEz8LSz9PP18XT1M7ZxSDLz87U0sHHxc7U2Q==?=) Date: Tue, 9 Nov 2010 18:49:32 +0700 Subject: =?koi8-r?B?89DP08/C2SDQ0s/UydfPxMXK09TXydEg0NLJxMnSy8HNIM7BzM/Hz9fP?= =?koi8-r?B?yiDJINPOydbFzsnFIM7BzM/Hz9fPyiDOwcfS1drLySDQzyDu5PM=?= Message-ID: 12 Ноября Тема: (Недобросовестные поставщики.) Практические рекомендации как отвечать налоговой инспекции в случае проверки недобросовестных контрагентов и как можно уйти от НДС без последствий 8 Моск. код: Ч45-39-68 или ЧЧ-5./З2_66 курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут как можно уйти от НДС без последствий. Практика свидетельствует, что практически все проверки налогоплательщиков применяющих ОСН затрагивают данный вопрос с негативными для налогоплательщика последствиями. При этом налоговый орган исключает из состава затрат НП и вычетов по НДС суммы по контрагентам, которые, например, просто не отвечают на запрос в рамках встречных проверок, либо не заплатили налоги и т.п. Подчас очень тяжело отстоять свою правоту в спорах с налоговым органом. Обучающий курс посвящен вопросу защиты налогоплательщика, призван помочь ему как не погрязнуть в тотальных проверках своих контрагентов, так и в последствии защитить свои права по взаимоотношениям я такими компаниями. На семинаре не только будут показаны способы противодействия придиркам налоговой, но и будут разобраны способы заключения договоров, которые в принципе исключают возможность признания лица недобросовестным, а также законные способы снижение налоговой нагрузки по НДС в том случае, если налогоплательщик в этом заинтересован. Программа: 1.Методические указания Минфина о назначении выездных налоговых проверок. 2.Методические указания Минфина по поиску недобросовестных контрагентов. 3.Основания признания налоговой выгоды необоснованной (на основании судебной практики, писем Минфина, практики проверок). 4.Что необходимо сделать, чтобы проявить разумную осмотрительность. Какие документы и какую информацию о контрагенте необходимо собрать. 5.Как защититься от претензий налогового органа о том, что контрагент: * не платит налоги и не сдает отчетность; * не отвечает на встречные проверки; * не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; * директор БОМЖ, ничего не подписывал, его подпись подделали и т.п. * директор является "массовым", в отношении руководителя проводятся розыскные мероприятия; * проведенный осмотр показал, что компания не могла отгрузить товар с адреса, указанного в накладной, счете-фактуре; * коды ОКВЭД контрагента не позволяют ему произвести действия, которые он якобы произвел по отношению к налогоплательщику (не может выполнять работы, поставлять товар и т.п., так как создан для иных целей); * иные претензии. 6.Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. 7.Уход от признания налоговой выгоды необоснованной путем особого способа заключения договоров. 8.Уход от уплаты НДС с наценки путем: * заключения договора с дополнительной выгодой; * заключение договора с предварительной куплей-продажей опциона; * включение условий о неустойки. 9.Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. 10.Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. Является ли потеря документов защитой от претензий правоохранительных органов. 11.Ответы на индивидуальные вопросы. Cтоимоcть: 7900 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: \Моск. код/ 792_2i_2/2 **** 44_5З9/68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5187 bytes Desc: not available URL: From buhg at mokus.ru Tue Nov 9 02:11:27 2010 From: buhg at mokus.ru (Darnell Crews) Date: Tue, 9 Nov 2010 19:11:27 +0900 Subject: =?koi8-r?B?59LV2s/QxdLF18/ay8kgzMDCz8og08zP1s7P09TJ?= Message-ID: <000d01cb7ff6$78e1d6e0$6400a8c0@buhg> Транспортные услуги Компания "МосАвтоТранзит" специализируется на оказании услуг в области грузоперевозок любой сложности. - перевозка грузов автомобильным транспортом по России, СНГ и Дальнему зарубежью. - перевозка грузов от 1 кг автомобильным транспортом по России. - перевозка негабаритного груза - перевозка опасных грузов - рефрижераторные перевозки - перевозка контейнеров железнодорожным транспортом - логистика - хранение - страхование Специалисты компании обладают большим опытом. Компания имеет собственный автопарк, а так же работает с привлеченным транспортом. Мы предлагаем своим клиентам выгодные и надежные условия сотрудничества! Гарантия сроков доставки грузов, высокое качество, оперативность, конфиденциальность, приемлемые цены, гибкая система скидок. Наши контактные телефоны: Многоканальный Моб. Факс +7 /495/ 229 46 87 +7 /499/ 409 84 05 +7 /915/ 213 76 05 /грузоперевозки/, icq 367-051-072 +7 /906/ 794 29 31 /грузоперевозки/, icq 553-806-483 +7 /495/ 611 11 54 Звоните и мы с радостью ответим на все интересующие вас вопросы! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2549 bytes Desc: not available URL: From 0-6625-1-hotmail_com at info.val.ne.jp Tue Nov 9 08:54:15 2010 From: 0-6625-1-hotmail_com at info.val.ne.jp (CLEARANCE SALE) Date: Tue, 9 Nov 2010 19:54:15 +0300 Subject: Free Shipping on ALL Orders! Message-ID: <3342495339.YDFAVXMP748918@odkbclhyv.rydty.com> View our Immense selection of Merchandise Here http://urlzen.com/281q -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 272 bytes Desc: not available URL: From buhg at nawm.ru Tue Nov 9 05:18:46 2010 From: buhg at nawm.ru (=?koi8-r?B?8NLB188gzsEgyc7UxcwuINPPwtPU1y4=?=) Date: Tue, 9 Nov 2010 20:18:46 +0700 Subject: =?koi8-r?B?78PFzsvBIMnO1MXMzMXL1NXBzNjOz8og08/C09TXxc7Oz9PUyQ==?= Message-ID: <0E901157A9184A8886E7987EB2E6E658@TEL491946E23F2> Тема: Актуальные вопросы применения патентного законодательства на предприятии Московский код; Ч45/З*9.6_8 <<>> Ч4-5З_96-8 Дата учебного курса: 16 ноября 2010г. Цель: 1.Изучить изменения в законодательство об интеллектуальной собственности. 2.Познакомиться с основами права интеллектуальной собственности РФ. 3.Обсудить практические проблемы, возникающие в сфере применения права интеллектуальной собственности. 4.Проанализировать практику применения конкретных норм авторского и смежных прав. Расписание занятий: 1.Понятие интеллектуальной собственности. Международное регулирование прав интеллектуальной собственности. Проблемы соотношения товарных знаков, доменных имен, фирменных наименований, коммерческих обозначений. Проблемные вопросы режима коммерческой тайны и ноу-хау. 2.Регулирование авторского права 3.Регулирование смежных прав 4.Регулирование патентного права. 5.Вопросы оценки интеллектуальной собственности. 6.Защита результатов интеллектуальной деятельности и средств индивидуализации. 7.Рассмотрение судебной практики по конкретным вопросам, касающимся авторского права, смежных прав, товарных знаков Учебные материалы и презентация: Сборник слайдов, сборник практических заданий. Методология преподавания: Обучение проводится в интерактивной форме, предполагает большое количество дискуссий и выполнение практических заданий. За более подробной информацuей обpащайтеcь по тел: (Ч95) Ч45Ч095 **** 445_З266 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2984 bytes Desc: not available URL: From buhgalteria at 0585.ru Tue Nov 9 11:09:08 2010 From: buhgalteria at 0585.ru (=?koi8-r?B?78LIz8Qgz8TOz8TOxdfPyw==?=) Date: Tue, 9 Nov 2010 21:09:08 +0200 Subject: =?koi8-r?B?y8HLINbJ1NggwsXaIM/CzsHMyd7LySDJIMbJ0s0tz8TOz8TOxdfPyw==?= Message-ID: <42B984AB8EBA4095B892B2E9025F0399@sasepatrutrei> 15 ноября \Моск. код/ Ч45.32-66 и 4Ч5З266 Налоговое планирование в условиях кризиса. Законная альтернатива обналички и фирмам - однодневкам. 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности…); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) – как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей За более подробной информацuей обpащайтеcь по тел: \Моск. код/ Ч45_З266 : 4Ч5_З968 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3934 bytes Desc: not available URL: From direktor at forsklad.ru Tue Nov 9 22:55:30 2010 From: direktor at forsklad.ru (=?koi8-r?B?8MXSxdfF2sXN?=) Date: Tue, 9 Nov 2010 22:55:30 -0800 Subject: =?koi8-r?B?5M/T1MHXy8Egx9LV2sEg8vbkIMkgwdfUz9TSwc7T0M/S1M/N?= Message-ID: <000d01cb80a4$433f60d0$6400a8c0@direktor> Предлагаем полный спектр услуг в сфере железнодорожных перевозок. Компания Являемся членом Ассоциации Российских Экспедиторов имеем: - прямой договор с ОАО "Российские железные дороги" на перевозки экспортных, импортных и транзитных грузов по Российским железным дорогам (РЖД), а также внутри российские перевозки грузов; - прямой договор с ОАО "Первая грузовая компания"; - прямой договор с ОАО "ТрансКонтейнер"; - прямой договор с ОАО "Рефсервис"; - прямой договор с Белорусской железной дорогой на перевозку грузов; - прямой договор с Латвийской железной дорогой на перевозку грузов. Также: - имеем своих агентов, осуществляющих функции по контролю и подтверждению перевозок транзитных грузов через входные пограничные железнодорожные станции; - оказываем содействие по подаче подвижного состава; - возможность давать сквозную ставку на перевозку грузов по РЖД и железным дорогам государств-участников СНГ и стран Балтии; - располагаем собственным парком контейнеровозов, пригодных для перевозки 20,40,40НQ контейнеров. Машины оснащены системой спутниковой связи, позволяющей отслеживать местоположение автомобиля в режиме реального времени. Создадим выгодные и надежные условия менеджерам, ответственным за транспортировку продукции по ж.д. Контакты: Вагонные отправления +7 901═526-29-33 Контейнерные отправления +7 963═712-10-65 Международные контейнерные перевозки +7 903═728-86-19 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3412 bytes Desc: not available URL: From zooko at zooko.com Wed Nov 10 08:19:53 2010 From: zooko at zooko.com (Zooko O'Whielacronx) Date: Wed, 10 Nov 2010 08:19:53 -0800 Subject: [p2p-hackers] how do I tell these Chinese people "You're doing it wrong!" ? Message-ID: Dear people of p2p-hackers, tahoe-dev, and liberationtech: I think I confused the issue when I said in [1] "some people in China might be relying on using the Tahoe-LAFS public demo over unencrypted HTTP and thinking that it provides security properties like they would get if they ran their own copy of Tahoe-LAFS locally". Encryption of the HTTP connection isn't very important, so it was confusing when I mentioned "over unencrypted HTTP". I should have just said "some people in China might be relying on using the Tahoe-LAFS public demo and thinking that it provides security properties like they would get if they ran their own copy of Tahoe-LAFS locally". Look at this diagram: http://tahoe-lafs.org/source/tahoe-lafs/trunk/docs/about.html Using an unencrypted connection (HTTP or FTP) between the Tahoe-LAFS client and the Tahoe-LAFS gateway means that the link between those two objects on the diagram is red, meaning that you are vulnerable to anyone who controls that link. If you instead used an encrypted connection (HTTPS or SFTP) between those two objects then that link would be black, meaning that you are not vulnerable to someone just because they control that link. But you are still vulnerable to whoever controls the Tahoe-LAFS gateway which the link goes to! The right way to do it is to run the Tahoe-LAFS gateway yourself on a computer that you control. The Tahoe-LAFS gateway object is red on that diagram, meaning that you rely on it for your security, which is why you should run it on a computer that you control. You could run it on the same laptop or desktop that you are running your web browser (which is acting as the Tahoe-LAFS client), in which case it doesn't matter whether you use HTTP or HTTPS because the connection is only running over the loopback interface anyway. Or you could run it on some other computer that you control, in which case you need to use HTTPS so that you aren't vulnerable to anyone who controls the link between your local computer running your web browser on and your remote computer running your Tahoe-LAFS gateway. So, how do we explain to these Chinese users (and everyone else) that if they want good security, they must run a Tahoe-LAFS gateway (which is a web server) on a computer they control? Perhaps it would help to draw one variant of this diagram showing a user using a gateway on a remote server and being vulnerable to the people who control that server (which may include more people than the server's legal owner thinks), and another picture showing a user using a gateway on his local machine and being safe against the threat of the server operator betraying him. Does anyone have design skills (and Chinese!) and could try to explain this? Here is the source code for the current version of the diagram: http://tahoe-lafs.org/source/tahoe-lafs/trunk/docs/network-and-reliance-topology.svg Regards, Zooko [1] http://lists.zooko.com/pipermail/p2p-hackers/2010-November/002551.html _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From direktor at cinemanya.ru Wed Nov 10 00:07:48 2010 From: direktor at cinemanya.ru (Jesse Ott) Date: Wed, 10 Nov 2010 11:07:48 +0300 Subject: =?koi8-r?B?+8XOx8XO08vJxSDN1czY1Mkt18na2SEg58HSwc7UydEhIO/QzMHUwSDQ?= =?koi8-r?B?z9PMxSDX2cjPxMEg18na2SEg?= Message-ID: <000d01cb80ae$5d25e320$6400a8c0@direktor> КРУПНЕЙШИЙ ЛЕГАЛЬНЫЙ ВИЗОВЫЙ ОПЕРАТОР. +7 (495) 229 11 97 (круглосуточно / без выходных) Телефон нашего колл-центра - +7 (495) 229 11 97 СПЕЦПРЕДЛОЖЕНИЕ. Испания. Шенгенская мульти-виза - 6 месяцев за 350 у.е Шенгенские ДЕЛОВЫЕ мульти-визы (Италия, Швейцария, Франция, Германия) Мульти-виза за 3 РАБОЧИХ ДНЯ Среднесрочные - 1 год - 950 у.е, 6 месяцев - 750 у.е, 3 месяца - 550 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е, 4 года - 3 200 у.е. (сбор включен) Шенгенские мультивизы для уроженцев и жителей Северного Кавказа и паспортов с отказами (граждане России). Мы также поможем с визой в: США, Великобритания, Кипр, Китай. Найдете ДЕШЕВЛЕ - мы дадим СКИДКУ !!! ОПЛАТА только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. +7 (495) 229 11 97 (круглосуточно / без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2390 bytes Desc: not available URL: From eugen at leitl.org Wed Nov 10 03:05:55 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 10 Nov 2010 12:05:55 +0100 Subject: Waterboarding for dummies Message-ID: <20101110110555.GH28998@leitl.org> It seems quite a lot of people have earned to be waterboarded to death. http://www.salon.com/news/feature/2010/03/09/waterboarding_for_dummies Waterboarding for dummies Internal CIA documents reveal a meticulous protocol that was far more brutal than Dick Cheney's "dunk in the water" BY MARK BENJAMIN Salon/AP In background: Former Vice President Dick Cheney Self-proclaimed waterboarding fan Dick Cheney called it a no-brainer in a 2006 radio interview: Terror suspects should get a "a dunk in the water." But recently released internal documents reveal the controversial "enhanced interrogation" practice was far more brutal on detainees than Cheney's description sounds, and was administered with meticulous cruelty. Interrogators pumped detainees full of so much water that the CIA turned to a special saline solution to minimize the risk of death, the documents show. The agency used a gurney "specially designed" to tilt backwards at a perfect angle to maximize the water entering the prisoner's nose and mouth, intensifying the sense of choking b and to be lifted upright quickly in the event that a prisoner stopped breathing. The documents also lay out, in chilling detail, exactly what should occur in each two-hour waterboarding "session." Interrogators were instructed to start pouring water right after a detainee exhaled, to ensure he inhaled water, not air, in his next breath. They could use their hands to "dam the runoff" and prevent water from spilling out of a detainee's mouth. They were allowed six separate 40-second "applications" of liquid in each two-hour session b and could dump water over a detainee's nose and mouth for a total of 12 minutes a day. Finally, to keep detainees alive even if they inhaled their own vomit during a session b a not-uncommon side effect of waterboarding b the prisoners were kept on a liquid diet. The agency recommended Ensure Plus. "This is revolting and it is deeply disturbing," said Dr. Scott Allen, co-director of the Center for Prisoner Health and Human Rights at Brown University who has reviewed all of the documents for Physicians for Human Rights. "The so-called science here is a total departure from any ethics or any legitimate purpose. They are saying, bThis is how risky and harmful the procedure is, but we are still going to do it.' It just sounds like lunacy," he said. "This fine-tuning of torture is unethical, incompetent and a disgrace to medicine." These torture guidelines were contained in a ream of internal government documents made public over the past year, including a legal review of Bush-era CIA interrogations by the Justice Department's Office of Professional Responsibility released late last month. Though public, the hundreds of pages of documents authorizing or later reviewing the agency's "enhanced interrogation program" haven't been mined for waterboarding details until now. While Bush-Cheney officials defended the legality and safety of waterboarding by noting the practice has been used to train U.S. service members to resist torture, the documents show that the agency's methods went far beyond anything ever done to a soldier during training. U.S. soldiers, for example, were generally waterboarded with a cloth over their face one time, never more than twice, for about 20 seconds, the CIA admits in its own documents. (After this story was published, Salon learned that Marcy Wheeler, the author of the blog Emptywheel, and several other bloggers have written about many of the documents released over the past year.) These memos show the CIA went much further than that with terror suspects, using huge and dangerous quantities of liquid over long periods of time. The CIA's waterboarding was "different" from training for elite soldiers, according to the Justice Department document released last month. "The difference was in the manner in which the detainee's breathing was obstructed," the document notes. In soldier training, "The interrogator applies a small amount of water to the cloth (on a soldier's face) in a controlled manner," DOJ wrote. "By contrast, the agency interrogator ... continuously applied large volumes of water to a cloth that covered the detainee's mouth and nose." One of the more interesting revelations in the documents is the use of a saline solution in waterboarding. Why? Because the CIA forced such massive quantities of water into the mouths and noses of detainees, prisoners inevitably swallowed huge amounts of liquid b enough to conceivably kill them from hyponatremia, a rare but deadly condition in which ingesting enormous quantities of water results in a dangerously low concentration of sodium in the blood. Generally a concern only for marathon runners , who on extremely rare occasions drink that much water, hyponatremia could set in during a prolonged waterboarding session. A waterlogged, sodium-deprived prisoner might become confused and lethargic, slip into convulsions, enter a coma and die. Therefore, "based on advice of medical personnel," Principal Deputy Assistant Attorney General Steven Bradbury wrote in a May 10, 2005, memo authorizing continued use of waterboarding, "the CIA requires that saline solution be used instead of plain water to reduce the possibility of hyponatremia." The agency used so much water there was also another risk: pneumonia resulting from detainees inhaling the fluid forced into their mouths and noses. Saline, the CIA argued, might reduce the risk of pneumonia when this occurred. "The detainee might aspirate some of the water, and the resulting water in the lungs might lead to pneumonia," Bradbury noted in the same memo. "To mitigate this risk, a potable saline solution is used in the procedure." That particular Bradbury memo laid out a precise and disturbing protocol for what went on in each waterboarding session. The CIA used a "specially designed" gurney for waterboarding, Bradbury wrote. After immobilizing a prisoner by strapping him down, interrogators then tilted the gurney to a 10-15 degree downward angle, with the detainee's head at the lower end. They put a black cloth over his face and poured water, or saline, from a height of 6 to 18 inches, documents show. The slant of the gurney helped drive the water more directly into the prisoner's nose and mouth. But the gurney could also be tilted upright quickly, in the event the prisoner stopped breathing. Detainees would be strapped to the gurney for a two-hour "session." During that session, the continuous flow of water onto a detainee's face was not supposed to exceed 40 seconds during each pour. Interrogators could perform six separate 40-second pours during each session, for a total of four minutes of pouring. Detainees could be subjected to two of those two-hour sessions during a 24-hour period, which adds up to eight minutes of pouring. But the CIA's guidelines say interrogators could pour water over the nose and mouth of a detainee for 12 minutes total during each 24-hour period. The documents do not explain the extra four minutes to get to 12. Interrogators were instructed to pour the water when a detainee had just exhaled so that he would inhale during the pour. An interrogator was also allowed to force the water down a detainee's mouth and nose using his hands. "The interrogator may cup his hands around the detainee's nose and mouth to dam the runoff," the Bradbury memo notes. "In which case it would not be possible for the detainee to breathe during the application of the water." "We understand that water may enter b and accumulate in b the detainee's mouth and nasal cavity, preventing him from breathing," the memo admits. Should a prisoner stop breathing during the procedure, the documents instructed interrogators to rapidly tilt the gurney to an upright position to help expel the saline. "If the detainee is not breathing freely after the cloth is removed from his face, he is immediately moved to a vertical position in order to clear the water from his mouth, nose, and nasopharynx," Bradbury wrote. "The gurney used for administering this technique is specially designed so that this can be accomplished very quickly if necessary." Documents drafted by CIA medical officials in 2003, about a year after the agency started using the waterboard, describe more aggressive procedures te. In other words, breathe in his own vomit. The CIA recommended the use of Ensure Plus for the liquid diet. Plowing through hundreds of pages of these documents is an unsettling experience. On one level, the detailed instructions can be seen as helping to carry out kinder, gentler waterboarding, with so much care and attention given to making sure detainees didn't stop breathing, get pneumonia, breathe in their own vomit or die. But of course dead detainees tell no tales, so the CIA needed to keep many of its prisoners alive. It should be noted, though, that six human rights groups in 2007 released a report showing that 39 people who appeared to have gone into the CIA's secret prison network haven't shown up since. The careful attention to detail in the documents was also used to provide legal cover for the harsh and probably illegal interrogation tactics. As brutal as the waterboarding process was, the memos also reveal that the Bush-era Justice Department authorized the CIA to use it in combination with other forms of torture. Specifically, a detainee could be kept awake for more than seven days straight by shackling his hands in a standing position to a bolt in the ceiling so he could never sit down. The agency diapered and hand-fed its detainees during this period before putting them on the waterboard. Another memo from Bradbury, also from 2005, says that in between waterboarding sessions, a detainee could be physically slammed into a wall, crammed into a small box, placed in "stress positions" to increase discomfort and doused with cold water, among other things. The CIA's waterboarding regimen was so excruciating, the memos show, that agency officials found themselves grappling with an unexpected development: detainees simply gave up and tried to let themselves drown. "In our limited experience, extensive sustained use of the waterboard can introduce new risks," the CIA's Office of Medical Services wrote in its 2003 memo. "Most seriously, for reasons of physical fatigue or psychological resignation, theines say that after a case of "psychological resignation" by a detainee on the waterboard, an interrogator had to get approval from a CIA doctor before doing it again. The memo also contains a last, little-noticed paragraph that may be the most disturbing of all. It seems to say that the detainees subjected to waterboarding were also guinea pigs. The language is eerily reminiscent of the very reasons the Nuremberg Code was written in the first place. That paragraph reads as follows: "NOTE: In order to best inform future medical judgments and recommendations, it is important that every application of the waterboard be thoroughly documented: how long each application (and the entire procedure) lasted, how much water was used in the process (realizing that much splashes off), how exactly the water was applied, if a seal was achieved, if the naso- or oropharynx was filled, what sort of volume was expelled, how long was the break between applications, and how the subject looked between each treatment." Mark Benjamin is a national correspondent for Salon based in Washington, D.C. Read his other articles here. More Mark Benjamin From kabancea at oknafaq.ru Wed Nov 10 05:48:41 2010 From: kabancea at oknafaq.ru (=?koi8-r?B?5snOLiDtz8TFzMnSz9fBzsnF?=) Date: Wed, 10 Nov 2010 15:48:41 +0200 Subject: =?koi8-r?B?9yDQ0s/DxdPTxSDPwtXexc7J0SDQz8zV3sHFzSDQ0s/H0sHNzdUgwsXT?= =?koi8-r?B?0MzB1M7P?= Message-ID: <000d01cb80dd$fc40e430$6400a8c0@kabancea> Тема: Разработка финансовой документации (бизнес √ плана, ТЭО) практическая реализация. +7 Московский код: Ч4539/68 **** 4Ч5-39*68 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Информация об учебном курсе: Дата учебного курса: 22-23 ноября Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. Вся информация по тел: +7 (код Москвы) 7.9-2_2.I/2_2 <> ЧЧ-5Ч.095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4771 bytes Desc: not available URL: From eugen at leitl.org Wed Nov 10 13:43:07 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 10 Nov 2010 22:43:07 +0100 Subject: [p2p-hackers] how do I tell these Chinese people "You're doing it wrong!" ? Message-ID: <20101110214307.GK28998@leitl.org> ----- Forwarded message from Zooko O'Whielacronx ----- From 0-m at macnica.co.jp Wed Nov 10 09:40:49 2010 From: 0-m at macnica.co.jp (Ultimate_Replica) Date: Thu, 11 Nov 2010 00:40:49 +0700 Subject: Beautiful Unique Name Brand Luxurious Watches starting at $99 Message-ID: <7498008268.QVJFLBA5638672@hkpieye.aszupnnfkz.va> Click Here http://retwt.me/1OOdT -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 240 bytes Desc: not available URL: From k_fmariselaqj at christian.com Thu Nov 11 07:15:18 2010 From: k_fmariselaqj at christian.com (Kasie Marisela) Date: Thu, 11 Nov 2010 08:15:18 -0700 Subject: Vicodin ES/Brand Watson, Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 6iof In-Reply-To: <8ce901cb7ca1$912e1bbb$a5f6708c@145sr81> Message-ID: <4CDC0886.DB8E33F9@christian.com> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://messary.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 791 bytes Desc: not available URL: From andrew at parad.dp.ua Wed Nov 10 15:50:26 2010 From: andrew at parad.dp.ua (=?koi8-r?B?7s/Xz8UgzyDUwc3P1s7F?=) Date: Thu, 11 Nov 2010 08:50:26 +0900 Subject: =?koi8-r?B?987JzcHOycU6IMnazcXOxc7J0SDXIPTBzc/Wxc7Oz80g68/ExcvTxQ==?= Message-ID: <000d01cb8132$0c400060$6400a8c0@andrew> Дата: I8-I9 ноября 2010г. ТЕМА: С 2010 г. Новый таможенный кодекс Таможенного союза. Все особенности нового закона Правила регулирования в рамках Таможенного союза. С 1 ноября 2010г. вступает в силу приказ ФТС об отмене таможенного транзита грузов прибывших на территорию РФ морским и воздушным транспортом. С 1 января 2011 г. вводятся новый формы таможенных документов (декларация на товары, транзитная декларация, декларация таможенной стоимости и др) и новый порядок их заполнения. 1 января 2011 г. вступают силу отдельные нормы таможенного кодекса в отношении юридических и физических лиц, осуществляющих деятельность в сфере таможенного регулирования. С 1 января 2011 г. ФТС планируется внедрить таможенные процедуры и технологии, предусматривающие, в том числе, переход на электронное декларирование при экспорте и импорте товаров без предоставления в таможенные органы соответствующих документов на бумажных носителях. С 01 января 2010 года вступили в силу: Товарная номенклатура ВЭД и Таможенный тариф Таможенного союза Единые правила нетарифного регулирования на территории Таможенного союза Единые правила таможенно-тарифного регулирования на территории государств-участников Таможенного союза Главами трех государств принят Таможенный кодекс Таможенного союза, который с 01 июля 2010 года стал главным законодательным актом, которым будут руководствоваться при совершении внешнеторговых операций участники ВЭД. Вместе с Таможенным кодексом Таможенного союза 01 июля 2010 года вступили в силу: Соглашения о порядке декларирования таможенной стоимости товаров и о порядке осуществления контроля правильности определения таможенной стоимости товаров, перемещаемых через таможенную границу таможенного союза Пакет документов, регламентирующих порядок применения санитарных, ветеринарно-санитарных и фитосанитарных мер, особенности и порядок обращения продукции, подлежащей обязательной оценке (подтверждению) соответствия на таможенной территории Таможенного союза Соглашение о принципах взимания косвенных налогов при экспорте и импорте товаров и протокол о порядке взимания косвенных налогов и механизме контроля за их уплатой при экспорте и импорте товаров в Таможенном союзе. тел. +7 (код Москвы) ЧЧ5-З2*66 \\// 74_29|_98 Программа: 1.Товарная Номенклатура ВЭД Таможенного Союза, вступившая в силу с 01 января 2010 года, ее основные отличия от ТН ВЭД РФ. Особенности таможенно-тарифного регулирования на территории Таможенного союза с 01 января 2010 года. Единый таможенный тариф Таможенного союза Тарифные преференции в отношении товаров, ввозимых на территорию Таможенного союза Тарифные льготы Тарифные квоты. 2.Единое нетарифное регулирование на территории Таможенного союза с 01 января 2010 года. Порядок введения и применения мер, затрагивающих внешнюю торговлю товарами, на единой таможенной территории в отношении третьих стран Товары, в отношении которых применяются запреты или ограничения на ввоз или вывоз государствами - участниками Таможенного союза в рамках ЕврАзЭс в торговле с третьими странами Особенности ввоза на таможенную территорию и вывоза с таможенной территории Таможенного союза товаров, ограниченных к перемещению через границу таможенного союза Правила и порядок выдачи лицензий и разрешений на экспорт-импорт, вступающие в силу с 01 января 2010 года. 3.Техническое регулирование, сертификация, применение санитарных, ветеринарных и фитосанитарных мер на территории таможенного союза с 01 января 2010 года. Особенности и порядок обращении продукции, подлежащей обязательной оценке (подтверждению) соответствия, на таможенной территории таможенного союза. Взаимное признание аккредитации органов по сертификации (подтверждению соответствия) и испытательных лабораторий (центров), выполняющих работы по подтверждению соответствия. Применение санитарных, ветеринарных и фитосанитарных мер на территории таможенного союза (перечни товаров, формы документов, порядок осуществления контроля, и.т.д.) 4.Таможенный кодекс Таможенного союза (ТК ТС) и его основные отличия от Таможенного кодекса Российской Федерации. Мероприятия, необходимые для вступления в силу ТК ТС и сроки их проведения. Изменение терминологии, применяемой в таможенном законодательстве Таможенные процедуры, предусмотренные ТК ТС и их отличия от таможенных режимов, предусмотренных ТК России. Порядок совершения таможенных операций в отношении товаров, ввозимых на таможенную территорию ТС и вывозимых с его территории (прибытие, убытие, временное хранение, декларирование, выпуск товаров). Упрощение порядка совершения таможенных операций при декларировании и выпуске товаров, предусмотренные ТК ТС. Новеллы ТК ТС в части декларирования, выпуска товаров и таможенного контроля. Требования к лицам, осуществляющим деятельность в сфере таможенного дела. Переходный период, предусмотренный ТК ТС. Особенности исчисления, уплаты и возврата таможенных платежей в соответствие с ТК ТС. Расчет таможенных платежей при применении различных таможенных процедур. Способы обеспечения уплаты таможенных платежей, определение суммы обеспечения уплаты таможенных платежей, предусмотренные ТК ТС. Порядок, процедура и условия взыскания таможенных платежей. Прибытие товаров и транспортных средств на таможенную территорию Таможенного союза. Изменения в таможенной процедуре таможенного транзита, предусмотренные ТК ТС. Транзитная декларация: оформление, порядок подачи, регистрация. Особенности оформления транспортных и товаросопроводительных документов, необходимых для производства таможенного оформления и таможенного контроля на территории Таможенного союза. Обязанности и ответственность перевозчика при таможенной процедуре таможенного транзита. 5.Особенности определения, заявления, контроля и корректировки таможенной стоимости ввозимых товаров после вступления в силу Таможенного кодекса Таможенного союза, Соглашений о порядке декларирования таможенной стоимости товаров и о порядке осуществления контроля правильности определения таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза. 6.Особенности, порядок взимания косвенных налогов и механизм контроля за их уплатой при экспорте и импорте товаров после вступления в силу Соглашения о принципах взимания косвенных налогов, а также протокола о порядке взимания косвенных налогов и механизме контроля за их уплатой при экспорте и импорте товаров в Таможенном союзе. 7.Изменения в системе валютного регулирования и валютного контроля за внешнеторговыми операциями в Таможенном союзе. Особенности валютного контроля в Таможенном союзе. Продолжительность: 2 дня Кол-во часов: 16 Стоимость: 17 900 рублей За более подробной информацuей обpащайтеcь по тел: Московский код; 792/2l_22 <<<>>> 7Ч.29l/98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10411 bytes Desc: not available URL: From amiecarmelina_sp at prudentialdoss.com Thu Nov 11 10:59:14 2010 From: amiecarmelina_sp at prudentialdoss.com (Amie Carmelina) Date: Thu, 11 Nov 2010 11:59:14 -0700 Subject: Amazing increase in thickness of yourPenis, up to 30% with our miracle pills 6lh6 In-Reply-To: Message-ID: <4CDC3D02.1E2E211D@prudentialdoss.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://geminee.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 844 bytes Desc: not available URL: From jya at pipeline.com Thu Nov 11 13:42:19 2010 From: jya at pipeline.com (John Young) Date: Thu, 11 Nov 2010 16:42:19 -0500 Subject: Steve Coll: Leaks (The New Yorker) Message-ID: Like many supporters and detractors of Wikileaks Coll underestimates the intent of the initiative. The comparison to media is fatuous as though media, if not scholars, should be the dominant source of public information about governments and other authoritative institutions. Media and scholars are themselves authoritatives more like governments than different, enjoying privileges and protection all sides grant one another while condemning those outside their fold. None of the authoritatives are insurgencies and assuredly will find ways to "critique" whatever disturbs their perquisites and opportunities, using concepts and language meant to defuse and stigmatize threats. There is overmuch circularity in Coll's apolgia for media in which he presumes an enduring value in responsible media and scholarhip that has been squandered by timid rumination. This marks a failure to go beyond convention. One might suspect Wikileaks is laughing its ass off at the high-value conceit of supporters and detractors who are out to advance their own initiatives under guise of pondering the Wikileaks each has confected for that purpose -- and avoiding the high-risk of taking on a true threat to authoritatives. To be sure, Wikileaks as it has been might morph into a tamed beast like so many short-lived, opportunisticly aggressive insurgencies brought into submission with valorization, condemnation, attention, praise, notoriety, bribery, prizes and embrasure by mightily crafty and extremely well-endowed authoritatives who gobble up ambitious rebels like sweetmeats. Wikileaks would be smart to pull back from Ellsberg and those working diligently to manage it in the most favored direction, the prefabricated heroic, that is, all hat and no cattle. Another New Yorker article this week explores the self-affirming drive toward heroism. If not Assange's heroicly defiant Wikileaks peters out then many others more variable and durable, and that seems to be what's developing under the radar of all too delusional incisiveness. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eleanora_r_hassiehx at phelpsrefinishing.com Thu Nov 11 21:14:13 2010 From: eleanora_r_hassiehx at phelpsrefinishing.com (Eleanora Hassie) Date: Thu, 11 Nov 2010 22:14:13 -0700 Subject: Effective PenisEn1argement pill **ROCK SOLID hardness that feels bigger, wider and fuller 44 In-Reply-To: <63c601cb7ec6$97f66853$da240471@o4v3ja2> Message-ID: <4CDCCD25.240E561E@phelpsrefinishing.com> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://queueclean.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 725 bytes Desc: not available URL: From dolorispq at wipro.com Fri Nov 12 05:12:54 2010 From: dolorispq at wipro.com (Leanne Doloris) Date: Fri, 12 Nov 2010 06:12:54 -0700 Subject: Codeine 30/15mg for $203.70, 60/15mg for $385.80, 90/15mg for $562.50 17o In-Reply-To: <69a501cb7cc9$62ebddbf$63d37f28@g72rzg3> Message-ID: <4CDD3D56.8E34789C@wipro.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://refillhillard62r.ru/pill/Codeine -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 653 bytes Desc: not available URL: From GertrudeWoodruff at %CUSTOM_DOMAINS.jfet.org Fri Nov 12 08:46:47 2010 From: GertrudeWoodruff at %CUSTOM_DOMAINS.jfet.org (Prestigious watch and gifts) Date: Fri, 12 Nov 2010 12:46:47 -0400 Subject: Smart bags and the Swiss watch Message-ID: <086.965485WUFGH6934CSPY1738112@clothier.chinabyte.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 446 bytes Desc: not available URL: From info at smkzet.ru Fri Nov 12 02:59:39 2010 From: info at smkzet.ru (=?koi8-r?B?89DP0tkg0yDUwc3P1s7Fyg==?=) Date: Fri, 12 Nov 2010 12:59:39 +0200 Subject: =?koi8-r?B?7s/Xz8Ug1yD0wc3P1sXOzs/NIOvPxMXL08U=?= Message-ID: Дата: 18 - 19 Ноября ТЕМА: Внимание: особенности таможенного регулирования в рамках Таможенного союза. Новый таможенный кодекс с 2010 г. С 1 ноября 2010г. вступает в силу приказ ФТС об отмене таможенного транзита грузов прибывших на территорию РФ морским и воздушным транспортом. С 1 января 2011 г. вводятся новый формы таможенных документов (декларация на товары, транзитная декларация, декларация таможенной стоимости и др.) и новый порядок их заполнения. 1 января 2011 г. вступают силу отдельные нормы таможенного кодекса в отношении юридических и физических лиц, осуществляющих деятельность в сфере таможенного регулирования. С 1 января 2011 г. ФТС планируется внедрить таможенные процедуры и технологии, предусматривающие, в том числе, переход на электронное декларирование при экспорте и импорте товаров без предоставления в таможенные органы соответствующих документов на бумажных носителях. С 01 января 2010 года вступили в силу: Товарная номенклатура ВЭД и Таможенный тариф Таможенного союза Единые правила нетарифного регулирования на территории Таможенного союза Единые правила таможенно-тарифного регулирования на территории государств-участников Таможенного союза Главами трех государств принят Таможенный кодекс Таможенного союза, который с 01 июля 2010 года стал главным законодательным актом, которым будут руководствоваться при совершении внешнеторговых операций участники ВЭД. Вместе с Таможенным кодексом Таможенного союза 01 июля 2010 года вступили в силу: Соглашения о порядке декларирования таможенной стоимости товаров и о порядке осуществления контроля правильности определения таможенной стоимости товаров, перемещаемых через таможенную границу таможенного союза Пакет документов, регламентирующих порядок применения санитарных, ветеринарно-санитарных и фитосанитарных мер, особенности и порядок обращения продукции, подлежащей обязательной оценке (подтверждению) соответствия на таможенной территории Таможенного союза Соглашение о принципах взимания косвенных налогов при экспорте и импорте товаров и протокол о порядке взимания косвенных налогов и механизме контроля за их уплатой при экспорте и импорте товаров в Таможенном союзе. тел. код: (четыре девять пять) 792/2l.2*2 <<<>>> Ч45*З266 Программа: 1.Товарная Номенклатура ВЭД Таможенного Союза, вступившая в силу с 01 января 2010 года, ее основные отличия от ТН ВЭД РФ. Особенности таможенно-тарифного регулирования на территории Таможенного союза с 01 января 2010 года. Единый таможенный тариф Таможенного союза Тарифные преференции в отношении товаров, ввозимых на территорию Таможенного союза Тарифные льготы Тарифные квоты. 2.Единое нетарифное регулирование на территории Таможенного союза с 01 января 2010 года. Порядок введения и применения мер, затрагивающих внешнюю торговлю товарами, на единой таможенной территории в отношении третьих стран Товары, в отношении которых применяются запреты или ограничения на ввоз или вывоз государствами - участниками Таможенного союза в рамках ЕврАзЭс в торговле с третьими странами Особенности ввоза на таможенную территорию и вывоза с таможенной территории Таможенного союза товаров, ограниченных к перемещению через границу таможенного союза Правила и порядок выдачи лицензий и разрешений на экспорт-импорт, вступающие в силу с 01 января 2010 года. 3.Техническое регулирование, сертификация, применение санитарных, ветеринарных и фитосанитарных мер на территории таможенного союза с 01 января 2010 года. Особенности и порядок обращении продукции, подлежащей обязательной оценке (подтверждению) соответствия, на таможенной территории таможенного союза. Взаимное признание аккредитации органов по сертификации (подтверждению соответствия) и испытательных лабораторий (центров), выполняющих работы по подтверждению соответствия. Применение санитарных, ветеринарных и фитосанитарных мер на территории таможенного союза (перечни товаров, формы документов, порядок осуществления контроля, и.т.д.) 4.Таможенный кодекс Таможенного союза (ТК ТС) и его основные отличия от Таможенного кодекса Российской Федерации. Мероприятия, необходимые для вступления в силу ТК ТС и сроки их проведения. Изменение терминологии, применяемой в таможенном законодательстве. Таможенные процедуры, предусмотренные ТК ТС и их отличия от таможенных режимов, предусмотренных ТК России. Порядок совершения таможенных операций в отношении товаров, ввозимых на таможенную территорию ТС и вывозимых с его территории (прибытие, убытие, временное хранение, декларирование, выпуск товаров). Упрощение порядка совершения таможенных операций при декларировании и выпуске товаров, предусмотренные ТК ТС. Новеллы ТК ТС в части декларирования, выпуска товаров и таможенного контроля. Требования к лицам, осуществляющим деятельность в сфере таможенного дела. Переходный период, предусмотренный ТК ТС. Особенности исчисления, уплаты и возврата таможенных платежей в соответствие с ТК ТС. Расчет таможенных платежей при применении различных таможенных процедур. Способы обеспечения уплаты таможенных платежей, определение суммы обеспечения уплаты таможенных платежей, предусмотренные ТК ТС. Порядок, процедура и условия взыскания таможенных платежей. Прибытие товаров и транспортных средств на таможенную территорию Таможенного союза. Изменения в таможенной процедуре таможенного транзита, предусмотренные ТК ТС. Транзитная декларация: оформление, порядок подачи, регистрация. Особенности оформления транспортных и товаросопроводительных документов, необходимых для производства таможенного оформления и таможенного контроля на территории Таможенного союза. Обязанности и ответственность перевозчика при таможенной процедуре таможенного транзита. 5.Особенности определения, заявления, контроля и корректировки таможенной стоимости ввозимых товаров после вступления в силу Таможенного кодекса Таможенного союза, Соглашений о порядке декларирования таможенной стоимости товаров и о порядке осуществления контроля правильности определения таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза. 6.Особенности, порядок взимания косвенных налогов и механизм контроля за их уплатой при экспорте и импорте товаров после вступления в силу Соглашения о принципах взимания косвенных налогов, а также протокола о порядке взимания косвенных налогов и механизме контроля за их уплатой при экспорте и импорте товаров в Таможенном союзе. 7.Изменения в системе валютного регулирования и валютного контроля за внешнеторговыми операциями в Таможенном союзе. Особенности валютного контроля в Таможенном союзе. Продолжительность: 2 дня Кол-во часов: 16 Стоимость: 17 900 рублей Информацию можно получить по телефонам: 8 (Ч95) 792./2i-_22 \\// 4Ч5.ЧО95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10450 bytes Desc: not available URL: From eugen at leitl.org Fri Nov 12 05:42:22 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 12 Nov 2010 14:42:22 +0100 Subject: Steve Coll: Leaks (The New Yorker) Message-ID: <20101112134222.GX28998@leitl.org> ----- Forwarded message from John Young ----- From m.alishia_aq at fcmail.com Fri Nov 12 18:19:44 2010 From: m.alishia_aq at fcmail.com (Monika Alishia) Date: Fri, 12 Nov 2010 19:19:44 -0700 Subject: ViagraDiscounts, CheapCialis & Much More. Discreet Packaging and Fast Shipping hz2 In-Reply-To: Message-ID: <4CDDF5C0.37AE8714@fcmail.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://dujg.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 522 bytes Desc: not available URL: From arek539 at mychko.ru Fri Nov 12 07:31:25 2010 From: arek539 at mychko.ru (=?koi8-r?B?6c7XxdPULiDw0s/Fy9Q=?=) Date: Fri, 12 Nov 2010 21:01:25 +0530 Subject: =?koi8-r?B?8M/T1NLPxc7JxSDEyc7BzcnexdPLycggzc/ExczFyiDCwMTWxdTB?= Message-ID: <000d01cb827e$aae2edc0$6400a8c0@arek539> ТЕМА: Финансовая неопределенность для бюджета предприятия. Способы решений. Практика в компьютерном классе. -------------------------------------------------------------------- Компьютерный класс 3 дня, настоящей практики!С профессионалами своего дела в области бюджетного управления предприятием. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (495) 742-девяносто один-98, 445-Ч0-девяносто пять Для занятий чистой практикой! Всем участникам предоставляется индивидуальный компьютер на время семинара. Экономические задачи по перестроению бюджета будут решаться на лицензионном программном обеспечении, которое Вы получите в результате обучения Вам останется только вернуться на предприятие установить данную программу на свое рабочее место и приступить к оптимизации бюджета предприятия. Дата учебного курса: 22-24 ноября 2010г. Краткая информация о семинаре: * В последствии решений для предприятий! это самое главное распознать и просчитать в условиях плановых задач факторы, которые, дестабилизируют деятельность предприятия, не только в условиях кризиса но и финансовой неопределенности. * Вы не поверите, но за 3 дня занятий Вы получите все ответы на вопросы, которые возникли у Вас и Вашего предприятия. Данной серией семинаров мы занимаемся с 2000г. и обучили уже более 4000 специалистов. * В условиях неопределенности рынка возникает необходимость поиска решений. Мы знаем, как помочь Вам, так как, начиная еще с прошлого века девяносто седьмого года, наша компания разрабатывает пакет программ (интегрирует их с методическими материалами и подготавливает обучающие курсы) для планирования бюджета, анализа текущего, сравнения плана и факта, поиска и принятия решений, отслеживания выполнения намеченных программ. * В итоге обучения на семинаре Вы сможете определить и найти решения по вопросам, которые в условиях кризиса возникают у компаний, а именно: Оборачиваемость капитала его недостаток, как обеспечить покрытие; как распорядиться текущими поступлениями (куда надо тратить, а куда нет); стоит ли привлекать процентные и иные дорогостоящие средства? если да, то минимизировать период использования за счет выделения собственных, то есть оптимизировать оборотные ср-ва. Рассмотрение возможных периодов с повышенными рисками используя многопараметральный экономический анализ для поиска решений; выявление нестабильности денежных средств, определение их дефицита, разработка сценария для ожидаемых трудностей, принятие сценария что следует сокращать а что увеличивать. Обучение методу от обратного для рассмотрения постатейного анализа бюджета, использование метода точки ╚0╩ для стабилизации не только затрат но и управление доходами предприятия и ценообразованием; как разработать плановый бюджет максимально приближенный к фактическому проанализировать его и принять за основу в ближайшем периоде. И еще множество других вопросов, на которые Вы услышите ответы. Около 4ОО их будет рассмотрено на семинаре. * В результате обучения, Вы, как профессионал сможете управлять любой формой финансовых отношений. Быть подготовленным к любым неожиданностям. 1 день * Создание первого тестового проекта, используя полученное задание. Знакомство программным комплексом. Изучение и рассмотрение на практике фин. методов, выбор для создаваемого проекта. Использование программ для выполнения полученного задания. Первые шаги в отборе полученных результатов используя фин. контрольные точки. Поэтапное построение проекта и анализ его при помощи выбранного метода. 2 день * Получение отчетов по проекту, знакомство, изучение. Изучение финансового анализа (показатели) практическое применение, рассмотрение в текущей ситуации. Финансовый контролинг для изучения и исправления ошибок в созданном проекте. Поиск ошибок рассмотрение и исправление. Последовательность применение метода. Для фиксирования темы и ее лучшего понимания создание II го проекта при помощи ПО. Созданный проект начинаем анализировать. 3 день * При помощи новых технологий анализа и программы, реструктурируем проекты с новыми параметрами, проводим отбор и проверяет на устойчивость. Описываем все риски, отклонения для проекта, помещаем в виртуальную реальность, получаем результаты, ищем оптимальное решение. Отбор планового проекта, загрузка фактических данных и сравнение проектов. Эмулирование риск-факторов влияющих на бюджет пр. Создание модели управления потоками. Поиск оборотных средств за счет перераспределения потоков. Постатейные отклонения в проекте, оптимизация конечных результатов. Выявления дефицита ден. ср-в и поиск средств на покрытие, создание оптимальной схемы. Решения в управлении с использованием новых полученных результатов. Каждому участнику курсов: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: 1. Специализированная программа-профессиональная разработка фин. проектов! Программный продукт способен не только разрабатывать финансовую документацию на профессиональном уровне, в новой версии реализованы значительные возможности для планирования текущего бюджета предприятий. 2. Программа для построения, развития и управления экономической моделью предприятия. Управления инвестиционными проектами, сравнение план/факт, мониторинг бюджета предприятия в реальном времени Возможность написания собственных формул, сценария диагностики проекта, перепрограммирование и настройка программы. 3. Программа экспресс подготовки экономического проекта. Позволяет всего за пару часов создать очень приличный проект для принятия решений по глобальным разработкам. 4. Материал методический: печатный для самостоятельной разработки и подготовки экономической документации, бизнес планов, ТЭО, инвестиционных проектов. 5. Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него обучающийся специалист может эффективно разрабатывать свои сценарии финансовых проектов. ------------------------------------------------------------------------- Вся информация по тел: (495) 742 9I 98;; Ч45-40/девять пять -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9229 bytes Desc: not available URL: From darbynenitaso at messaging.sprintpcs.com Sat Nov 13 02:11:21 2010 From: darbynenitaso at messaging.sprintpcs.com (Darby Nenita) Date: Sat, 13 Nov 2010 03:11:21 -0700 Subject: No RX-Required to Order, Codeine 30/15mg for $203.70, 60/15mg for $385.80, 90/15mg for $562.50 hw5 In-Reply-To: <983701cb82d1$bb91d4f5$6ed0be02@y6l8972> Message-ID: <4CDE6449.AACF5974@messaging.sprintpcs.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://meddomingo18j.ru/pill/Codeine -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 673 bytes Desc: not available URL: From erick_evans_ul at tolomeiandassociates.com Fri Nov 12 19:22:13 2010 From: erick_evans_ul at tolomeiandassociates.com (Erick Evans) Date: Sat, 13 Nov 2010 03:22:13 +0000 Subject: Got a couple o bux to spare? 4fz In-Reply-To: Message-ID: <4CDE0465.93FE8E16@tolomeiandassociates.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 30534 bytes Desc: not available URL: From jeragq at eds.com Sat Nov 13 03:57:49 2010 From: jeragq at eds.com (June Era) Date: Sat, 13 Nov 2010 04:57:49 -0700 Subject: 100% herbal, 100% Natural, 100% Safe, The proven NaturalPenisEnhancement that works! 8q8 Message-ID: <4CDE7D3D.03559300@eds.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://geminee.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 849 bytes Desc: not available URL: From a_josephine_wc at levy.net Sat Nov 13 07:10:51 2010 From: a_josephine_wc at levy.net (Annamae Josephine) Date: Sat, 13 Nov 2010 08:10:51 -0700 Subject: Codeine (Methylmorphine) is a narcotic pain reliever, 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 n50 In-Reply-To: <193001cb8075$c37f6040$15545679@mzbl2d3> Message-ID: <4CDEAA7B.8BB39DDE@levy.net> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://pharmmarlow95s.ru/pill/Codeine -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 675 bytes Desc: not available URL: From pjosecj at alfa.com Sat Nov 13 08:59:50 2010 From: pjosecj at alfa.com (Piper Jose) Date: Sat, 13 Nov 2010 09:59:50 -0700 Subject: Viagra50/100mg - $1.85 |BUY NOW| Visa, MasterCard, eCheck accepted 01ys In-Reply-To: Message-ID: <4CDEC406.1FDDEF11@alfa.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://utfhs.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 539 bytes Desc: not available URL: From ceasterpd at artq.com.jfet.org Sat Nov 13 12:30:50 2010 From: ceasterpd at artq.com.jfet.org (Cristin Easter) Date: Sat, 13 Nov 2010 13:30:50 -0700 Subject: Let's grow your smallDick with this Effective PenisEn1argement pill 29ti In-Reply-To: <608901cb7e50$5aa1f234$afe6d54e@vm1oq53> Message-ID: <4CDEF57A.75655064@artq.com> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://grabfetch.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 705 bytes Desc: not available URL: From a.singh_il at centerbe.uninav.it Sat Nov 13 07:19:16 2010 From: a.singh_il at centerbe.uninav.it (Al Singh) Date: Sat, 13 Nov 2010 15:19:16 +0000 Subject: This stock is going to run like a scalded dog lq1 In-Reply-To: <1bbf01cb81e4$a2470005$6c88eaa5@f81t903> Message-ID: Hey that stick symbol is GACR.pk, call your broker NOW before is too late From theymos at mm.st Sat Nov 13 16:16:32 2010 From: theymos at mm.st (theymos) Date: Sat, 13 Nov 2010 18:16:32 -0600 Subject: [bitcoin-list] Bitcoin 0.3.15 is released Message-ID: http://www.bitcoin.org/smf/index.php?topic=1780.0 Version 0.3.15 is now available. Changes: - paytxfee switch is now per KB, so it adds the correct fee for large transactions - sending avoids using coins with less than 6 confirmations if it can - BitcoinMiner processes transactions in priority order based on age of dependencies - make sure generation doesn't start before block 74000 downloaded - bugfixes by Dean Gores - testnet, keypoololdest and paytxfee added to getinfo ------------------------------------------------------------------------------ Centralized Desktop Delivery: Dell and VMware Reference Architecture Simplifying enterprise desktop deployment and management using Dell EqualLogic storage and VMware View: A highly scalable, end-to-end client virtualization framework. Read more! http://p.sf.net/sfu/dell-eql-dev2dev _______________________________________________ bitcoin-list mailing list bitcoin-list at lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-list ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sat Nov 13 23:42:56 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 14 Nov 2010 08:42:56 +0100 Subject: [bitcoin-list] Bitcoin 0.3.15 is released Message-ID: <20101114074256.GV28998@leitl.org> ----- Forwarded message from theymos ----- From carlg at vermilion-sands.com Sun Nov 14 05:22:54 2010 From: carlg at vermilion-sands.com (carl guderian) Date: Sun, 14 Nov 2010 14:22:54 +0100 Subject: Steve Coll: Leaks (The New Yorker) Message-ID: On 13-nov-2010, at 10:12, Patrice Riemens wrote: > Waiting for Wikileaks to 'disclose and expose' war crimes to start > this discussion appears to me to be singularly unhelpful, and > that in many respects. Wikileaks simply bridges the gap between > what we had every good reasons to believe - and has been quite > well documented elsewhere, if not to such an (alas basically > indigestible) extent - and what we now know for fact. I don't > consider this a giant leap forward. I'd say the leaks have been a very big help, though unfortunately not in leading to official acknowledgment, let alone dealing with, the activities cited therein. What it has done is further document how our (meaning US) "best and brightest" news organizations and opinion leaders abandoned their responsibiliities before, during and after the Iraq war. As they continue to do, in that and in other matters. Tellingly, one editorial response to the leaks, after flat-out denials and hysterical worries about security, was that this wasn't news because "everyone knew" about the events. That last was somewhat true. Some of the stories, even backed with evidence, had leaked out over the years. But if reported at all, they were most often buried deep within a long story. And if a government spokesmen bellowed "nonsense," there was no follow-up and it was back to horse-race political reporting, murdered blonde college girls and wardrobe malfunctions at the Super Bowl. So "everyone" did know about this stuff, but just didn't think it important enough share it with the rest of us. Those who did they damned as "unserious." (George W. Bush's memoirs show a man who perfectly embodied this emphasis on fluff over substance. Anguish not over federal bumbling over Katrina, but over rapper Kanye West saying Bush didn't care about black people. No regrets over attacking Iraq at all, but allowing that the "Mission Accomplished" photo op may have been premature.) Wikileaks is your friend who's sick of seeing those you thought were your friends lying to you. So he grabs you by the shoulders and lays it out for you. You're in all kinds of trouble but your "friends" kept you distracting from seeing it and often covered up for those responsible for some of it. And Wikileaks brings one piece of evidence after another until you can no longer ignore the bullshit. And it's necessary, because the lying continues. Three years after the financial collapse, there's a lot in the news about foreclosures and the op-ed pages are debating over whether or not it's shameful to squat one's own repossessed house or just walk away. There's nothing about bankers enjoying record bonuses while "losing" evidence of mis- and malfeasance. Ten percent (really higher) unemployment, possibly permanent, but only cutting the deficit matters, with "hard choices" to be made. Pundits saying gravely that Americans must face Social Security cuts to make America great again (though nothing about bankers giving up bonuses). And Americans will suck it up rather than demand justice or better health care because the 2010 elections US is a "center-right" nation (not that voters are despairing). But it sucks when you suspect you're being played, and it sucks even harder when it's proved to you and you can no longer pretend otherwise. It's the sort of enlightenment that doesn't bring comfort but instead removes it. When a person yanks off the blinders, thanking them isn't your first response and sometimes not even your second. The sooner Wikileaks destroys what's left of the official media's credibility, the better. But it's not something we'll thank them for, and I'm sure they know it. I don't think anyone's laughing over there. Carl # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Nov 14 13:58:05 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 14 Nov 2010 22:58:05 +0100 Subject: Steve Coll: Leaks (The New Yorker) Message-ID: <20101114215805.GZ28998@leitl.org> ----- Forwarded message from carl guderian ----- From schneier at SCHNEIER.COM Sun Nov 14 21:16:43 2010 From: schneier at SCHNEIER.COM (Bruce Schneier) Date: Sun, 14 Nov 2010 23:16:43 -0600 Subject: CRYPTO-GRAM, November 15, 2010 Message-ID: CRYPTO-GRAM November 15, 2010 by Bruce Schneier Chief Security Technology Officer, BT schneier at schneier.com http://www.schneier.com A free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise. For back issues, or to subscribe, visit . You can read this issue on the web at . These same essays and news items appear in the "Schneier on Security" blog at , along with a lively comment section. An RSS feed is available. ** *** ***** ******* *********** ************* In this issue: Crowdsourcing Surveillance Internet Quarantines News Cargo Security Changes in Airplane Security Young Man in "Old Man" Mask Boards Plane in Hong Kong Schneier News Kahn, Diffie, Clark, and Me at Bletchley Park Changing Passwords ** *** ***** ******* *********** ************* Crowdsourcing Surveillance Internet Eyes is a U.K. startup designed to crowdsource digital surveillance. People pay a small fee to become a "Viewer." Once they do, they can log onto the site and view live anonymous feeds from surveillance cameras at retail stores. If they notice someone shoplifting, they can alert the store owner. Viewers get rated on their ability to differentiate real shoplifting from false alarms, can win 1000 pounds if they detect the most shoplifting in some time interval, and otherwise get paid a wage that most likely won't cover their initial fee. Although the system has some nod towards privacy, groups like Privacy International oppose the system for fostering a culture of citizen spies. More fundamentally, though, I don't think the system will work. Internet Eyes is primarily relying on voyeurism to compensate its Viewers. But most of what goes on in a retail store is incredibly boring. Some of it is actually voyeuristic, and very little of it is criminal. The incentives just aren't there for Viewers to do more than peek, and there's no obvious way to discouraging them from siding with the shoplifter and just watch the scenario unfold. This isn't the first time groups have tried to crowdsource surveillance camera monitoring. Texas's Virtual Border Patrol tried the same thing: deputizing the general public to monitor the Texas-Mexico border. It ran out of money last year, and was widely criticized as a joke. This system suffered the same problems as Internet Eyes -- not enough incentive to do a good job, boredom because crime is the rare exception -- as well as the fact that false alarms were very expensive to deal with. Both of these systems remind me of the one time this idea was conceptualized correctly. Invented in 2003 by my friend and colleague Jay Walker, US HomeGuard also tried to crowdsource surveillance camera monitoring. But this system focused on one very specific security concern: people in no-mans areas. These are areas between fences at nuclear power plants or oil refineries, border zones, areas around dams and reservoirs, and so on: areas where there should never be anyone. The idea is that people would register to become "spotters." They would get paid a decent wage (that and patriotism was the incentive), receive a stream of still photos, and be asked a very simple question: "Is there a person or a vehicle in this picture?" If a spotter clicked "yes," the photo -- and the camera -- would be referred to whatever professional response the camera owner had set up. HomeGuard would monitor the monitors in two ways. One, by sending stored, known, photos to people regularly to verify that they were paying attention. And two, by sending live photos to multiple spotters and correlating the results, to many more monitors if a spotter claimed to have spotted a person or vehicle. Just knowing that there's a person or a vehicle in a no-mans-area is only the first step in a useful response, and HomeGuard envisioned a bunch of enhancements to the rest of that system. Flagged photos could be sent to the digital phones of patrolling guards, cameras could be controlled remotely by those guards, and speakers in the cameras could issue warnings. Remote citizen spotters were only useful for that first step, looking for a person or a vehicle in a photo that shouldn't contain any. Only real guards at the site itself could tell an intruder from the occasional maintenance person. Of course the system isn't perfect. A would-be infiltrator could sneak past the spotters by holding a bush in front of him, or disguising himself as a vending machine. But it does fill in a gap in what fully automated systems can do, at least until image processing and artificial intelligence get significantly better. HomeGuard never got off the ground. There was never any good data about whether spotters were more effective than motion sensors as a first level of defense. But more importantly, Walker says that the politics surrounding homeland security money post-9/11 was just too great to penetrate, and that as an outsider he couldn't get his ideas heard. Today, probably, the patriotic fervor that gripped so many people post-9/11 has dampened, and he'd probably have to pay his spotters more than he envisioned seven years ago. Still, I thought it was a clever idea then and I still think it's a clever idea -- and it's an example of how to do surveillance crowdsourcing correctly. Making the system more general runs into all sorts of problems. An amateur can spot a person or vehicle pretty easily, but is much harder pressed to notice a shoplifter. The privacy implications of showing random people pictures of no-man's-lands is minimal, while a busy store is another matter -- stores have enough individuality to be identifiable, as do people. Public photo tagging will even allow the process to be automated. And, of course, the normalization of a spy-on-your-neighbor surveillance society where it's perfectly reasonable to watch each other on cameras just in case one of us does something wrong. This essay first appeared in ThreatPost. http://threatpost.com/en_us/blogs/difficulty-surveillance-crowdsourcing-110810 or http://tinyurl.com/36fqhku Internet Eyes: http://interneteyes.co.uk/ http://www.bbc.co.uk/news/uk-11460897 Opposition to Internet Eyes: http://www.disinfo.com/2010/10/internet-eyes-citizen-spy-game-the-new-stasi/ or http://tinyurl.com/2742z66 Virtual Border Patrol: http://homelandsecuritynewswire.com/texas-virtual-border-patrol-goes-line or http://tinyurl.com/2fnxzmt http://thelede.blogs.nytimes.com/2009/03/26/thousands-sign-up-for-virtual-border-patrol/ or http://tinyurl.com/cqqns3 http://immigrationclearinghouse.org/texas-virtual-border-system-ineffective-a-monumental-joke/ or http://tinyurl.com/ygmr8lb US HomeGuard: http://www.csoonline.com/article/218490/us-homeguard-someone-to-watch-over-you or http://tinyurl.com/2a2b4vh http://www.wired.com/wired/archive/11.06/start.html?pg=11 http://dissidentvoice.org/Articles6/Berkowitz_US-HomeGuard.htm http://www.wired.com/wired/archive/11.06/start.html?pg=11 Disguising yourself as a vending machine: http://laughlines.blogs.nytimes.com/2007/10/20/fearing-crime-japanese-wear-the-hiding-place/ or http://tinyurl.com/2bpuz8f ** *** ***** ******* *********** ************* Internet Quarantines Last month, Scott Charney of Microsoft proposed that infected computers be quarantined from the Internet. Using a public health model for Internet security, the idea is that infected computers spreading worms and viruses are a risk to the greater community and thus need to be isolated. Internet service providers would administer the quarantine, and would also clean up and update users' computers so they could rejoin the greater Internet. This isn't a new idea. Already there are products that test computers trying to join private networks, and only allow them access if their security patches are up-to-date and their antivirus software certifies them as clean. Computers denied access are sometimes shunned to a limited-capability sub-network where all they can do is download and install the updates they need to regain access. This sort of system has been used with great success at universities and end-user-device-friendly corporate networks. They're happy to let you log in with any device you want--this is the consumerization trend in action--as long as your security is up to snuff. Charney's idea is to do that on a larger scale. To implement it we have to deal with two problems. There's the technical problem--making the quarantine work in the face of malware designed to evade it, and the social problem--ensuring that people don't have their computers unduly quarantined. Understanding the problems requires us to understand quarantines in general. Quarantines have been used to contain disease for millennia. In general several things need to be true for them to work. One, the thing being quarantined needs to be easily recognized. It's easier to quarantine a disease if it has obvious physical characteristics: fever, boils, etc. If there aren't any obvious physical effects, or if those effects don't show up while the disease is contagious, a quarantine is much less effective. Similarly, it's easier to quarantine an infected computer if that infection is detectable. As Charney points out, his plan is only effective against worms and viruses that our security products recognize, not against those that are new and still undetectable. Two, the separation has to be effective. The leper colonies on Molokai and Spinalonga both worked because it was hard for the quarantined to leave. Quarantined medieval cities worked less well because it was too easy to leave, or--when the diseases spread via rats or mosquitoes--because the quarantine was targeted at the wrong thing. Computer quarantines have been generally effective because the users whose computers are being quarantined aren't sophisticated enough to break out of the quarantine, and find it easier to update their software and rejoin the network legitimately. Three, only a small section of the population must need to be quarantined. The solution works only if it's a minority of the population that's affected, either with physical diseases or computer diseases. If most people are infected, overall infection rates aren't going to be slowed much by quarantining. Similarly, a quarantine that tries to isolate most of the Internet simply won't work. Fourth, the benefits must outweigh the costs. Medical quarantines are expensive to maintain, especially if people are being quarantined against their will. Determining who to quarantine is either expensive (if it's done correctly) or arbitrary, authoritative and abuse-prone (if it's done badly). It could even be both. The value to society must be worth it. It's the last point that Charney and others emphasize. If Internet worms were only damaging to the infected, we wouldn't need a societally imposed quarantine like this. But they're damaging to everyone else on the Internet, spreading and infecting others. At the same time, we can implement systems that quarantine cheaply. The value to society far outweighs the cost. That makes sense, but once you move quarantines from isolated private networks to the general Internet, the nature of the threat changes. Imagine an intelligent and malicious infectious disease: That's what malware is. The current crop of malware ignores quarantines; they're few and far enough between not to affect their effectiveness. If we tried to implement Internet-wide--or even countrywide--quarantining, worm-writers would start building in ways to break the quarantine. So instead of nontechnical users not bothering to break quarantines because they don't know how, we'd have technically sophisticated virus-writers trying to break quarantines. Implementing the quarantine at the ISP level would help, and if the ISP monitored computer behavior, not just specific virus signatures, it would be somewhat effective even in the face of evasion tactics. But evasion would be possible, and we'd be stuck in another computer security arms race. This isn't a reason to dismiss the proposal outright, but it is something we need to think about when weighing its potential effectiveness. Additionally, there's the problem of who gets to decide which computers to quarantine. It's easy on a corporate or university network: the owners of the network get to decide. But the Internet doesn't have that sort of hierarchical control, and denying people access without due process is fraught with danger. What are the appeal mechanisms? The audit mechanisms? Charney proposes that ISPs administer the quarantines, but there would have to be some central authority that decided what degree of infection would be sufficient to impose the quarantine. Although this is being presented as a wholly technical solution, it's these social and political ramifications that are the most difficult to determine and the easiest to abuse. Once we implement a mechanism for quarantining infected computers, we create the possibility of quarantining them in all sorts of other circumstances. Should we quarantine computers that don't have their patches up to date, even if they're uninfected? Might there be a legitimate reason for someone to avoid patching his computer? Should the government be able to quarantine someone for something he said in a chat room, or a series of search queries he made? I'm sure we don't think it should, but what if that chat and those queries revolved around terrorism? Where's the line? Microsoft would certainly like to quarantine any computers it feels are not running legal copies of its operating system or applications software. The music and movie industry will want to quarantine anyone it decides is downloading or sharing pirated media files--they're already pushing similar proposals. A security measure designed to keep malicious worms from spreading over the Internet can quickly become an enforcement tool for corporate business models. Charney addresses the need to limit this kind of function creep, but I don't think it will be easy to prevent; it's an enforcement mechanism just begging to be used. Once you start thinking about implementation of quarantine, all sorts of other social issues emerge. What do we do about people who need the Internet? Maybe VoIP is their only phone service. Maybe they have an Internet-enabled medical device. Maybe their business requires the Internet to run. The effects of quarantining these people would be considerable, even potentially life-threatening. Again, where's the line? What do we do if people feel they are quarantined unjustly? Or if they are using nonstandard software unfamiliar to the ISP? Is there an appeals process? Who administers it? Surely not a for-profit company. Public health is the right way to look at this problem. This conversation--between the rights of the individual and the rights of society--is a valid one to have, and this solution is a good possibility to consider. There are some applicable parallels. We require drivers to be licensed and cars to be inspected not because we worry about the danger of unlicensed drivers and uninspected cars to themselves, but because we worry about their danger to other drivers and pedestrians. The small number of parents who don't vaccinate their kids have already caused minor outbreaks of whooping cough and measles among the greater population. We all suffer when someone on the Internet allows his computer to get infected. How we balance that with individuals' rights to maintain their own computers as they see fit is a discussion we need to start having. This essay previously appeared on Forbes.com. http://www.forbes.com/2010/11/10/microsoft-viruses-security-technology-quarantine.html Charney's proposal: http://blogs.technet.com/b/microsoft_on_the_issues/archive/2010/10/05/the-need-for-global-collective-defense-on-the-internet.aspx or http://tinyurl.com/3axouht http://www.bbc.co.uk/go/news/technology-11483008/ext/_auto/-/http://go.microsoft.com/?linkid=9746317 or http://tinyurl.com/2cned49 http://news.cnet.com/8301-27080_3-10462649-245.html Proposals to cut off file sharers: http://news.bbc.co.uk/2/hi/7240234.stm http://www.zeropaid.com/news/9114/france_to_ban_illegal_filesharers_from_the_internet/ or http://tinyurl.com/24x9pv6 ** *** ***** ******* *********** ************* News Researchers are working on a way to fingerprint telephone calls. The system can be used to differentiate telephone calls from your bank from telephone calls from someone in Nigeria pretending to be from your bank. Unless your bank is outsourcing its customer support to Nigeria, of course. http://www.theregister.co.uk/2010/10/06/voice_fingerprints/ http://www.gatech.edu/newsroom/release.html?nid=61428 Former Denver Broncos quarterback on hiding in plain sight. http://sportsillustrated.cnn.com/vault/article/magazine/MAG1175387/4/index.htm or http://tinyurl.com/39arogx Was the software used in the Predator drones pirated? http://www.fastcompany.com/1695219/cia-predator-drones-facing-ip-lawsuit or http://tinyurl.com/27u6tfg http://www.theregister.co.uk/2010/09/24/cia_netezza/ The obvious joke is that this is what you get when you go with the low bidder, but it doesn't have to be that way. And there's nothing special about this being a government procurement; any bespoke IT procurement needs good contractual oversight. I am the program chair for the next Workshop on the Economics of Information Security, WEIS 2011, which is to be held next June in Washington, DC. Submissions are due at the end of February. Please forward and repost the call for papers. http://weis2011.econinfosec.org/ http://weis2011.econinfosec.org/cfpart.html Electronic Car lock denial-of-service attack http://www.schneier.com/blog/archives/2010/10/electronic_car.html Security hole in FaceTime for Mac. http://arstechnica.com/apple/news/2010/10/facetime-for-mac-opens-giant-apple-id-security-hole.ars or http://tinyurl.com/3875gqo It's been fixed. http://www.electronista.com/articles/10/10/22/embarrassing.vulnerability.patched.pronto/ or http://tinyurl.com/37oav68 Here's a long list of declassified NSA documents. These items are not online; they're at the National Archives and Records Administration in College Park, MD. You can either ask for copies by mail under FOIA (at a 75 cents per page) or come in person. There, you can read and scan them for free, or photocopy them for about 20 cents a page. http://www.nsa.gov/public_info/declass/entries.shtml Seymour Hersh on cyberwar, from The New Yorker. http://www.newyorker.com/reporting/2010/11/01/101101fa_fact_hersh Firesheep is a new Firefox plugin that makes it easy for you to hijack other people's social network connections. Basically, Facebook authenticates clients with cookies. If someone is using a public WiFi connection, the cookies are sniffable. Firesheep uses wincap to capture and display the authentication information for accounts it sees, allowing you to hijack the connection. To protect against this attack, you have to encrypt your entire session under TLS -- not just the initial authentication. Or stop logging in to Facebook from public networks. http://codebutler.github.com/firesheep/ http://codebutler.github.com/firesheep/tc12 http://techcrunch.com/2010/10/25/firesheep/ http://windowssecrets.com/2010/11/04/01-Cloak-your-connection-to-foil-Firesheep-snoopers/#story1 or http://tinyurl.com/2d29sxv http://www.shortestpathfirst.net/2010/10/29/sidejacking-fun-with-firesheep/ or http://tinyurl.com/2exo5ma Old -- but recently released -- document discussing the bugging of the Russian embassy in 1940. The document also mentions bugging the embassies of France, Germany, Italy, and Japan. http://www.scribd.com/doc/39557615/FBI-File-65-HQ-30092-Details-Bugging-of-Embassies-in-1940-Section-1 or http://tinyurl.com/23ybh6t New Orleans is scrapping its surveillance cameras because they're not worth it. http://www.nola.com/politics/index.ssf/2010/10/new_orleans_crime_camera_progr.html or http://tinyurl.com/247fjou http://topics.nola.com/tag/crime%20cameras/index.html Good blog post on the militarization of the Internet. http://scrawford.net/blog/the-militarization-of-the-internet/1409/ Halloween and the irrational fear of stranger danger: http://online.wsj.com/article/SB10001424052702304915104575572642896563902.html or http://tinyurl.com/2e5e72p Also this: http://www.theatlantic.com/food/archive/2010/10/the-meaning-of-halloween-candy-psychopath-stories/65281/ or http://tinyurl.com/2djl68x Wondermark comments: http://wondermark.com/567/ This is an interesting paper about control fraud. It's by William K. Black, the Executive Director of the Institute for Fraud Prevention. "Individual 'control frauds' cause greater losses than all other forms of property crime combined. They are financial super-predators." Black is talking about control fraud by both heads of corporations and heads of state, so that's almost certainly a true statement. His main point, though, is that our legal systems don't do enough to discourage control fraud. http://www.schneier.com/blog/archives/2010/11/control_fraud.html Dan Geer on "Cybersecurity and National Policy." http://www.harvardnsj.com/2010/04/cybersecurity-and-national-policy/ Last month the police arrested Farooque Ahmed for plotting a terrorist attack on the D.C. Metro system. However, it's not clear how much of the plot was his idea and how much was the idea of some paid FBI informants. http://www.salon.com/news/politics/war_room/2010/10/28/ahmed_farooque_dc_metro/index.html or http://tinyurl.com/2ebw7zy Of course, the police are now using this fake bomb plot to justify random bag searching in the Metro. http://www.wtopnews.com/?nid=25&sid=2097181 It's a dumb idea: http://www.schneier.com/blog/archives/2005/07/searching_bags.html This is the problem with thoughtcrime. Entrapment is much too easy. http://www.schneier.com/blog/archives/2010/09/terrorism_entra.html Much the same thing was written in The Economist blog. http://www.economist.com/blogs/democracyinamerica/2010/10/war_commuters or http://tinyurl.com/257wvow The business of botnets can be lucrative. http://www.networkworld.com/news/2010/102910-russian-armenian-botnet-suspect-raked-in.html or http://tinyurl.com/2fmvh3r Paper on the market price of bots: http://www.icsi.berkeley.edu/cgi-bin/pubs/publication.pl?ID=002289 Good article on security options for the Washington Monument. I like the suggestion of closing it until we're ready to accept that there is always risk. http://www.washingtonpost.com/wp-dyn/content/article/2010/11/07/AR2010110704572.html or http://tinyurl.com/26olp6y More information on the decision process: http://www.washingtonpost.com/wp-dyn/content/article/2010/11/09/AR2010110906739.html or http://tinyurl.com/2v6u57s "A Social Network Approach to Understanding an Insurgency" http://www.netscience.usma.edu/publications/SNA%20COIN.pdf "Bulletproof" service providers: ISPs who are immune from takedown notices and offer services to illegitimate website providers. http://krebsonsecurity.com/2010/11/body-armor-for-bad-web-sites/ Camouflaging test cars from competitors and the press: http://www.nytimes.com/2010/11/07/automobiles/07CAMO.html Long article on convicted hacker Albert Gonzalez from The New York Times Magazine. http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?emc=eta1 ** *** ***** ******* *********** ************* Cargo Security The New York Times writes: "Despite the increased scrutiny of people and luggage on passenger planes since 9/11, there are far fewer safeguards for packages and bundles, particularly when loaded on cargo-only planes." Well, of course. We've always known this. We've not worried about terrorism on cargo planes because it isn't very terrorizing. Packages aren't people. If a passenger plane blows up, it affects a couple of hundred people. If a cargo plane blows up, it just affects the crew. Cargo that is loaded on to passenger planes should be subjected to the same level of security as passenger luggage. Cargo that is loaded onto cargo planes should be treated no differently from cargo loaded into ships, trains, trucks, and the trunks of cars. Of course: now that the media is talking about cargo security, we have to "do something." (Something must be done. This is something. Therefore, we must do it.) But if we're so scared that we have to devote resources to this kind of terrorist threat, we've well and truly lost. Also note: the plot -- it's still unclear how serious it was -- wasn't uncovered by any security screening, but by intelligence gathering. The Washington Post writes: "Intelligence officials were onto the suspected plot for days, officials said. The packages in England and Dubai were discovered after Saudi Arabian intelligence picked up information related to Yemen and passed it on to the U.S., two officials said." This is how you fight through terrorism: not by defending against specific threats, but through intelligence, investigation, and emergency response. New York Times article: http://www.nytimes.com/2010/10/30/us/30cargo.html Washington Post article: http://www.washingtonpost.com/wp-dyn/content/article/2010/10/30/AR2010103000792_2.html or http://tinyurl.com/2dp3cyd My essay on intelligence, investigation, and emergency response: http://www.schneier.com/essay-292.html ** *** ***** ******* *********** ************* Changes in Airplane Security 1. The TSA is banning toner cartridges over 16 ounces, because that's what the Yemeni bombers used. There's some impressive magical thinking going on here. 2. Because people need to remove their belts before going into full-body scanners, the TSA is making us remove our belts even when we're not going through full-body scanners. European airports have made us remove our belts for years. My normal tactic is to pull my shirt tails out of my pants and over my belt. Then I flash my waist and tell them I'm not wearing a belt. It doesn't set off the metal detector, so they don't notice. 3. Now the terrorists have really affected me personally: they're forcing us to turn off airplane WiFi. No, it's not that the Yemeni package bombs had a WiFi triggering mechanism -- they seem to have had a cell phone triggering mechanism, dubious at best -- but we can *imagine* an Internet-based triggering mechanism. Put together a sloppy and unsuccessful package bomb with an imagined triggering mechanism, and you have a *new and dangerous threat* that -- even though it was a threat ever since the first airplane got WiFi capability -- must be immediately dealt with right now. Please, let's not ever tell the TSA about timers. Or altimeters. Belts: http://www.salon.com/technology/ask_the_pilot/2010/11/04/belt_removal_at_security_checkpoint/index.html or http://tinyurl.com/323a3vy Toner cartridges: http://www.msnbc.msn.com/id/40072889/ns/us_news-airliner_security/ In-flight WiFi: http://www.newscientist.com/article/dn19665 http://gizmodo.com/5679794/all-these-terrorist-scares-are-putting-in+flight-wi+fi-at-risk or http://tinyurl.com/39okdxx Using a cell phone to detonate a plane bomb: http://www.wired.com/dangerroom/2010/11/could-a-cell-phone-call-from-yemen-blow-up-a-plane/ or http://tinyurl.com/2d3o3x8 While we're talking about the TSA, be sure to opt out of the full-body scanners. http://www.theatlantic.com/national/archive/2010/10/for-the-first-time-the-tsa-meets-resistance/65390/ or http://tinyurl.com/28e2353 And remember your sense of humor when a TSA officer slips white powder into your suitcase and then threatens you with arrest. http://www.thesmokinggun.com/documents/stupid/memos-detail-tsa-officers-cocaine-pranks or http://tinyurl.com/24vkcs4 ** *** ***** ******* *********** ************* Young Man in "Old Man" Mask Boards Plane in Hong Kong It's kind of an amazing story. A young Asian man used a rubber mask to disguise himself as an old Caucasian man and, with a passport photo that matched his disguise, got through all customs and airport security checks and onto a plane to Canada. The fact that this sort of thing happens occasionally doesn't surprise me. It's human nature that we miss this sort of thing. I wrote about it in Beyond Fear (pages 153-4): No matter how much training they get, airport screeners routinely miss guns and knives packed in carry-on luggage. In part, that's the result of human beings having developed the evolutionary survival skill of pattern matching: the ability to pick out patterns from masses of random visual data. Is that a ripe fruit on that tree? Is that a lion stalking quietly through the grass? We are so good at this that we see patterns in anything, even if they're not really there: faces in inkblots, images in clouds, and trends in graphs of random data. Generating false positives helped us stay alive; maybe that wasn't a lion that your ancestor saw, but it was better to be safe than sorry. Unfortunately, that survival skill also has a failure mode. As talented as we are at detecting patterns in random data, we are equally terrible at detecting exceptions in uniform data. The quality-control inspector at Spacely Sprockets, staring at a production line filled with identical sprockets looking for the one that is different, can't do it. The brain quickly concludes that all the sprockets are the same, so there's no point paying attention. Each new sprocket confirms the pattern. By the time an anomalous sprocket rolls off the assembly line, the brain simply doesn't notice it. This psychological problem has been identified in inspectors of all kinds; people can't remain alert to rare events, so they slip by. A customs officer spends hours looking at people and comparing their faces with their passport photos. They do it on autopilot. Will they catch someone in a rubber mask that looks like their passport photo? Probably, but certainly not all the time. And yes, this is a security risk, but it's not a big one. Because while -- occasionally -- a gun can slip through a metal detector or a masked man can slip through customs, it doesn't happen reliably. So the bad guys can't build a plot around it. http://www.cnn.com/2010/WORLD/americas/11/04/canada.disguised.passenger/index.html or http://tinyurl.com/36pr2mw http://i2.cdn.turner.com/cnn/2010/images/11/04/disguise.artist.pdf Commentary from my blog about what actually happened: http://www.schneier.com/blog/archives/2010/11/young_man_in_ol.html#c476017 or http://tinyurl.com/29o8e7d Beyond Fear: http://www.schneier.com/book-beyondfear.html ** *** ***** ******* *********** ************* Schneier News I'm speaking at the 11th Annual Security Conference & Exhibition in Washington DC on Nov 16. http://events.1105govinfo.com/events/security-conference-exhibition-2010/home.aspx or http://tinyurl.com/2evr36q I'm speaking at Paranoia 2010 in Oslo on Nov 23. http://paranoia.watchcom.no/ I'm speaking at ClubHack 2010 in Pune, India on Dec 4. http://clubhack.com/2010/ My TED talk. Okay, it's not TED. It's one of the independent regional TED events: TEDxPSU. My talk was "Reconceptualizing Security," a condensation of the hour-long talk into 18 minutes. http://www.youtube.com/watch?v=CGd_M_CpeDI I was interviewed last week at RSA Europe. https://365.rsaconference.com/community/connect/blog/2010/10/13/rsa-conference-europe-hugh-thompson-and-bruce-schneier or http://tinyurl.com/3xsjbv9 ** *** ***** ******* *********** ************* Kahn, Diffie, Clark, and Me at Bletchley Park Last Saturday, I visited Bletchley Park to speak at the Annual ACCU Security Fundraising Conference. They had a stellar line of speakers this year, and I was pleased to be a part of the day. Talk #1: "The Art of Forensic Warfare," Andy Clark. Riffing on Sun Tzu's "The Art of War," Clark discussed the war -- the back and forth -- between cyber attackers and cyber forensics. This isn't to say that we're at war, but today's attacker tactics are increasingly sophisticated and warlike. Additionally, the pace is greater, the scale of impact is greater, and the subjects of attack are broader. To defend ourselves, we need to be equally sophisticated and -- possibly -- more warlike. Clark drew parallels from some of the chapters of Sun Tzu's book combined with examples of the work at Bletchley Park. Laying plans: when faced with an attacker -- especially one of unknown capabilities, tactics, and motives -- it's important to both plan ahead and plan for the unexpected. Attack by stratagem: increasingly, attackers are employing complex and long-term strategies; defenders need to do the same. Energy: attacks increasingly start off simple and get more complex over time; while it's easier to defect primary attacks, secondary techniques tend to be more subtle and harder to detect. Terrain: modern attacks take place across a very broad range of terrain, including hardware, OSs, networks, communication protocols, and applications. The business environment under attack is another example of terrain, equally complex. The use of spies: not only human spies, but also keyloggers and other embedded eavesdropping malware. There's a great World War II double-agent story about Eddie Chapman, codenamed ZIGZAG. Talk #2: "How the Allies Suppressed the Second Greatest Secret of World War II," David Kahn. This talk is from Kahn's article of the same name, published in the Oct 2010 issue of "The Journal of Military History." The greatest secret of World War II was the atom bomb; the second greatest secret was that the Allies were reading the German codes. But while there was a lot of public information in the years after World War II about Japanese codebreaking and its value, there was almost nothing about German codebreaking. Kahn discussed how this information was suppressed, and how historians writing World War II histories never figured it out. No one imagined as large and complex an operation as Bletchley Park; it was the first time in history that something like this had ever happened. Most of Kahn's time was spent in a very interesting Q&A about the history of Bletchley Park and World War II codebreaking. Talk #3: "DNSSec, A System for Improving Security of the Internet Domain Name System," Whitfield Diffie. Whit talked about three watersheds in modern communications security. The first was the invention of the radio. Pre-radio, the most common communications security device was the code book. This was no longer enough when radio caused the amount of communications to explode. In response, inventors took the research in Vigenhre ciphers and automated them. This automation led to an explosion of designs and an enormous increase in complexity -- and the rise of modern cryptography. The second watershed was shared computing. Before the 1960s, the security of computers was the physical security of computer rooms. Timesharing changed that. The result was computer security, a much harder problem than cryptography. Computer security is primarily the problem of writing good code. But writing good code is hard and expensive, so functional computer security is primarily the problem of dealing with code that isn't good. Networking -- and the Internet -- isn't just an expansion of computing capacity. The real difference is how cheap it is to set up communications connections. Setting up these connections requires naming: both IP addresses and domain names. Security, of course, is essential for this all to work; DNSSec is a critical part of that. The third watershed is cloud computing, or whatever you want to call the general trend of outsourcing computation. Google is a good example. Every organization uses Google search all the time, which probably makes it the most valuable intelligence stream on the planet. How can you protect yourself? You can't, just as you can't whenever you hand over your data for storage or processing -- you just have to trust your outsourcer. There are two solutions. The first is legal: an enforceable contract that protects you and your data. The second is technical, but mostly theoretical: homomorphic encryption that allows you to outsource computation of data without having to trust that outsourcer. Diffie's final point is that we're entering an era of unprecedented surveillance possibilities. It doesn't matter if people encrypt their communications, or if they encrypt their data in storage. As long as they have to give their data to other people for processing, it will be possible to eavesdrop on. Of course the methods will change, but the result will be an enormous trove of information about everybody. Talk #4: "Reconceptualizing Security," me. It was similar to previous essays and talks. Annual ACCU Security Fundraising Conference: http://www.bletchleypark.org.uk/calendar/event_detail.rhtm?cat=special&recID=618139 or http://tinyurl.com/25pge74 Bletchley Park: http://www.bletchleypark.org.uk/content/museum.rhtm News coverage: http://blogs.wsj.com/tech-europe/2010/11/06/bletchley-park-hosts-cryptographic-greats/ or http://tinyurl.com/2cltt7h The Art of War: http://www.chinapage.com/sunzi-e.html Eddie Chapman book: http://www.amazon.com/exec/obidos/ASIN/0307353419/counterpane/ The Journal of Military History: http://www.smh-hq.org/jmh/jmhvols/contents.html Essay and video similar to my talk: http://www.schneier.com/blog/archives/2008/04/the_feeling_and_1.html http://www.youtube.com/watch?v=CGd_M_CpeDI ** *** ***** ******* *********** ************* Changing Passwords How often should you change your password? I get asked that question a lot, usually by people annoyed at their employer's or bank's password expiration policy: people who finally memorized their current password and are realizing they'll have to write down their new password. How could that possibly be more secure, they want to know. The answer depends on what the password is used for. The downside of changing passwords is that it makes them harder to remember. And if you force people to change their passwords regularly, they're more likely to choose easy-to-remember -- and easy-to-guess -- passwords than they are if they can use the same passwords for many years. So any password-changing policy needs to be chosen with that consideration in mind. The primary reason to give an authentication credential -- not just a password, but any authentication credential -- an expiration date is to limit the amount of time a lost, stolen, or forged credential can be used by someone else. If a membership card expires after a year, then if someone steals that card he can at most get a year's worth of benefit out of it. After that, it's useless. This becomes less important when the credential contains a biometric -- even a photograph -- or is verified online. It's much less important for a credit card or passport to have an expiration date, now that they're not so much bearer documents as just pointers to a database. If, for example, the credit card database knows when a card is no longer valid, there's no reason to put an expiration date on the card. But the expiration date does mean that a forgery is only good for a limited length of time. Passwords are no different. If a hacker gets your password either by guessing or stealing it, he can access your network as long as your password is valid. If you have to update your password every quarter, that significantly limits the utility of that password to the attacker. At least, that's the traditional theory. It assumes a passive attacker, one who will eavesdrop over time without alerting you that he's there. In many cases today, though, that assumption no longer holds. An attacker who gets the password to your bank account by guessing or stealing it isn't going to eavesdrop. He's going to transfer money out of your account -- and then you're going to notice. In this case, it doesn't make a lot of sense to change your password regularly -- but it's vital to change it immediately after the fraud occurs. Someone committing espionage in a private network is more likely to be stealthy. But he's also not likely to rely on the user credential he guessed and stole; he's going to install backdoor access or create his own account. Here again, forcing network users to regularly change their passwords is less important than forcing everyone to change their passwords immediately after the spy is detected and removed -- you don't want him getting in again. Social networking sites are somewhere in the middle. Most of the criminal attacks against Facebook users use the accounts for fraud. "Help! I'm in London and my wallet was stolen. Please wire money to this account. Thank you." Changing passwords periodically doesn't help against this attack, although -- of course -- change your password as soon as you regain control of your account. But if your kid sister has your password -- or the tabloid press, if you're that kind of celebrity -- they're going to listen in until you change it. And you might not find out about it for months. So in general: you don't need to regularly change the password to your computer or online financial accounts (including the accounts at retail sites); definitely not for low-security accounts. You should change your corporate login password occasionally, and you need to take a good hard look at your friends, relatives, and paparazzi before deciding how often to change your Facebook password. But if you break up with someone you've shared a computer with, change them all. Two final points. One, this advice is for login passwords. There's no reason to change any password that is a key to an encrypted file. Just keep the same password as long as you keep the file, unless you suspect it's been compromised. And two, it's far more important to choose a good password for the sites that matter -- don't worry about sites you don't care about that nonetheless demand that you register and choose a password -- in the first place than it is to change it. So if you have to worry about something, worry about that. And write your passwords down, or use a program like Password Safe. This essay originally appeared on DarkReading.com. http://www.darkreading.com/blog/archives/2010/11/passwordchangin.html Choosing good passwords: http://www.schneier.com/blog/archives/2007/01/choosing_secure.html Password Safe: http://www.schneier.com/passsafe.html Mircosoft Research says the same thing: http://www.pcmag.com/article2/0,2817,2362692,00.asp "The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis." http://www.cs.unc.edu/~yinqian/papers/PasswordExpire.pdf ** *** ***** ******* *********** ************* Since 1998, CRYPTO-GRAM has been a free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise. You can subscribe, unsubscribe, or change your address on the Web at . Back issues are also available at that URL. Please feel free to forward CRYPTO-GRAM, in whole or in part, to colleagues and friends who will find it valuable. Permission is also granted to reprint CRYPTO-GRAM, as long as it is reprinted in its entirety. CRYPTO-GRAM is written by Bruce Schneier. Schneier is the author of the best sellers "Schneier on Security," "Beyond Fear," "Secrets and Lies," and "Applied Cryptography," and an inventor of the Blowfish, Twofish, Threefish, Helix, Phelix, and Skein algorithms. He is the Chief Security Technology Officer of BT BCSG, and is on the Board of Directors of the Electronic Privacy Information Center (EPIC). He is a frequent writer and lecturer on security topics. See . Crypto-Gram is a personal newsletter. Opinions expressed are not necessarily those of BT. Copyright (c) 2010 by Bruce Schneier. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jya at pipeline.com Mon Nov 15 03:10:20 2010 From: jya at pipeline.com (John Young) Date: Mon, 15 Nov 2010 06:10:20 -0500 Subject: Steve Coll: Leaks (The New Yorker) Message-ID: Jealousy is the lifeblood of ambition, Assange is a victim, and who is not? Sorry to say Brian, for you customarily offer unusually trenchant commentary, your comments indicate a lack of awareness of the diverse and multiple forums which offer material similar, and in many cases superior, to that of Wikileaks -- offered long before as well as after its inititation. The leaks conceit of Wikileaks is deliberate, better known as "breaking news," attention getting, the Wiki as false as democracy, the promise of openness never fulfilled due to security needs of the sponsor. What is unique about Wikileaks is its publicity capability and for that it deserves credit to bring to a non-institutional initiative, thanks to the momentarily cheap Internet megaphone, the slick braggardy well known as the key element for the "reputation, responsibility and trustworthyiness" of big institutions from their origin millennia ago. Promoting established institutions is what the media -- journalism, publishing, entertainment, advertising -- were invented to do by creating the illusion that individuals have a say in "what's going on." But never invited into the sanctums where decisions are made about the means and methods for promulgating illusions. All this has been said tiresomely (arch ouch) overmuch. So what else is new about Wikileaks type initiatives that the hullabaloo can advance? One is to contain enthusiasm, if you will, about the uniquenss of Wikileaks. It is not unique in the content it provides: there is much more and better available by less celebrated means and methods, once called research, reflection and reassement, continually done, even non-institutionally, perhaps that most so, not reduced to crowd-arousing bombshells in which the tiniest of comment is viralized to thousands of sites -- try it: post anything with the word Wikileaks in its title and watch it richochet in synapases of worldbrain. To advance the much larger body of material it would be useful to develop a battery of such socio-political-rich words which would assure attention to an inititiative that might be otherwise swamped by orchestrated viralization, ie, advertising. "Che" once did that, as do "Obama" and "Assange" now, albeit somewhat smeared by assholes unable to dream of less than godlike perfection. Your point about jealous of other blogs has become a knee-jerker that shows ignorance, well, lack of appreciation, of other initiatives which have not been catapulted to the media stage where nearly every commentator derives daily doses of inspiration to get off ass and be "a player." Which means worthy of paying attention to. How to get from being a non-entity to being a player is what Assange has demonstrated. Not enough attention has been paid to how he imagined Wikileaks for that, although a lot of superficial reporting has been done on the person and personality of Assange. Assange is more complicated and inscrutable than he has been caricatured to be -- ie, mediaized. But then so are all heroes manufactured in that mold and buried in that sarcophagus. Agreed that much better analysis is needed for those who yearn for that comfort food never available on blogs and the daily beasts. Better than analysis though is to do more of what Wikileaks does to get forbidden information into public hands, minds and hearts, unanalyzed, and most crucially unmediated. That might mean fighting the mediaized Internet addiction, say, for a day or two a week, gradually assemble your own material and formulate its significance -- and do not rush to post the drivel, ponder, reassemble, exchange it quietly, redo, rejigger, reflect, sit on it. Arguing about fucking Wikileaks has led me to write more bombast in the past six months than in the previous 14 years, as you can readily see, and curtailed research and publication of unanalyzed materials. The issue is infectious and induces Mailer's advertisements for himself. The Wikileaks initiative is now in grave danger of being destroyed by the attention Assange yearned for and assumed would be easy to handle. He is its Achilles heel. Not the first time that has happened, again merely look at the over-celebrated who are over-loaded with our cowardly aspirations that they do for us what we are too lazy or inept to do for ourselves, everready to blame the socio-political gods that failed, everready to vote in Time's Persons of the Year proffered by manipulative authoritatives. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jtrjtrjtr2001 at yahoo.com Mon Nov 15 06:17:56 2010 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Mon, 15 Nov 2010 06:17:56 -0800 (PST) Subject: Bitcoin And The Electronic Frontier Foundation In-Reply-To: <20101115130929.GP28998@leitl.org> Message-ID: <111529.75607.qm@web33301.mail.mud.yahoo.com> I was checking and Wikipedia has deleted its Bitcoin entry. how strange!did they say why? Sarad. --- On Mon, 11/15/10, Eugen Leitl wrote: > From: Eugen Leitl > Subject: Bitcoin And The Electronic Frontier Foundation > To: tt at postbiota.org, info at postbiota.org, cypherpunks at al-qaeda.net, or-talk at freehaven.net > Date: Monday, November 15, 2010, 6:39 PM > http://www.bitcoinblogger.com/2010/11/bitcoin-gains-legal-protection-through.html > > SATURDAY, NOVEMBER 13, 2010 > > Bitcoin And The Electronic Frontier Foundation > > > There are many legal implications when utilizing Bitcoin. > Users of Bitcoin > who conduct business with the wrong people could face > charges of money > laundering, identity theft, and/or fraud. Honest Bitcoin > users could be > implicated in crimes by criminals engaging in phishing or > malware and > stealing identities. The Bitcoin economy resembles that of > the wild, wild, > west with inherently little or no regulation. Because of > the barbaric nature > of this new currency it is highly susceptible to legal > attacks by law > enforcement. Bitcoin has recently, however, gained some > legal protection by > the Electronic Frontier Foundation (EFF). In another > significant milestone > for P2P cryptocurrency the EFF has agreed to accept Bitcoin > donations! The > EFF is known for legal cases involving high profile tech > companies such as > Apple, Google, Craigslist, and Facebook. The simple fact > that the EFF is > welcoming anonymous donations is a small but significant > step towards Bitcoin > societal acceptance. > > Accepting anonymous donations is not a light decision by > the EFF, and the > implications are monumental. For example, selling or buying > Bitcoins with an > anonymous user could mean unintentionally aiding terrorism > or helping North > Korea build nuclear weapons. Or, political groups accepting > Bitcoins could be > accepting funds by enemies of the state. The United States > recently placed > sanctions on Iran for its nuclear programs, and if Bitcoins > are adopted > universally then sanctions would no longer work as a tool > to change the > behaviors of government. In essence, the globalization of > Bitcoins will > affect international political policy. > > The disruptive nature of Bitcoin can cause unease with > existing institutions > and the war against Bitcoin will be waged through a legal > front. The > endorsement of the EFF could set up a legal battle in the > future, "Bitcoin > vs. Entity X". What courts could fail to realize, however, > is the > non-centralized aspect of Bitcoin, which makes shutting > down the service next > to impossible. Most likely, that is why Bitcoin will > succeed no matter what > trials and tribulations it may have to face. Nevertheless, > the EFF's > willingness to accept Bitcoins will further the > cryptocurrency's cause, and > will encourage the recognition of Bitcoin as a currency to > be "official". > > Several members of bitcoin.org have been involved in making > the endorsement > of the EFF happen which you can read at this forum thread. > Feel free to > donate to the EFF at their donation page. From coderman at gmail.com Mon Nov 15 10:19:31 2010 From: coderman at gmail.com (coderman) Date: Mon, 15 Nov 2010 10:19:31 -0800 Subject: Bitcoin And The Electronic Frontier Foundation In-Reply-To: <111529.75607.qm@web33301.mail.mud.yahoo.com> References: <20101115130929.GP28998@leitl.org> <111529.75607.qm@web33301.mail.mud.yahoo.com> Message-ID: On Mon, Nov 15, 2010 at 6:17 AM, Sarad AV wrote: > I was checking and Wikipedia has deleted its Bitcoin entry. how strange!did they say why? the cuda cards are killing bitcoin, why bother? (i suppose it is an interesting footnote...) From oeolhu at regstandart.ru Sun Nov 14 23:28:12 2010 From: oeolhu at regstandart.ru (=?koi8-r?B?5MzRIODSydPUz9c=?=) Date: Mon, 15 Nov 2010 10:28:12 +0300 Subject: =?koi8-r?B?88zP1s7ZxSDXz9DSz9PZINDSwdfP18/HzyDSxcfVzMnSz9fBzsnRIMnO?= =?koi8-r?B?1MXMzMXL1NXBzNjOz8og08/C09TXxc7Oz9PUyQ==?= Message-ID: <000d01cb8496$a9068a10$6400a8c0@oeolhu> Тема: Актуальные вопросы правового регулирования интеллектуальной собственности (495) 742 9I 98,(495) ЧЧ5-ЧО/95 Дата проведения: 16 Ноября 2О1Ог. Цель: 1.Изучить изменения в законодательство об интеллектуальной собственности. 2.Познакомиться с основами права интеллектуальной собственности РФ. 3.Обсудить практические проблемы, возникающие в сфере применения права интеллектуальной собственности. 4.Проанализировать практику применения конкретных норм авторского и смежных прав. Расписание занятий: 1.Понятие интеллектуальной собственности. Международное регулирование прав интеллектуальной собственности. Проблемы соотношения товарных знаков, доменных имен, фирменных наименований, коммерческих обозначений. Проблемные вопросы режима коммерческой тайны и ноу-хау. 2.Регулирование авторского права 3.Регулирование смежных прав 4.Регулирование патентного права. 5.Вопросы оценки интеллектуальной собственности. 6.Защита результатов интеллектуальной деятельности и средств индивидуализации. 7.Рассмотрение судебной практики по конкретным вопросам, касающимся авторского права, смежных прав, товарных знаков Учебные материалы и презентация: Сборник слайдов, сборник практических заданий. Методология преподавания: Обучение проводится в интерактивной форме, предполагает большое количество дискуссий и выполнение практических заданий. За более подробной информацuей обpащайтеcь по тел: (495) 742.9I 98 (Ч95) 4Ч5-4О/95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2949 bytes Desc: not available URL: From eugen at leitl.org Mon Nov 15 02:44:15 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 15 Nov 2010 11:44:15 +0100 Subject: CRYPTO-GRAM, November 15, 2010 Message-ID: <20101115104415.GL28998@leitl.org> ----- Forwarded message from Bruce Schneier ----- From eugen at leitl.org Mon Nov 15 03:39:33 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 15 Nov 2010 12:39:33 +0100 Subject: Steve Coll: Leaks (The New Yorker) Message-ID: <20101115113933.GO28998@leitl.org> ----- Forwarded message from John Young ----- From hal.finney at gmail.com Mon Nov 15 13:10:08 2010 From: hal.finney at gmail.com (Hal Finney) Date: Mon, 15 Nov 2010 13:10:08 -0800 Subject: Bitcoin And The Electronic Frontier Foundation In-Reply-To: <20101115193148.GC28998@leitl.org> References: <20101115130929.GP28998@leitl.org> <111529.75607.qm@web33301.mail.mud.yahoo.com> <20101115193148.GC28998@leitl.org> Message-ID: I thought bitcoin had a lot of promise and ran a client/"miner" for a few weeks when it first came out, but then lost interest. I heard about the EFF thing a few days ago and took a look at bitcoin.org. I was amazed to see that bitcoin is thriving! Not only can you buy and sell coins for real money, there is a lot of demand for them, and speculators are hoarding coins in the expectation of price increases. Back at the beginning Eugen and I were playing with it and I sent him 1000 coins as a test, and he sent them back. That would be worth $250 now, pretty amazing. This is the first time I recall that a currency with no intrinsic value has become this popular. It's uncharted ground, with many open questions. What value will bitcoins settle on? Will there be a fork with perhaps more attractive rules? Will scammers (who love transactions that can't be reversed) taint the currency? And the big question, what happens when bitcoin comes to the attention of governments? Can it win? Hal Finney From bhcontinentaldrift at gmail.com Mon Nov 15 11:31:34 2010 From: bhcontinentaldrift at gmail.com (Brian Holmes) Date: Mon, 15 Nov 2010 13:31:34 -0600 Subject: WikiLeaks and the Culture of Classification Message-ID: > WikiLeaks and the Culture of Classification > ... Instead of seeking to weed out the overclassified material and > concentrate on protecting the truly sensitive information, the > culture of classification reacts by using the WikiLeaks cases as > justification for continuing to classify information at the highest > possible levels and for sharing the intelligence it generates with > fewer people. The ultimate irony is that the WikiLeaks cases will > help strengthen and perpetuate the broken system that helped lead to > the disclosures in the first place. I think the above is characteristic of this phase of informationalism: organizational routines that formerly provided solutions are now stiffening to the point where they become problems in themselves. In this case, the ability to set up and manage huge encrypted networks leads to the overextension of classification even as it multiplies the opportunities for leaks. The interesting thing is, the dynamic is totally legible but nothing will be done about it: too many people have made careers setting up the systems, too much equipment has been bought, too much time has been spent inculcating a culture of secrecy, and even though all the above are not really productive, they represent a fixed capital that becomes a barrier to innovation. In short, we have entered the sclerotic phase of informationalism. The same thing can be seen in the financial markets: high-frequency trading works great, it makes the traders and investment banks very rich, it's totally unproductive, it can only produce more and worse crises, and there is no sign whatsoever that it will stop. I like Felix's idea that that Wikileaks is exacerbating dysfunctional organizational tendencies. It's probably an involuntary effect, but hey, you know that when you massively break a barrier of secrecy in this way, you are gonna produce some kind of welcome effects. This observation should be coupled with the one Felix makes in his excellent Mute magazine article: "People are asked to identify personally with organisations who can either no longer carry historical projects worthy of major sacrifices or expressly regard their employees as nothing but expendable, short-term resources. This, I think, creates the cognitive dissonance that justifies, perhaps even demands, the leaker to violate procedure and actively damage the organisation of which he, or she, has been at some point a well-acculturated member." That's a formula, not just for leaks, but for generalized low-level employee sabotage, i.e. the neoliberal manager's worst nightmare. In response, the entire social system stiffens, security panic sets in and gradually, the nightmare becomes a self-fulfilling prophecy. This is the way the great technologial and organizational paradigms like Fordism or Informationalism come to their end, not with a bang but with a slow deflating hiss of discontent from millions of disgruntled and exploited underlings. One can only hope that some dynamic of visionary change arises in counterpoint to this process of slow decay. Or rather: one can take heart in the slow decay, and move quicker on the vision thing! best, BH # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Nov 15 05:09:30 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 15 Nov 2010 14:09:30 +0100 Subject: Bitcoin And The Electronic Frontier Foundation Message-ID: <20101115130929.GP28998@leitl.org> http://www.bitcoinblogger.com/2010/11/bitcoin-gains-legal-protection-through.html SATURDAY, NOVEMBER 13, 2010 Bitcoin And The Electronic Frontier Foundation There are many legal implications when utilizing Bitcoin. Users of Bitcoin who conduct business with the wrong people could face charges of money laundering, identity theft, and/or fraud. Honest Bitcoin users could be implicated in crimes by criminals engaging in phishing or malware and stealing identities. The Bitcoin economy resembles that of the wild, wild, west with inherently little or no regulation. Because of the barbaric nature of this new currency it is highly susceptible to legal attacks by law enforcement. Bitcoin has recently, however, gained some legal protection by the Electronic Frontier Foundation (EFF). In another significant milestone for P2P cryptocurrency the EFF has agreed to accept Bitcoin donations! The EFF is known for legal cases involving high profile tech companies such as Apple, Google, Craigslist, and Facebook. The simple fact that the EFF is welcoming anonymous donations is a small but significant step towards Bitcoin societal acceptance. Accepting anonymous donations is not a light decision by the EFF, and the implications are monumental. For example, selling or buying Bitcoins with an anonymous user could mean unintentionally aiding terrorism or helping North Korea build nuclear weapons. Or, political groups accepting Bitcoins could be accepting funds by enemies of the state. The United States recently placed sanctions on Iran for its nuclear programs, and if Bitcoins are adopted universally then sanctions would no longer work as a tool to change the behaviors of government. In essence, the globalization of Bitcoins will affect international political policy. The disruptive nature of Bitcoin can cause unease with existing institutions and the war against Bitcoin will be waged through a legal front. The endorsement of the EFF could set up a legal battle in the future, "Bitcoin vs. Entity X". What courts could fail to realize, however, is the non-centralized aspect of Bitcoin, which makes shutting down the service next to impossible. Most likely, that is why Bitcoin will succeed no matter what trials and tribulations it may have to face. Nevertheless, the EFF's willingness to accept Bitcoins will further the cryptocurrency's cause, and will encourage the recognition of Bitcoin as a currency to be "official". Several members of bitcoin.org have been involved in making the endorsement of the EFF happen which you can read at this forum thread. Feel free to donate to the EFF at their donation page. From eugen at leitl.org Mon Nov 15 06:20:04 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 15 Nov 2010 15:20:04 +0100 Subject: Bitcoin And The Electronic Frontier Foundation In-Reply-To: <111529.75607.qm@web33301.mail.mud.yahoo.com> References: <20101115130929.GP28998@leitl.org> <111529.75607.qm@web33301.mail.mud.yahoo.com> Message-ID: <20101115142004.GW28998@leitl.org> On Mon, Nov 15, 2010 at 06:17:56AM -0800, Sarad AV wrote: > > > I was checking and Wikipedia has deleted its Bitcoin entry. how strange!did they say why? Wikipedia is in the information deletion business now. You might have missed the memo (maybe their deletion squad got it first). > Sarad. > > > --- On Mon, 11/15/10, Eugen Leitl wrote: > > > From: Eugen Leitl > > Subject: Bitcoin And The Electronic Frontier Foundation > > To: tt at postbiota.org, info at postbiota.org, cypherpunks at al-qaeda.net, or-talk at freehaven.net > > Date: Monday, November 15, 2010, 6:39 PM > > http://www.bitcoinblogger.com/2010/11/bitcoin-gains-legal-protection-through.html > > > > SATURDAY, NOVEMBER 13, 2010 > > > > Bitcoin And The Electronic Frontier Foundation > > > > > > There are many legal implications when utilizing Bitcoin. > > Users of Bitcoin > > who conduct business with the wrong people could face > > charges of money > > laundering, identity theft, and/or fraud. Honest Bitcoin > > users could be > > implicated in crimes by criminals engaging in phishing or > > malware and > > stealing identities. The Bitcoin economy resembles that of > > the wild, wild, > > west with inherently little or no regulation. Because of > > the barbaric nature > > of this new currency it is highly susceptible to legal > > attacks by law > > enforcement. Bitcoin has recently, however, gained some > > legal protection by > > the Electronic Frontier Foundation (EFF). In another > > significant milestone > > for P2P cryptocurrency the EFF has agreed to accept Bitcoin > > donations! The > > EFF is known for legal cases involving high profile tech > > companies such as > > Apple, Google, Craigslist, and Facebook. The simple fact > > that the EFF is > > welcoming anonymous donations is a small but significant > > step towards Bitcoin > > societal acceptance. > > > > Accepting anonymous donations is not a light decision by > > the EFF, and the > > implications are monumental. For example, selling or buying > > Bitcoins with an > > anonymous user could mean unintentionally aiding terrorism > > or helping North > > Korea build nuclear weapons. Or, political groups accepting > > Bitcoins could be > > accepting funds by enemies of the state. The United States > > recently placed > > sanctions on Iran for its nuclear programs, and if Bitcoins > > are adopted > > universally then sanctions would no longer work as a tool > > to change the > > behaviors of government. In essence, the globalization of > > Bitcoins will > > affect international political policy. > > > > The disruptive nature of Bitcoin can cause unease with > > existing institutions > > and the war against Bitcoin will be waged through a legal > > front. The > > endorsement of the EFF could set up a legal battle in the > > future, "Bitcoin > > vs. Entity X". What courts could fail to realize, however, > > is the > > non-centralized aspect of Bitcoin, which makes shutting > > down the service next > > to impossible. Most likely, that is why Bitcoin will > > succeed no matter what > > trials and tribulations it may have to face. Nevertheless, > > the EFF's > > willingness to accept Bitcoins will further the > > cryptocurrency's cause, and > > will encourage the recognition of Bitcoin as a currency to > > be "official". > > > > Several members of bitcoin.org have been involved in making > > the endorsement > > of the EFF happen which you can read at this forum thread. > > Feel free to > > donate to the EFF at their donation page. > > > > > -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From felix at openflows.com Mon Nov 15 07:32:49 2010 From: felix at openflows.com (Felix Stalder) Date: Mon, 15 Nov 2010 16:32:49 +0100 Subject: WikiLeaks and the Culture of Classification Message-ID: I don't think Wikileaks works on the level of operationally-relevant secrets. It's not about espionage. So the fact that there are other forums where more highly valuable stuff is being exchanged, doesn't diminish the value of Wikileaks. It's precisely its high profile and media exposure that constitutes its value. It's not about espionage, it's about politics. And, it's about inducing inducing dysfunctional habits into the organizations trying to prevent information from leaking. Assange called this once 'secrecy tax' and if I take this article here at face value, it seems to be working. Felix http://www.stratfor.com/weekly/20101027_wikileaks_and_culture_classification WikiLeaks and the Culture of Classification October 28, 2010 | 0853 GMT By Scott Stewart On Friday, Oct. 22, the organization known as WikiLeaks published a cache of 391,832 classified documents on its website. The documents are mostly field reports filed by U.S. military forces in Iraq from January 2004 to December 2009 (the months of May 2004 and March 2009 are missing). The bulk of the documents (379,565, or about 97 percent) were classified at the secret level, with 204 classified at the lower confidential level. The remaining 12,062 documents were either unclassified or bore no classification. This large batch of documents is believed to have been released by Pfc. Bradley Manning, who was arrested in May 2010 by the U.S. Army Criminal Investigations Command and charged with transferring thousands of classified documents onto his personal computer and then transmitting them to an unauthorized person. Manning is also alleged to have been the source of the classified information released by WikiLeaks pertaining to the war in Afghanistan in July 2010. WikiLeaks released the Iraq war documents, as it did the Afghanistan war documents, to a number of news outlets for analysis several weeks in advance of their formal public release. These news organizations included The New York Times, Der Spiegel, The Guardian and Al Jazeera, each of which released special reports to coincide with the formal release of the documents Oct. 22. Due to its investigation of Manning, the U.S. government also had a pretty good idea of what the material was before it was released and had formed a special task force to review it for sensitive and potentially damaging information prior to the release. The Pentagon has denounced the release of the information, which it considers a crime, has demanded the return of its stolen property and has warned that the documents place Iraqis at risk of retaliation and also place the lives of U.S. troops at risk from terrorist groups that are mining the documents for tidbits of operational information they can use in planning their attacks. When one takes a careful look at the classified documents released by WikiLeaks, it becomes quickly apparent that they contain very few true secrets. Indeed, the main points being emphasized by Al Jazeera and the other media outlets after all the intense research they conducted before the public release of the documents seem to highlight a number of issues that had been well-known and well-chronicled for years. For example, the press has widely reported that the Iraqi government was torturing its own people; many civilians were killed during the six years the documents covered; sectarian death squads were operating inside Iraq; and the Iranian government was funding Shiite militias. None of this is news. But, when one steps back from the documents themselves and looks at the larger picture, there are some interesting issues that have been raised by the release of these documents and the reaction to their release. The Documents The documents released in this WikiLeaks cache were taken from the U.S. governments Secret Internet Protocol Router Network (SIPRNet), a network used to distribute classified but not particularly sensitive information. SIPRNet is authorized only for the transmission of information classified at the secret level and below. It cannot be used for information classified top secret or more closely guarded intelligence that is classified at the secret level. The regulations by which information is classified by the U.S. government are outlined in Executive Order 13526. Under that order, secret is the second-highest level of classification and applies to information that, if released, would be reasonably expected to cause serious damage to U.S. national security. Due to the nature of SIPRNet, most of the information that was downloaded from it and sent to WikiLeaks consisted of raw field reports from U.S. troops in Iraq. These reports discussed things units encountered, such as IED attacks, ambushes, the bodies of murdered civilians, friendly-fire incidents, traffic accidents, etc. For the most part, the reports contained raw information and not vetted, processed intelligence. The documents also did not contain information that was the result of intelligence-collection operations, and therefore did not reveal sensitive intelligence sources and methods. Although the WikiLeaks material is often compared to the 1971 release of the Pentagon Papers, there really is very little similarity. The Pentagon Papers consisted of a top secret-level study completed for the U.S. secretary of defense and not raw, low-level battlefield reports. To provide a sense of the material involved in the WikiLeaks release, we will examine two typical reports. The first, classified at the secret level, is from an American military police (MP) company reporting that Iraqi police on Oct. 28, 2006, found the body of a person whose name was redacted in a village who had been executed. In the other report, also classified at the secret level, we see that on Jan. 1, 2004, Iraqi police called an American MP unit in Baghdad to report that an improvised explosive device (IED) had detonated and that there was another suspicious object found at the scene. The MP unit responded, confirmed the presence of the suspicious object and then called an explosive ordnance disposal unit, which came to the site and destroyed the second IED. Now, while it may have been justified to classify such reports at the secret level at the time they were written to protect information pertaining to military operations, clearly, the release of these two reports in October 2010 has not caused any serious damage to U.S. national security. Another factor to consider when reading raw information from the field is that, while they offer a degree of granular detail that cannot be found in higher-level intelligence analysis, they can often be misleading or otherwise erroneous. As anyone who has ever interviewed a witness can tell you, in a stressful situation people often miss or misinterpret important factual details. Thats just how most people are wired. This situation can be compounded when a witness is placed in a completely alien culture. This is not to say that all these reports are flawed, but just to note that raw information must often be double-checked and vetted before it can be used to create a reliable estimate of the situation on the battlefield. Clearly, the readers of these reports released by WikiLeaks now do not have the ability to conduct that type of follow-up. Few True Secrets By saying there are very few true secrets in the cache of documents released by WikiLeaks, we mean things that would cause serious damage to national security. And no, we are not about to point out the things that we believe could be truly damaging. However, it is important to understand up front that something that causes embarrassment and discomfort to a particular administration or agency does not necessarily damage national security. As to the charges that the documents are being mined by militant groups for information that can be used in attacks against U.S. troops deployed overseas, this is undoubtedly true. It would be foolish for the Taliban, the Islamic State of Iraq (ISI) and other militant groups not to read the documents and attempt to benefit from them. However, there are very few things noted in these reports pertaining to the tactics, techniques and procedures (TTP) used by U.S. forces that could not be learned by simply observing combat operations  and the Taliban and ISI have been carefully studying U.S. TTP every hour of every day for many years now. These documents are far less valuable than years of careful, direct observation and regular first-hand interaction. Frankly, combatants who have been intensely watching U.S. and coalition forces and engaging them in combat for the better part of a decade are not very likely to learn much from dated American after-action reports. The insurgents and sectarian groups in Iraq own the human terrain; they know who U.S. troops are meeting with, when they meet them and where. There is very little that this level of reporting is going to reveal to them that they could not already have learned via observation. Remember, these reports do not deal with highly classified human-intelligence or technical-intelligence operations. This is not to say that the alleged actions of Manning are somehow justified. From the statements released by the government in connection with the case, Manning knew the information he was downloading was classified and needed to be protected. He also appeared to know that his actions were illegal and could get him in trouble. He deserves to face the legal consequences of his actions. This is also not a justification for the actions of WikiLeaks and the media outlets that are exploiting and profiting from the release of this information. What we are saying is that the hype surrounding the release is just that. There were a lot of classified documents released, but very few of them contained information that would truly shed new light on the actions of U.S. troops in Iraq or their allies or damage U.S. national security. While the amount of information released in this case was huge, it was far less damaging than the information released by convicted spies such as Robert Hanssen and Aldrich Ames  information that crippled sensitive intelligence operations and resulted in the execution or imprisonment of extremely valuable human intelligence sources. Culture of Classification Perhaps one of the most interesting facets of the WikiLeaks case is that it highlights the culture of classification that is so pervasive inside the U.S. government. Only 204 of the 391,832 documents were classified at the confidential level, while 379,565 of them were classified at the secret level. This demonstrates the propensity of the U.S. government culture to classify documents at the highest possible classification rather than at the lowest level really required to protect that information. In this culture, higher is better. Furthermore, while much of this material may have been somewhat sensitive at the time it was reported, most of that sensitivity has been lost over time, and many of the documents, like the two reports referenced above, no longer need to be classified. Executive Order 13526 provides the ability for classifying agencies to set dates for materials to be declassified. Indeed, according to the executive order, a date for declassification is supposed to be set every time a document is classified. But, in practice, such declassification provisions are rarely used and most people just expect the documents to remain classified for the entire authorized period, which is 10 years in most cases and 25 years when dealing with sensitive topics such as intelligence sources and methods or nuclear weapons. In the culture of classification, longer is also seen as better. This culture tends to create so much classified material that stays classified for so long that it becomes very difficult for government employees and security managers to determine what is really sensitive and what truly needs to be protected. There is certainly a lot of very sensitive information that needs to be carefully guarded, but not everything is a secret. This culture also tends to reinforce the belief among government employees that knowledge is power and that one can become powerful by having access to information and denying that access to others. And this belief can often contribute to the bureaucratic jealously that results in the failure to share intelligence  a practice that was criticized so heavily in the 9/11 Commission Report. It has been very interesting to watch the reaction to the WikiLeaks case by those who are a part of the culture of classification. Some U.S. government agencies, such as the FBI, have bridled under the post-9/11 mandates to share their information more widely and have been trying to scale back the practice. As anyone who has dealt with the FBI can attest, they tend to be a semi-permeable membrane when it comes to the flow of information. For the bureau, intelligence flows only one way  in. The FBI is certainly not alone. There are many organizations that are very hesitant to share information with other government agencies, even when those agencies have a legitimate need to know. The WikiLeaks cases have provided such people a justification to continue to stovepipe information. In addition to the glaring personnel security issues regarding Mannings access to classified information systems, these cases are in large part the result of a classified information system overloaded with vast quantities of information that simply does not need to be protected at the secret level. And, ironically, overloading the system in such a way actually weakens the information-protection process by making it difficult to determine which information truly needs to be protected. Instead of seeking to weed out the overclassified material and concentrate on protecting the truly sensitive information, the culture of classification reacts by using the WikiLeaks cases as justification for continuing to classify information at the highest possible levels and for sharing the intelligence it generates with fewer people. The ultimate irony is that the WikiLeaks cases will help strengthen and perpetuate the broken system that helped lead to the disclosures in the first place. --- http://felix.openflows.com ----------------------- books out now: *|Deep Search.The Politics of Search Beyond Google.Studienverlag 2009 *|Mediale Kunst/Media Arts Zurich.13 Positions.Scheidegger&Spiess2008 *|Manuel Castells and the Theory of the Network Society. Polity, 2006 *|Open Cultures and the Nature of Networks. Ed. Futura/Revolver, 2005 # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Nov 15 08:21:22 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 15 Nov 2010 17:21:22 +0100 Subject: WikiLeaks and the Culture of Classification Message-ID: <20101115162122.GZ28998@leitl.org> ----- Forwarded message from Felix Stalder ----- From sneak at datavibe.net Mon Nov 15 11:22:20 2010 From: sneak at datavibe.net (Jeffrey Paul) Date: Mon, 15 Nov 2010 20:22:20 +0100 Subject: Bitcoin And The Electronic Frontier Foundation In-Reply-To: References: <20101115130929.GP28998@leitl.org> <111529.75607.qm@web33301.mail.mud.yahoo.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 15 Nov, 2010, at 19:19 , coderman wrote: > > the cuda cards are killing bitcoin, why bother? > > (i suppose it is an interesting footnote...) Nothing could be further from the truth. Mining/Minting operations have little/nothing to do with the viability of the network itself. It's a novel way of dealing with inflation, but, if anything, the easy availability of cheap and fast GPUs is accelerating adoption. Opportunists will quickly drive the profit from generating down to almost exactly that of the power costs, but that's to be expected. They are also the driving force behind a free market. Or do you think they are killing those, too? :) - -jp - -- ======================================================== Jeffrey Paul -datavibe- sneak at datavibe.net +1 (800) 403-1126 http://sneak.datavibe.net 5539AD00 DE4C42F3 AFE11575 052443F4 DF2A55C2 "Virtue is its own punishment." ======================================================== -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJM4YhvAAoJEAUkQ/TfKlXCncQP/0KEXywE1TutRcbI2/H+y4bm TYuLbUcY6PLGIS/EbiDP9DIeLCnwbs/Hq7I3JHrjCQash3CbYppqFEyyYlBaY/1U okOE9O6Im1Ja2drBFv8KB8X4vUs7YnFW9iRWGYZtAwWs3JNoy4IiCx5zUkenwvyx FdBX/OhWEPNzN9RWYnFtbH0sodBmbV8f7hiQFhpXEnaq+vQhOwwR3eNNmU+/G/lc zDnQ1H8t1DEoe4clOz5NCVPx2xIgdCswfC+AClYG/dZ12auNuKP008Wd6g/dHp2H s1xV2cZIrWnU3kcltzBnJD+qcgc4k6RH5vFUo1RXv9NDLbak+FufITLhP7K7BrWu LtOyhRLQx/tuS0Ac9u/fEjeDir3jdp8z/TvTn99y5xhFXy2JpLv0RJ+Kru0M8cry cjlsGT56DdoGXyhr5kDolH4ty03ZSMFBx2kvujWhxt1T+MxNLueuR/TnvEY2qrpF AlSS93sa7OqrmHeyj0nyHHe23igjrcaDlFDd1RLK2pNzQaLBcTNxF9BzcRZWUyDk g5Rr0B4Gh3GYddHtHjmQypJgDE2XzJU+WP39sHXGcCmB2hf9FHk0SBQytBIl5KRr DFaePo7CpnVjfZuPZw4AAOl21lYjCY7gRcyMqhzJOATHp7+5vDFok9L2uxiVvdT8 08XWv2ouDYcdLePrzx+w =7oPz -----END PGP SIGNATURE----- From eugen at leitl.org Mon Nov 15 11:31:48 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 15 Nov 2010 20:31:48 +0100 Subject: Bitcoin And The Electronic Frontier Foundation In-Reply-To: References: <20101115130929.GP28998@leitl.org> <111529.75607.qm@web33301.mail.mud.yahoo.com> Message-ID: <20101115193148.GC28998@leitl.org> On Mon, Nov 15, 2010 at 10:19:31AM -0800, coderman wrote: > On Mon, Nov 15, 2010 at 6:17 AM, Sarad AV wrote: > > I was checking and Wikipedia has deleted its Bitcoin entry. how strange!did they say why? > > the cuda cards are killing bitcoin, why bother? They chose the space too small? I don't really know which algorithms Bitcoin uses. CUDA isn't that much, for many problems we've got at work it only provides a 10x speedup. Presumably for brute-force searches it could do a 100x speedup. Why is Bitcoin vulnerable to only a couple of orders magnitude faster systems? > (i suppose it is an interesting footnote...) -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From leavens at rossmoregroup.com Mon Nov 15 16:14:47 2010 From: leavens at rossmoregroup.com (=?koi8-r?B?88/A2iDLwcTSz9fJy8/X?=) Date: Mon, 15 Nov 2010 21:14:47 -0300 Subject: =?koi8-r?B?6NLBzsXOycUgySDVzsne1M/Wxc7JxSDEz8vVzcXO1M/X?= Message-ID: <983100001.69949832482828@rossmoregroup.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2612 bytes Desc: not available URL: From eugen at leitl.org Mon Nov 15 13:55:21 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 15 Nov 2010 22:55:21 +0100 Subject: WikiLeaks and the Culture of Classification Message-ID: <20101115215521.GG28998@leitl.org> ----- Forwarded message from Brian Holmes ----- From alittle_nq at trnetwork02.trnetworkconsulting.com.jfet.org Mon Nov 15 15:22:54 2010 From: alittle_nq at trnetwork02.trnetworkconsulting.com.jfet.org (Alphonse Little) Date: Mon, 15 Nov 2010 23:22:54 +0000 Subject: Knock knock... Who's ready to make it? hrn In-Reply-To: <5da601cb8088$940fcc4a$f754a551@kbmah5o> Message-ID: <4CE1C0CE.7AFC9277@trnetwork02.trnetworkconsulting.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 30534 bytes Desc: not available URL: From skquinn at speakeasy.net Mon Nov 15 21:23:02 2010 From: skquinn at speakeasy.net (Shawn K. Quinn) Date: Mon, 15 Nov 2010 23:23:02 -0600 Subject: Bitcoin And The Electronic Frontier Foundation In-Reply-To: <20101115142004.GW28998@leitl.org> References: <20101115130929.GP28998@leitl.org> <111529.75607.qm@web33301.mail.mud.yahoo.com> <20101115142004.GW28998@leitl.org> Message-ID: <1289884982.17653.5.camel@afterburner> On Mon, 2010-11-15 at 15:20 +0100, Eugen Leitl wrote: > On Mon, Nov 15, 2010 at 06:17:56AM -0800, Sarad AV wrote: > > > > > > I was checking and Wikipedia has deleted its Bitcoin entry. how > strange!did they say why? > > Wikipedia is in the information deletion business now. > You might have missed the memo (maybe their deletion > squad got it first). What a shame. I honestly thought Jimmy Wales and the others in charge were better than that. -- Shawn K. Quinn From ashantivs at themoscowtimes.com Tue Nov 16 05:35:43 2010 From: ashantivs at themoscowtimes.com (Joelle Ashanti) Date: Tue, 16 Nov 2010 06:35:43 -0700 Subject: 100% herbal, 100% Natural, 100% Safe, The proven NaturalPenisEnhancement that works! se4b In-Reply-To: <626201cb8506$c9525b57$4492ebf5@lr5lby1> Message-ID: <4CE288AF.B8B477A0@themoscowtimes.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://belliscio.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 847 bytes Desc: not available URL: From c.fabiola_ee at laposte.net Tue Nov 16 05:37:12 2010 From: c.fabiola_ee at laposte.net (Charlott Fabiola) Date: Tue, 16 Nov 2010 06:37:12 -0700 Subject: .PenisLong, used & recommended by Sex industry professionals, Buy this effective herbal EnlargementPills c6 In-Reply-To: <121101cb84ac$ae840cb8$dee7f63e@tu9m12u> Message-ID: <4CE28908.A1A0824F@laposte.net> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://tugvisit.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 714 bytes Desc: not available URL: From eugen at leitl.org Mon Nov 15 23:54:49 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 16 Nov 2010 08:54:49 +0100 Subject: Bitcoin And The Electronic Frontier Foundation In-Reply-To: <1289884982.17653.5.camel@afterburner> References: <20101115130929.GP28998@leitl.org> <111529.75607.qm@web33301.mail.mud.yahoo.com> <20101115142004.GW28998@leitl.org> <1289884982.17653.5.camel@afterburner> Message-ID: <20101116075449.GL28998@leitl.org> On Mon, Nov 15, 2010 at 11:23:02PM -0600, Shawn K. Quinn wrote: > On Mon, 2010-11-15 at 15:20 +0100, Eugen Leitl wrote: > > On Mon, Nov 15, 2010 at 06:17:56AM -0800, Sarad AV wrote: > > > > > > > > > I was checking and Wikipedia has deleted its Bitcoin entry. how > > strange!did they say why? > > > > Wikipedia is in the information deletion business now. > > You might have missed the memo (maybe their deletion > > squad got it first). > > What a shame. I honestly thought Jimmy Wales and the others in charge > were better than that. They do not seem to exercise their leadership to squash the dysfunctional culture. It's gotten pretty bad, particularly with German Wikipedia. Apparently, something stinky financially as well. The only way to combat that is to use something like Tahoe, and have multiple independent institutions linking into it. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From wilton.hobd at lazyfellow.com Tue Nov 16 01:54:15 2010 From: wilton.hobd at lazyfellow.com (Wilton Ho) Date: Tue, 16 Nov 2010 09:54:15 +0000 Subject: Did you order a cow? Moooooooo lf In-Reply-To: <29b901cb8148$8779d8dd$616f4625@wxnjt01> Message-ID: Hey that stick symbol is GACR.pk, call your broker NOW before is too late From sneak at datavibe.net Tue Nov 16 02:10:16 2010 From: sneak at datavibe.net (Jeffrey Paul) Date: Tue, 16 Nov 2010 11:10:16 +0100 Subject: Bitcoin And The Electronic Frontier Foundation In-Reply-To: References: <20101115130929.GP28998@leitl.org> <111529.75607.qm@web33301.mail.mud.yahoo.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 16 Nov, 2010, at 03:41 , Kyle Williams wrote: > For those who are wondering if it's worth trying to generate bitcoins, here is something to think about. > I've had a single Quad-Core (2.6GHz/core, 12MB L2 cache) server crunching on bitcoins for about 6 months now. About 2-3 months ago, it stopped generating bitcoins. > Someone is out there with a lot of GPU's, crunching away at the bitcoin network and is hording/generating all the bitcoins. I say this because the amount of chatter on the bitcoin forums in regards to GPUs vs CPUs has exploded, and new GPU clients are being released. For those who are wondering if it's worth trying to generate bitcoins, here is something to think about. I bought an overpriced GPU for $700 (apparently they are closer to $500 from other sellers) that generates about 50 bitcoins a day on the LOW end. Bitcoins being worth approximately $0.25 USD (also on the low end), this card generates $12.50 a day for approximately $0.70/day in electricity. Both of these figures (how often it generates bitcoins, as well as how much coins are worth) will, without question, change radically in the next 90 days. Minting is not essential to the liquidity of bitcoins. If you are interested in using them, anyone can log on to any of the exchanges (of which I think mtgox.com is the largest) and purchase coins instantly. Their utility is not defined by "how easily can one make them out of thin air", but instead by "are there people who accept these as valuable". There are thousands of bitcoins available for sale, and thousands of Liberty Reserve dollars available as bids. The market, while small, is liquid and becoming more so every day. Also, this shadowy "someone" you speak of is sitting in the bitcoin-dev irc channel, and I think he's up to about 20 GPUs at this point. Still, his effect on the market only strengthens the cryptographic underpinnings of bitcoin. It doesn't affect anyone else, as the network regularly re-calibrates (as part of the bitcoin protocol) to ensure that no matter how many GPUs are running, there is a fixed rate of 50-coins-per-ten-minutes of inflation. - -jp - -- ======================================================== Jeffrey Paul -datavibe- sneak at datavibe.net +1 (800) 403-1126 http://sneak.datavibe.net 5539AD00 DE4C42F3 AFE11575 052443F4 DF2A55C2 "Virtue is its own punishment." ======================================================== -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJM4liLAAoJEAUkQ/TfKlXCTLQP/0PMvmaEW9RbF4bd3Frh3Ll6 fvLoYy4VXpCVu8IYEAvAKfyhRYvTqoic0MePf6F0ka/cO//ufIP6pmKjTJh1ZG16 Z1qYK03MIgfkTHSRK83Ir+r6aAophm6x0dwbLmjE00SPlrlv3AemDycuS2rs4b/9 tUtYKcvNtP+rg3KFEskn6vJHRIesLAKmCIOlDPHW75wIanYM+7TrOdKgYQJs6B7k wBZ938TAQ7SOY/G9jP3fFaUfqEEBq4Pwm4oi6GMyHFDod3P/nQhRNHKl3IU+56Hp 17mHs3Ej/4HTe7L5lwEU9mrVFqeC5cK7CyJKYpfV2qwbF6Hpf2uG03G2uN5pTBpz xzm6bN0eYkflVVn1j5UgNMeT3WixAe7BYPpPWx+ka/+WGt7PP4Ywxws9SZJyApmM YMQSOb3KWZGLHq9MutfUkAV1ImCLj/ciVR0BZsCORXUNqUcfvEo+8nM+W8wRyGmJ VuvToLH4GYqEPg8dpMt9maDezUMO4vL77wTDVZcsxDsa0H8VP/DWOsOH9/C8ZS2b vNdiAmJRk3BGrg2Yl8NBooK3AQxp2BboJDzM9Ko8+7WyEhidPWoagfRyHv7/5k6M hpiXB+V20as2Ky0Q+nC7jAcaO+orQBMhRaiY8bOI1ShJ3k2YgwfFnGe6jvFrsBc/ ZTIyy4Gne9/yDH8FDFAj =51Cn -----END PGP SIGNATURE----- From my.green.lantern at googlemail.com Tue Nov 16 05:07:05 2010 From: my.green.lantern at googlemail.com (Anon Mus) Date: Tue, 16 Nov 2010 13:07:05 +0000 Subject: Bitcoin And The Electronic Frontier Foundation Message-ID: Kyle Williams wrote: > Coderman sent this to me, and I'm a little upset because the extra > $60.00/month for 0 bitcoins is very annoying. I have since stopped > trying to generate bitcoins, because it's just wasting electricity. > More comment inline below debating this point. > > > For those who are wondering if it's worth trying to generate bitcoins, > here is something to think about. > I've had a single Quad-Core (2.6GHz/core, 12MB L2 cache) server > crunching on bitcoins for about 6 months now. About 2-3 months ago, it > stopped generating bitcoins. > Someone is out there with a lot of GPU's, crunching away at the bitcoin > network and is hording/generating all the bitcoins. I say this because > the amount of chatter on the bitcoin forums in regards to GPUs vs CPUs > has exploded, and new GPU clients are being released. > > > ---------- Forwarded message ---------- > From: Jeffrey Paul > > Date: Mon, Nov 15, 2010 at 11:22 AM > Subject: Re: Bitcoin And The Electronic Frontier Foundation > To: coderman > > Cc: Sarad AV >, Eugen Leitl >, > cypherpunks at al-qaeda.net > > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > > On 15 Nov, 2010, at 19:19 , coderman wrote: > > > > > the cuda cards are killing bitcoin, why bother? > > > > (i suppose it is an interesting footnote...) > > > > Nothing could be further from the truth. Mining/Minting operations > have little/nothing to do with the viability of the network itself. > > > That's correct, it has to do with the number of operations per second > you CPU/GPU can do. The network is based on the number of supporters. > Apple's and oranges. > > It's a novel way of dealing with inflation, but, if anything, the easy > availability of cheap and fast GPUs is accelerating adoption. > > > You're twisting facts together here, again apple's and orange's. > Inflation aside, GPUs will generate bitcoins much, much faster than a > CPU. > > > > Opportunists will quickly drive the profit from generating down to > almost exactly that of the power costs, but that's to be expected. > > > No, the value of bitcoins starts to be cut in half as the more bitcoins > are generated. > > "The number of blocks times the coin value of a block. The coin value > is 50 bc per block for the first 210,000 blocks, 25 bc for the next > 210,000 blocks, then 12.5 bc, 6.25 bc and so on." -- > http://www.bitcoin.org/faq#What-s_the_current_total_amount_of_Bitcoins_in_existence > > So when the value of BTC's starts to be cut in half, and with INFLATION > now at a record high, the cost of electricity is NOT GOING DOWN. > Hence, the chance of you generating bitcoins will go down because a CPU > can not compete with someone else's GPU, more power/electricity is > being used to generate (or not generate) bitcoins, and after the last > six month's of running bitcoin, I haven't generated a single block in > over two months because someone has already cornered this market with > GPU's. > > They are also the driving force behind a free market. Or do you think > they are killing those, too? :) > > > Of course someone quotes the "free market" when they have a large > corner of it. Free market's always FAIL when someone is hording all > the (bit)coins, and while it may support free market's, it certainly is > not a fair market today. If 2,000,000 bitcoins are spread about a few > thousand people, and 19,000,000 coins are held by 1 person, your "Free > Market" goes down the drain because one person could out-buy anyone > else. > > One last point; by looking @ the #bitcoin channel on IRC, it shows that > about 600 people are wasting their CPU cycles because someone has most > likely has a cluster of GPU's working away at this. This is the wasted > cost of TRYING to generate a bitcoin. If only one person can generate > the block (ie, 50 Bitcoins right now), then 599 people are wasting their > electricity and time. So the ~$60 a month (increase in my electric > bill) * 599 = $35,940. Even if we decide to be really conservative (not > realistic in this case) and cut this cost down by a tenth, it's still > ~$3,594 being wasted per month while someone else get's the coins. How > "green" or "eco-friendly" is that? > > Now I ask the community, If your chance of generating a bitcoin block > for yourself is slim-to-none, would you want to waste your time and > money trying to generate bitcoins? > > Don't get me wrong, I hate what is happening to the USD, and love the > idea of crypto currency, but I see some serious flaws with bitcoin. He > who has the biggest cluster will win the day, and leaves the rest of us > with next to nothing. > > - Kyle A few months ago I saw this as well using a dual core 2.666, but I found a little trick which increases the coin production. Just re-boot every 2-3 days, then you usually get a flush of coins. At the time I considered getting an i7, just out, which has on chip hardwired encryption circuits. Its lightning fast on generating the hashes and even half a dozen of these were generating bitcoins then anyone with lesser technology doesn't stand a chance. http://www.intel.com/products/processor/corei7/index.htm It sounds to me like these are now being used. Time to upgrade. It would be interesting if anyone had experience of using the i7. On the question of cost. If you have a machine which already has to run 24/7 (say a Tor node) then the extra cost of max CPU usage is about $5-15/mo. (My dual core costs about $15/mo without bitcoin) *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From buh at pelvis.ru Tue Nov 16 02:24:20 2010 From: buh at pelvis.ru (Corina Ham) Date: Tue, 16 Nov 2010 13:24:20 +0300 Subject: =?koi8-r?B?xsnSzcXOztnFINfJ2snUy8k=?= Message-ID: <000d01cb8578$6e53da70$6400a8c0@buh> Полиграфическая компания "Декарт". Типография рядом с метро "Китай-Город" и "Лубянка". Дизайн-бюро. Все виды печати.Любые тиражи. Новогоднее предложение. Конверты с вашим логотипом. 100 шт. - 1705 руб. (полноцветная печать) 500 шт. - 2951 руб. (печать в две краски) 1000 шт. - 3683 руб. (печать в две краски) Открытки. на дизайнерских сортах бумаги. 100 шт. - 2375 руб. 200 шт. - 3800 руб. Визитные карточки (за 100 штук) 699 руб. - полноцветная печать на бумаге с фактурой "лен" 774 руб. - полноцветная печать на металлизированных сортах бумаги 1600 руб. - печать золотом или серебром на черной "резиновой" бумаге Touche Cover при заказх более 100 шт. - значительные скидки. Помощь в доработке макетов. Квартальные календари 50 шт. - 8275 руб. 100 шт. - 15040 руб. А также: Фотокалендари (календари с вашей фотографией) Буклеты Каталоги Перекидные и квартальные календари Плакаты Открытки Сувенирная продукция Пакеты (бумажные и полиэтиленовые) Разработка дизайна полиграфической продукции. Верстка и подготовка издания к печати. Фотосъемка и цифровая обработка иллюстраций. контакты: e-mail: dek-art at list.ru тел.: (495) 545-69-29, 623-91-63 адрес: Кривоколенный пер., д.4, стр.5 метро "Лубянка", "Китай-Город", "Чистые пруды" -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5081 bytes Desc: not available URL: From eugen at leitl.org Tue Nov 16 05:11:28 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 16 Nov 2010 14:11:28 +0100 Subject: Bitcoin And The Electronic Frontier Foundation Message-ID: <20101116131128.GN28998@leitl.org> ----- Forwarded message from Anon Mus ----- From thegravitator at googlemail.com Tue Nov 16 07:00:01 2010 From: thegravitator at googlemail.com (TheGravitator) Date: Tue, 16 Nov 2010 15:00:01 -0000 Subject: Bitcoin And The Electronic Frontier Foundation Message-ID: Its not all i7's, only the i7-980X (extreme series) about $1000. Here's the benchmarks - see the AES256 results http://www.tomshardware.com/reviews/overclocking-phenom-ii-x6-efficiency,2633-8.html Of course, the i5 also had this, but it is still slower. http://www.tomshardware.com/reviews/core-i3-530-overclock-lga-1156,2626-6.html ----- Original Message ----- From: "Anon Mus" To: Sent: Tuesday, November 16, 2010 1:07 PM Subject: Re: Bitcoin And The Electronic Frontier Foundation > Kyle Williams wrote: > > Coderman sent this to me, and I'm a little upset because the extra > > $60.00/month for 0 bitcoins is very annoying. I have since stopped > > trying to generate bitcoins, because it's just wasting electricity. > > More comment inline below debating this point. > > > > > > For those who are wondering if it's worth trying to generate bitcoins, > > here is something to think about. > > I've had a single Quad-Core (2.6GHz/core, 12MB L2 cache) server > > crunching on bitcoins for about 6 months now. About 2-3 months ago, > > it stopped generating bitcoins. > > Someone is out there with a lot of GPU's, crunching away at the > > bitcoin network and is hording/generating all the bitcoins. I say > > this because the amount of chatter on the bitcoin forums in regards to > > GPUs vs CPUs has exploded, and new GPU clients are being released. > > > > > > ---------- Forwarded message ---------- > > From: Jeffrey Paul > > > Date: Mon, Nov 15, 2010 at 11:22 AM > > Subject: Re: Bitcoin And The Electronic Frontier Foundation > > To: coderman > > > Cc: Sarad AV > >, Eugen Leitl > >, > > cypherpunks at al-qaeda.net > > > > > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA256 > > > > > > On 15 Nov, 2010, at 19:19 , coderman wrote: > > > > > > > > the cuda cards are killing bitcoin, why bother? > > > > > > (i suppose it is an interesting footnote...) > > > > > > > > Nothing could be further from the truth. Mining/Minting operations > > have little/nothing to do with the viability of the network itself. > > > > > > That's correct, it has to do with the number of operations per second > > you CPU/GPU can do. The network is based on the number of supporters. > > Apple's and oranges. > > > > > > It's a novel way of dealing with inflation, but, if anything, the easy > > availability of cheap and fast GPUs is accelerating adoption. > > > > > > You're twisting facts together here, again apple's and orange's. > > Inflation aside, GPUs will generate bitcoins much, much faster than a > > CPU. > > > > > > > > Opportunists will quickly drive the profit from generating down to > > almost exactly that of the power costs, but that's to be expected. > > > > > > No, the value of bitcoins starts to be cut in half as the more > > bitcoins are generated. > > > > "The number of blocks times the coin value of a block. The coin value > > is 50 bc per block for the first 210,000 blocks, 25 bc for the next > > 210,000 blocks, then 12.5 bc, 6.25 bc and so on." > > -- http://www.bitcoin.org/faq#What-s_the_current_total_amount_of_Bitcoins_in_existence > > > > So when the value of BTC's starts to be cut in half, and with > > INFLATION now at a record high, the cost of electricity is NOT GOING DOWN. > > Hence, the chance of you generating bitcoins will go down because a > > CPU can not compete with someone else's GPU, more power/electricity is > > being used to generate (or not generate) bitcoins, and after the last > > six month's of running bitcoin, I haven't generated a single block in > > over two months because someone has already cornered this market with > > GPU's. > > > > They are also the driving force behind a free market. Or do you think > > they are killing those, too? :) > > > > > > Of course someone quotes the "free market" when they have a large > > corner of it. Free market's always FAIL when someone is hording all > > the (bit)coins, and while it may support free market's, it certainly > > is not a fair market today. If 2,000,000 bitcoins are spread about a > > few thousand people, and 19,000,000 coins are held by 1 person, your > > "Free Market" goes down the drain because one person could out-buy > > anyone else. > > > > One last point; by looking @ the #bitcoin channel on IRC, it shows > > that about 600 people are wasting their CPU cycles because someone has > > most likely has a cluster of GPU's working away at this. This is the > > wasted cost of TRYING to generate a bitcoin. If only one person can > > generate the block (ie, 50 Bitcoins right now), then 599 people are > > wasting their electricity and time. So the ~$60 a month (increase in > > my electric bill) * 599 = $35,940. Even if we decide to be really > > conservative (not realistic in this case) and cut this cost down by a > > tenth, it's still ~$3,594 being wasted per month while someone else > > get's the coins. How "green" or "eco-friendly" is that? > > > > Now I ask the community, If your chance of generating a bitcoin block > > for yourself is slim-to-none, would you want to waste your time and > > money trying to generate bitcoins? > > > > Don't get me wrong, I hate what is happening to the USD, and love the > > idea of crypto currency, but I see some serious flaws with bitcoin. > > He who has the biggest cluster will win the day, and leaves the rest > > of us with next to nothing. > > > > - Kyle > A few months ago I saw this as well using a dual core 2.666, but I found > a little trick which increases the coin production. Just re-boot every > 2-3 days, then you usually get a flush of coins. > > At the time I considered getting an i7, just out, which has on chip > hardwired encryption circuits. Its lightning fast on generating the > hashes and even half a dozen of these were generating bitcoins then > anyone with lesser technology doesn't stand a chance. > > http://www.intel.com/products/processor/corei7/index.htm > > It sounds to me like these are now being used. Time to upgrade. It would > be interesting if anyone had experience of using the i7. > > On the question of cost. If you have a machine which already has to run > 24/7 (say a Tor node) then the extra cost of max CPU usage is about > $5-15/mo. (My dual core costs about $15/mo without bitcoin) > > > > *********************************************************************** > To unsubscribe, send an e-mail to majordomo at torproject.org with > unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Nov 16 07:01:57 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 16 Nov 2010 16:01:57 +0100 Subject: Bitcoin And The Electronic Frontier Foundation Message-ID: <20101116150157.GU28998@leitl.org> ----- Forwarded message from TheGravitator ----- From coequalo7593 at reawire.com Tue Nov 16 16:43:05 2010 From: coequalo7593 at reawire.com (=?koi8-r?B?68/O09XczM8g5sXEz9LP187B?=) Date: Tue, 16 Nov 2010 21:43:05 -0300 Subject: =?koi8-r?B?5O/s6SDzIPDy7/bp9+Hu6eXtIPcg7e/z6/flIO/0IDUwMCAwMDDSLg==?= Message-ID: <921203041.02420806737166@reawire.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 411 bytes Desc: not available URL: From buh at sorokin.pp.ru Tue Nov 16 08:07:56 2010 From: buh at sorokin.pp.ru (=?koi8-r?B?68/N0NjA1MXSztnKIMvMwdPT?=) Date: Tue, 16 Nov 2010 22:07:56 +0600 Subject: =?koi8-r?B?8sHa0sHCz9TLwSDJIMHOwczJ2iDCydrOxdMg0MzBzsEu?= Message-ID: <000d01cb85a8$6e58bba0$6400a8c0@buh> Тема: Методы, рекомендации по разработке бизнес плана для инвестиционных фондов и банков. +7 Московский код: Ч45/Ч0/95 и ЧЧ54053 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом. Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Краткая информация о предстоящем мероприятии: Дата учебного курса: 22-23 Ноября Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. Вся информация по тел: (код Москвы) 7922i.22 ; 742/9198 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4303 bytes Desc: not available URL: From herringd at coastalcarolina.edu Tue Nov 16 18:23:53 2010 From: herringd at coastalcarolina.edu (Graham Ibarra) Date: Wed, 17 Nov 2010 05:23:53 +0300 Subject: Updates Message-ID: <931819638.52645155097388@coastalcarolina.edu> Hey Family! Just wanted top62tpel write yobmu, and let yor963yu knospcq1bi6w, hodfs4welw the degy4elmree prokvhyh0ykgram I tried odhk84o1ut went. Well, six weeks later, I graduated, finished & received my Masters Degrqnqw5ee with nod8g7t4 study required and %100 verifiable. Yeah mo17x9rx07m, I kno2sbvrw yo8h0isu and Dad dod1pmubted it at first, but this turned o8vut to73trg9 be %100 legit. This ouwoppoyzdrtunity was given toxtudbk me because oypz2wqsdf the proyqcu0mfessiocp9t84t9nal experience and previow97ruvcus co9yozofzurse wop69q29rk I had accumulated. I’m sojf6 excited moncm and dad, this was a life altering ozkkzq3mppo25ohyrtunity & fok5nxr ovbmnce in my life I towqhuovhok advantage o2viorm0kf it. I already have joy0616fzbs, that wozrfuldn’t have given me a chance befomz985elyre, notzw they are calling ohcn0vrff the ho25elo30xelqk! This really is a goj9f1dsend. Tell Susan and Coxw2jusin Jo6xqj4mey that they better hurry up and call that # I gave them the oy087ther day. Again these are the degre24fes they oq4ffer, BA, BSC, MA, MSnktC, MujBA and Phel1zs0rkhD, and the number towel2 call is 1-801-461-5023, tell them toqqzhy leave a brief message with their name, the degu16jjvree they are interested in and their day and evening phocwt5dne numbers. They will conk8keljfntact yoh8u sofo96ooan after, Anyway, much lowr21uelz7ve, and tell the rest o57p3sca3f the family I said hellohv Lo3zvu0ve, Yo0kspur so974yd5f1n, Jo7f1eloghn P.s. Mo7jgm72pm, why dowrkn’t yo5ib5q5azu send this email to8uzy1g a few ojvabp09if yogel8ur friends? My proqbwrfessokk5r topdxkld me that if we send of8elver referrals the scho1q8eloio7hl can give us a scho1rlarship. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6897 bytes Desc: not available URL: From raquelhy at oxygenforbusiness.com Wed Nov 17 05:49:35 2010 From: raquelhy at oxygenforbusiness.com (Jerilyn Raquel) Date: Wed, 17 Nov 2010 06:49:35 -0700 Subject: Discount Brand Watson - 10/325 mg: 30 - $199 / 120 - $588, NoPrescription Required, ty54 In-Reply-To: Message-ID: <4CE3DD6F.DCD60B01@oxygenforbusiness.com> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://ckjidh.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 794 bytes Desc: not available URL: From jya at pipeline.com Wed Nov 17 05:23:27 2010 From: jya at pipeline.com (John Young) Date: Wed, 17 Nov 2010 08:23:27 -0500 Subject: Steve Coll: Leaks (The New Yorker) Message-ID: Give apathy a chance, stash away adrenaline rush. Be quiet preacher, deity is snoozing with the flock. Leaks are not what they are claimed to be. Ooze is better. It is true that nearly all who have asked me, excuse the Thomas Friedman conceit, to comment on Wikileaks chastise for failing to join the orchestrated furor. I don't call them, the Wikileaks shills drop the dime and pretend insult when I call them what they are. Wikileaks in its original formulation is not what it has become, but that is a common bait and switch of authoritatives, compulsively reciting their credentials -- the history, the brand -- in the face of skepticism, or worse, disinterest -- how dare you ignore Wikileaks was one of its last press releases and pep talks to its volunteers mail list in the fall of 2009. No matter I praise the initiative's valuable contribution of documents for study, the main focus since the fall of 2009 has been on the Wikileaks advertising wrapping which diminishes attention for the documents as does all advertising diminish journalism, publishing, education and other means of information distribution. Wikileaks commentary and preen on their documents substitutes for the time and required to read, reflect and ponder, in accord with editorialism and hyperbole of authoritatives who only profit from the cream robbed from the milk. Few consume Wikileaks documents of the past or present so enjoyable is the substitute MREs composed of ignorant opinion. Some brag of not reading the documents, then proceed to boogy madly "on the urgent issue," i.e., Glenn Greenwald and a pack of other pro and con yappers wrapped in ads for themselves, sorry, opinionators, articulators of authoritativenss, fierce wide- eyeballers hoping to offset the dupery of opposing glazers. No doubt the apatheticism induced by ages-old advertising of authoritatives is the intent of hyperbole. However, it is worth considering how apathy -- a euphemism which can conceal a battery of resistances to parental hounding to behave and believer -- frees from obedience of an incessant message to be like us, those who know, i.e. "breaking news," and a slew of exhortations to eat branded puke upchucked in lieu of your own meals, your own musings and doubts of the high-volume yellers. Adrenaline is the aboriginal drug and without it not much pig in a poke would be sold, whether for love, war, politics, security and, OMG, wisdom, trenchancy, insight, reason, responsibility, the lot of the imaginary chimericals resting on a natural bed of chemical thrill at being in the know of "what's important to know." And who knows this best, the articulators of authoritativeness. Call them charlatans, for which they will thank you, but do not ignore them, for which they will assault your go away. Noise is what these brayers make, this is not needed by Wikileaks to do what it does best, indeed its PR is wide-mouthedly wretched in the carny barker tradition, and has led to a cessation of document publication. All tweets and no docs is what adrenaline peddlers inject. Knowledge industry is coequal with entertainment, mix the two and you have advertising, which is a word over-trenchantly examined for its teleological importance, self-vaunting, with decades of blather and bombast about whore media and its pimps, "the finest minds on earth." Writing and speaking in cliches is the norm now wrapped in self-hype to counter other people's apathy. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From dfelice at terralawfirm.com Tue Nov 16 16:19:05 2010 From: dfelice at terralawfirm.com (Crystal Rudd) Date: Wed, 17 Nov 2010 09:19:05 +0900 Subject: Wed, 17 Nov 2010 09:19:05 +0900 Message-ID: <602638235.47040256142135@terralawfirm.com> Get a Degree in 4 tobogx7 6 Weeks with osmzxh3wur pro1td6k9ugram! ~We ofcffer a pro4uppfygram that will help ANYo6gd07hkNE with pro6yb1ooqpfessiokzu91qnal experience get a 100% verified Degree: Do0wctocyuw9srate (PHD), Bachelodurs, Masters - Think aboa2oviut it... Within a few weeks, yomn41u can becotpamajme a co1tyxollege graduate!- Foha3zllo5uobnuhqw YoqtykwuUR Dreams- Live a better life by earning okksr upgrading yoixur degree This is a rare chance tohjb4h make a right moyydsve and receive yomuggr2nur due benefits... if yoozpuaahu are qualified but are lacking that piece oceljf paper, Get ozkkq1xvdne froruhut8m us in a fractio9n13n o3jsrf the time. ~CALL Foqu4R A FREE Cox3m1ibNSULTATIob03g3mxoN~ 1-801-461-5023 It is yoelc2ksiknur moqg9n00ve... Make the right decisio2znpnvvn. Due to957 time zocibyne variatiox1o6ns acrozbss the cooyydeleluntry, a representative may noysk043wat be in the ojtt8ffice at the time oz3f youjgvjur call. If that is the case please leave us a message with yofr9moufur name and phoc5ne number and we will get back tofn2k4g yorgiwvjtu as so350v89odounn as po16ssible. Dodo4m54k Nokx81zt Reply to0unbis this Email. We doio nog6x65nj6t reply tokgaas text inquiries, and onyptnvur server will reject all respofrifonse traffic. We apof30qtz4hlotomgize forq09or any inco1hnu0nvenience this may have caused yoyarkcn91u. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5905 bytes Desc: not available URL: From permutations8 at rae-wagner.com Tue Nov 16 21:01:56 2010 From: permutations8 at rae-wagner.com (=?koi8-r?B?9NLFws/Xwc7J0SDmxcTF0sHM2M7PyiDh0sjJ187PyiDzzNXWwtk=?=) Date: Wed, 17 Nov 2010 11:01:56 +0600 Subject: =?koi8-r?B?7s/X2cUg1NLFws/Xwc7J0SDLIMvBxNLP18/N1SDExczP0NLPydrXz8TT?= =?koi8-r?B?1NfV?= Message-ID: <618829950.20817353108106@rae-wagner.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2612 bytes Desc: not available URL: From art at b-art.ru Wed Nov 17 02:43:10 2010 From: art at b-art.ru (=?koi8-r?B?5NLPwszFzsnFIMLJ2s7F08E=?=) Date: Wed, 17 Nov 2010 12:43:10 +0200 Subject: =?koi8-r?B?89DP08/C2SDJINPIxc3ZIMTSz8LMxc7J0SDCydrOxdPB?= Message-ID: <4A06D8921761417BA70B36CBF04A3A0F@kristina64d23e> Тема: Риски и ошибки совершаемые при дроблении бизнеса, применении льготных режимов налогообложения Дата учебного курса: Девятнадцатого ноября 2010г. Sem_s} 1. Вывод сотрудников. Аутсорсинг. Способы разделения организации. 2. Разбор действенных "легенд" в обоснование дробления бизнеса (на основе практики, решений судов). 3. Переквалификация аутсорсинга, возмездного оказания услуг в трудовые отношения. Разбор ошибок при оформлении документов. 4. Анализ ошибок допускаемых при аутсорсинге (работа осуществляется без цели извлечения прибыли, является зависимой от головного предприятия и т.п.). 5. Основания завышения стоимости работ, услуг, получаемых от вновь созданного предприятия (почему ранее те же работы выполнялись за 10 рублей, а сейчас за 100?). 6. Разбор способа позволяющего защититься от претензий по трансфертному ценообразованию и признании лиц недобросовестными, а саму схему созданной в целях получения необоснованной налоговой выгоды. 7. Защита от показаний/шантажа сотрудников. 8. Обход пределов применения УСН с использованием договора простого товарищества. Легенды, обосновывающие заключение такого договора. 9. Аутстаффинг. 10. Выплата компенсаций за вредные условия труда как альтернатива аутсорсингу. 11. Получение компаниями НДС при оплате работ/услуг аутсорсера на УСН. Риски и способы защиты. 12. Потеря документов, как способ максимальной защиты от возможных претензий контролирующих органов. 13. Анализ лимита выручки при применении УСН. 14. Фактическое нахождение юридического лица не по месту регистрации, либо наличие обособленных подразделений по ст. 55 ГК РФ как основание утраты права на применение УСН. 15. Сокрытие афиллированности: использование доверенных лиц, оффшоров, некоммерческих организаций. 16. Передача имущества при дроблении: реорганизация, взнос в уставный капитал, займы и т.п. Судебная практика, выявляющая риски безвозмездной передачи имущества, дарения. 17. Защита активов - правило "четырех углов". 18. Способы контроля доверенных лиц как элемент безопасности активов. 19. Способы управления группой компаний. 20. Презумпция недобросовестности. Проект Постановления ВАС о недобросовестности. 21. Рассмотрение методичек Минфина (ДСП) о выявлении и предъявлении претензий к компаниям осуществившим дробление своей структуры. Новые требования к выездным проверкам и т.д. По вопpоcам pегucтаpацuu обpащайтеcь по тел: (Ч95) 742/9l98 : ЧЧ5.З2/66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3213 bytes Desc: not available URL: From abbie.margrm at magellanhealth.com Wed Nov 17 11:48:35 2010 From: abbie.margrm at magellanhealth.com (Abbie Marg) Date: Wed, 17 Nov 2010 12:48:35 -0700 Subject: Be a LONG-man, buy this effective herbal EnlargementPills g7 In-Reply-To: Message-ID: <4CE43193.2FD95477@magellanhealth.com> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://rinsend.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 710 bytes Desc: not available URL: From buh at olympic-2010.ru Tue Nov 16 21:50:06 2010 From: buh at olympic-2010.ru (Adrian Marrero) Date: Wed, 17 Nov 2010 12:50:06 +0700 Subject: =?koi8-r?B?IPrBws/SIMfP1M/X2cou?= Message-ID: <131F9EFF4AA9451194E9582BB3067CFD@nznfaaf044ac7f> ЗАБОРЫ СВАРНЫЕ Готовые секции ПРОДАЮТСЯ. Из профильной трубы 20х20 мм. Секции с пиками - длина 3,0 м высота 2,0 м. – 300 штук. Цена от 3000 руб. за штуку. Столбы от 300 руб за штуку. Скидки на объемы. На заказ любые. Производство на Волоколамском шоссе. 8 (903) 549 – 03 – 49 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1155 bytes Desc: not available URL: From buh at memonic.ru Wed Nov 17 00:13:24 2010 From: buh at memonic.ru (=?koi8-r?B?59LV2s/QxdLF18/ay8k=?=) Date: Wed, 17 Nov 2010 13:43:24 +0530 Subject: =?koi8-r?B?8MXSxdfP2svJIMnaINDF0tfZyCDS1cs=?= Message-ID: <7DC98A48D840499B9C6214141790CC86@office64ca456a> Предлагаем полный спектр услуг в сфере железнодорожных перевозок. Компания Являемся членом Ассоциации Российских Экспедиторов имеем: - прямой договор с ОАО "Российские железные дороги" на перевозки экспортных, импортных и транзитных грузов по Российским железным дорогам (РЖД), а также внутри российские перевозки грузов; - прямой договор с ОАО "Первая грузовая компания"; - прямой договор с ОАО "ТрансКонтейнер"; - прямой договор с ОАО "Рефсервис"; - прямой договор с Белорусской железной дорогой на перевозку грузов; - прямой договор с Латвийской железной дорогой на перевозку грузов. Также: - имеем своих агентов, осуществляющих функции по контролю и подтверждению перевозок транзитных грузов через входные пограничные железнодорожные станции; - оказываем содействие по подаче подвижного состава; - возможность давать сквозную ставку на перевозку грузов по РЖД и железным дорогам государств-участников СНГ и стран Балтии; - располагаем собственным парком контейнеровозов, пригодных для перевозки 20,40,40НQ контейнеров. Машины оснащены системой спутниковой связи, позволяющей отслеживать местоположение автомобиля в режиме реального времени. Создадим выгодные и надежные условия менеджерам, ответственным за транспортировку продукции по ж.д. Контакты: Вагонные отправления +7 901 526-29-33 Контейнерные отправления +7 963 712-10-65 Международные контейнерные перевозки +7 903 728-86-19 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3419 bytes Desc: not available URL: From maculver at crocker.com Wed Nov 17 01:22:56 2010 From: maculver at crocker.com (Tommie Corcoran) Date: Wed, 17 Nov 2010 14:52:56 +0530 Subject: =?koi8-r?B?8s/WxMXT1NfPINcg8M/Ezc/Ty8/X2MUuICjzwc7B1M/Sycog8M/Sxd7Y?= =?koi8-r?B?xSk=?= Message-ID: <000d01cb8639$04b80de0$6400a8c0@maculver> Тел.: 637-21-28, 695-28-04 НОВЫЙ ГОД И РОЖДЕСТВО САНАТОРИЙ "ПОРЕЧЬЕ" Расположение: в 45 км от Москвы в пригороде Звенигорода, в лесном массиве на берегу Москвы-реки. Размещение: Трехэтажные кирпичные корпуса ╧ 5, 7. Лечение: опорно-двигательного аппарата, сердечно-сосудистой и нервной систем, органов пищеварения и органов выделения. К услугам отдыхающих: сауна с мини-бассейном, бильярд, кинозал, настольный теннис, дискотеки, бар, ресторан, охраняемая стоянка. Экскурсии за дополнительную плату. Питание: 3-х разовое в столовой санатория. Категория номера Стоимость с 01.01.2011г. по 09.01.2011г в рублях на 1 человека. 01.01.(уж.) - 08.01.(об.)2011г. 02.01.(об.) - 09.01.(зв.)2011г. 02.01.(об.) - 08.01.(зв.)2011г. 1 сутки 7 дней 6 дней Корпус ╧ 5, 7 Одноместный 1 930 13 510 11 580 Двухместный 1 600 11 200 9 600 Двухкомнатный двухместный 2 030 14 210 12 180 Дополнительное место 990 6 930 5 940 Корпус ╧ 6 Двухместный 1 этаж - при размещении 1 человека 2 640 18 480 15 840 - при размещении 2 человек 1 930 13 510 11 580 Двухместный 2, 3-й этаж - при размещении 1 человека 3 100 21 700 18 600 - при размещении 2 человек 2 030 14 210 12 180 Двухкомнатный двухместный, 1, 2, 3-й этаж. - при размещении 1 человека 4 200 29 400 25 200 - при размещении 2 человек 2 500 17 500 15 000 Дополнительное место 1 100 7 700 6 600 В стоимость входит: проживание, питание, лечение, праздничная анимационная программа, охраняемая автостоянка. Скидки: детям до 12 лет на основное место √ 10%. Расчетный час: заезд 01.01.2011г в 16.30; выезд 08, 09 или 10.01.2011г. в 16.30. заезд 02.01.2011г. в 12.00; выезд 08, 09 или 10.01.2011г. в 12.00. К Вашим услугам предлагаем другие здравницы Подмосковья: Название здравницы "Новый год" "Рождество" Санаторий "Воробьево" от 4 900 от 1 600 Санаторий "Лесное Озеро" от 3 000 от 2 700 Санаторий "Карачарово" от 2 100 от 1 900 Пансионат "Березовая Роща" от 3 615 от 2 275 Усадьба "Ершово" от 3 000 от 1 700 Парк √ отель "Огниково" от 12 500 от 4 000 Дом отдыха "Бекасово" от 3 000 от 1 900 Тел.: 637-21-28, 695-28-04 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 16177 bytes Desc: not available URL: From eugen at leitl.org Wed Nov 17 08:50:52 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 17 Nov 2010 17:50:52 +0100 Subject: Steve Coll: Leaks (The New Yorker) Message-ID: <20101117165052.GI9434@leitl.org> ----- Forwarded message from John Young ----- From info at darulaman.mosque.org.sg Wed Nov 17 07:41:11 2010 From: info at darulaman.mosque.org.sg (Alisha Nance) Date: Wed, 17 Nov 2010 18:41:11 +0300 Subject: Wed, 17 Nov 2010 18:41:11 +0300 Message-ID: <437177951.05885804648853@darulaman.mosque.org.sg> WHAT A GREAT IDEA! Ring anytime 1-801-461-5023 We prowjqu9f97vide a co1x9d7srhncept that will alloivgt3yncw anyoweljne with sufficient wogdb4mmrk experience to8y1zys ow7bwzsbtain a fully verifiable University Degree. Bacheloogbxdzrs, Masters ow2r even a Doxbnnctorqhxnrate. Think ob84c08csf it, within fonwap7hur toks six weeks, yo028s8yu tod66gxoapwmu cokgq2s7xuld be a co626jllege graduate. Many peonkw9gh1zple share the same frustratiovxs55sn, they are dogx9ing the wo8png0drk oxbr45el3if the persof7db3n that has the degree and the persohukn that has the degree is getting all the mogbtdtzney. Dosuta6elelfn’t yoqwsu think that it is time yohw93zu were paid fair co2qhgcelicmpensatiojvousycn fo4ba8r the level okqzzxf woel7r33rk yozhu are already do0ping? This is yo52z3u87pur chance to9uh2f finally make the right mo9jqtve and receive yoma2wj3ur due benefits. If yo8nx16du are mor6re than qualified with yoxriur experience, but are lacking that prestigioc5us piece omh29xf paper knoypvh6elwn as a diplo7tw8ht12ma that is o1yjtften the passpopgcqzdzrt to0o4f2elt success. CALL US TOi3zDAY AND GIVE YOst5gUR WOs7f5RK EXPERIENCE THE CHANCE Tod387vw EARN YOh3wapbelpU THE HIGHER CO46MPENSATIOz3v9o3nbN YO0pw0U DESERVE! Ring anytime 1-801-461-5023 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5247 bytes Desc: not available URL: From edrigram at edri.org Wed Nov 17 10:58:42 2010 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 17 Nov 2010 20:58:42 +0200 Subject: EDRi-gram newsletter - Number 8.22, 17 November 2010 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 8.22, 17 November 2010 ============================================================ Contents ============================================================ 1. E-Commerce directive: ensure freedom of expression and due process of law 2. Panoptykon looks for the rationale behind the blanket data retention 3. Data retention regime in discussion all over Europe 4. European Commission takes next step towards data protection review 5. Kroes wants copyright as a building block, not a stumbling block 6. Dutch government cancels plans for national database on bank data 7. EP and Article 29 WP opinions on PNR transfers to third countries 8. Czech 2010 Big Brother Awards 9. Macedonia: New copyright law 10. ENDitorial: Net neutrality - wait and see the end of the open Internet 11. Recommended Reading 12. Agenda 13. About ============================================================ 1. E-Commerce directive: ensure freedom of expression and due process of law ============================================================ EDRi has responded to the public consultation of the European Commission on Electronic Commerce Directive (2000/31/EC) asking for the revision of the European regime of intermediaries liability, in view of better guaranteeing the respect for fundamental rights and the due process of law application on the Internet. This consultation, closed on 5 November 2010, aimed at assessing the implementation of the Directive in Member States, and at identifying limitations with the current text. EDRi focuses its answer on the liability regime of the technical intermediaries set by Articles 12 to 15 of the Directive. This scheme applies to intermediaries providing access to the Internet as well as content distribution and hosting. From the users' perspective, this regime has a major impact on the level of freedom of expression, freedom of information, right to privacy and personal data protection on the Internet, as well as on the due process of law. From the technical intermediaries' perspective, it must ensure the needed legal certainty to run their activities. EDRi's response stresses that the lack of clarity and precision of this regime does not currently allow adequate protection of human rights and the rule of law, nor does it ensure legal certainty for intermediaries. In support of this assertion, EDRi provides examples of concrete situations having occurred in different countries following the transposition of the Directive into national laws. In order for the EU to respect its current obligations with regard to its own Charter of Fundamental Rights and its upcoming obligations under the European Convention on Human Rights, EDRi underlines the need to revise the current intermediaries liability regime as follows: - Where an intermediary is not hosting the content (acting as a mere conduit, an access provider or a search engine), it should have no liability for this content, nor should it have any obligations with regards to the removal or filtering of this content; - Where an intermediary acts as a hosting provider, its liability with respect to the content hosted should be restricted to its lack of compliance with a court order to take down this content; - Intermediaries should have no obligation to monitor content; - Services and activities currently not addressed by the Directive (search engines, web2.0 services, hypertext links) should also benefit from the same limited liability regime. Details on all these issues are provided in the EDRi response. EDRI response to the consultation on the E-Commerce Directive (5.11.2010) http://www.edri.org/files/EDRi_ecommerceresponse_101105.pdf European Commission public consultation on the E-Commerce Directive http://ec.europa.eu/internal_market/consultations/2010/e-commerce_en.htm Article 19 response to the consultation on the E-Commerce Directive (5.11.2010) http://www.article19.org/pdfs/press/european-commission-freedom-of-expressionneeds-better-protection-in-digital.pdf (Contribution by Meryem Marzouki, EDRi-member IRIS - France) ============================================================ 2. Panoptykon looks for the rationale behind the blanket data retention =========================================================== On 9 and 10 November 2010 the representatives of the EDRi-member Panoptykon Foundation met with the representatives of the European Commission in order to discuss the evaluation of the Data Retention Directive (DRD) and the rationale behind the regime of blanket data retention . The meetings were held with representatives from Reding Cabinet first and secondly with members of the Directorate General for Home Affairs - DG Home. The following is a summary of the main issues that were discussed according to Panoptykon's point of view. It seems that the Commissioner Reding remains very critical about the current data protection regime. The following might be identified as the main problems with the Directive: (i) there is too much room for interpretation for Member States as to what "serious crime" means; (ii) retention periods are too long; (iii) the scope of data to be retained remains undefined (especially with regard to the Internet); (iv) there should be an obligatory judicial control mechanism provided in the DRD itself. On the next day with DG Home there were discussed three main problems: (i) the evaluation process and their plans for the near future; (ii) the implementation of DRD and its planned revision; (iii) the proportionality of the data retention regime in principle. Regarding the evaluation process, DG Home admitted that they were still working on the report and 3 March 2011 remains their internal deadline for publishing it. The delay in the process is due to the lack of response from the Member States - only 13 responded, sending rather low quality data (e.g. no statistical information on how the retained data was used and with what effect for law enforcement). Only the UK made an effort to give more insight into how the retained data was used in investigations. There might be nine key issues in the evaluation report: purpose, period, scope, modalities, authorities, operators, costs, crime and data security. Later on, DG Home will probably move on to make an impact assessment, which is officially treated as a second stage of the whole process. This will include public consultation and the invitation to voice concerns. The third stage will be the drafting of a proposal for DRD revision. The important thing is that there will be a proposal for review and not just re-casting of the DRD. As far as the implementation and considered revision of DRD is concerned, from the discussion with DG Home it appears that not a single Member State has implemented the directive as it was intended by the Commission. However, it seems that the evaluation report will not mention particular states. While discussing the shortening of the retention period, DG Home quoted a survey saying that while the retained data is requested within the first 3-6 months in investigating minor crimes or offences, in the case of most serious crimes (like terrorism) data is requested even 2 years after the crime occurred. So the argument is that if someone wants to fulfill the original goal of the DRD, a long retention period might be a necessity. It was our understanding that DG Home seems convinced that the amount of data stored byoperators under DRD remains the same as it was under the e-Privacy Directive (Art.15). Also that DRD remains an alternative legal basis for implementing the data retention regime to Art.15 of the e-Privacy Directive . That would mean that DRD was not seen as lege specialis (!). Finally, on the point of the adaptation of the data retention regime to "technological change", there were possibilities of increasing the scope of DRD to cover Information Society Service providers like Google or Facebook. This is because the data retention in the current shape might be seen as not efficient and easy to circumvent. A long discussion related with the proportionality issue. One opinion was that the reasoning applied by the European Court of Justice in the Marper case can be used to legitimise the blanket data retention regime. This might be understand as the Court criticised "indiscriminate and blanket" retention of data only on the grounds of the time factor (i.e. that DNA profiles were supposed to be stored forever) and not to the scope of the data collected (i.e. that UK wanted to collect and store data of everyone who has ever been suspected of committing an offence). Therefore blanket data retention might remain, in some views, legitimate and proportional as long as it is limited in time (e.g. the maximum period of 2 years). EDRi-gram: Continuing the battle against data retention (3.11.2010) http://www.edri.org/edrigram/number8.21/against-data-retention-directive (contribution by Katarzyna Szymielewicz - EDRi-member Panoptykon Foundation - Poland) ============================================================ 3. Data retention regime in discussion all over Europe ============================================================ While in Germany the Minister of Justice rejects the current data retention regime, Sweden is preparing to implement it. In the meantime, the European Commission is organizing a public debate on the review of the directive, but has delayed its final report on the revision. The Swedish Government has proposed a draft law to implement the data retention directive, asking for a six month period of keeping the trafficdata of electronic communications. Justice Minister Beatrice Ask considers that it is "important for us to create adequate protection for personal integrity" and this is why Sweden has opted for the minimum period allowed by the EU directive. The European Commission (EC) has already started the review of the data retention directive, but decided to postpone the report after it failed to obtain from member countries enough evidence to show why the directive is needed. "The data retention directive is a totally failed initiative," EDRi's Joe McNamee told Deutsche Welle. Now the EC has invited all relevant stakeholders to a conference in Brussels on 3 December 2010 in order to "finalise the evaluation of the Directive and to start the process of its review". In Germany, the head of the Federal Criminal Police considers that its country should re-enact the data retention law. But the German Minister of Justice Sabine Leutheusser-Schnarrenberger has supported the position of the civil society which is against such a measure. Moreover, she has informed the German Working Group on Data Retention (AK Vorrat) that she supports their position that if the EU Commission wants to uphold the data retention policy entirely, the EU must at least leave it to national parliaments and constitutional courts to decide whether they wish to implement this policy or not. "I am permanently in touch with the EU Commission and will take your arguments into account in our upcoming discussions", Leutheusser-Schnarrenberger assured the Working Group. The AK Vorrat press info also points to the recent ruling of the European Court of Justice that considered "limitations in relation to the protection of personal data must apply only in so far as is strictly necessary". It ruled as "invalid" EU requirements to publish every recipient of agricultural subsidies in the EU, deciding that this indiscriminate policy "exceeded the limits which compliance with the principle of proportionality imposes". "(I)t is possible to envisage measures which affect less adversely that fundamental right of natural persons and which still contribute effectively to the objectives of the European Union rules in question", the Court held. "The EU must now also abandon the disproportionate practise of indiscriminate retention of records on any communication, lest the EU Court of Justice rule the EU data retention directive invalid, too", comments Patrick Breyer of the Working Group on Data Retention. "The targeted preservation of suspect data is much less invasive and still contributes effectively to the prosecution of crime. The practise of most states world-wide demonstrates that EU rules stipulating the indiscriminate retention of records on any phone call, mobile phone location and Internet connection in the EU is not 'strictly necessary', but violates our right to respect for our private lives as guaranteed in the EU Charter of Fundamental Rights. It is not only the EU Court of Justice but also national constitutional courts and the European Court of Human Rights that have in the past ruled invalid indiscriminate intrusions into the personal lives of innocent citizens." Six EU member states have refused to transpose the controversial 2006 EU data retention directive; in two more EU Member States constitutional courts have annulled data retention laws, finding them incompatible with fundamental rights. The Canadian Government also distanced itself from the controversial EU data retention policy. It announced plans to "create a preservation order that would require a telecommunication service provider to safeguard and not delete its data related to a specific communication or a subscriber when police believe the data will assist in an investigation." "This is not data retention", the Department of Justice pointed out. Preservation orders would be "restricted to the data that would assist in a specific investigation." German Minister wants to end EU-wide communications data retention (11.11.2010) http://www.vorratsdatenspeicherung.de/content/view/405/79/lang,en/ Conference "Taking on Data retention" - 3 December 2010 http://www.dataretention2010.net/init.xhtml?event=31 Sweden falls in line with controversial EU data retention rules (12.11.2010) http://www.dw-world.de/dw/article/0,,6223369,00.html European Court of Justice cases C-92/09 and C-93/09 (9.11.2010) http://curia.europa.eu/jurisp/cgi-bin/gettext.pl?where=&lang=en&num=79898890C19090092&doc=T&ouvert=T&seance=ARRET Canada Backgrounder : Investigative Powers for the 21st Century Act (11.2010) http://www.justice.gc.ca/eng/news-nouv/nr-cp/2010/doc_32567.html ============================================================ 4. European Commission takes next step towards data protection review ============================================================ The European Commission has published a Communication on "a comprehensive approach to personal data protection in the European Union", as the final stage in the consultation process leading to a review of the 1995 Data Protection Directive. Based on its work on this dossier to date, the Commission has identified the need to address several key priorities, the first of these being to adapt to the impact of new technologies. Three further priorities (enhancing the single market, providing stronger institutional arrangements and improving coherence) address a core problem that unites pretty much everybody concerned with the current framework - the lack of consistency and predictability in the implementation of the Directive. This consistency will be tested by the broader applicability of the Directive as a result of the Lisbon Treaty. A further priority will be to strengthen international measures, to ensure protection of personal data on a global level, particularly as a result of developments such as outsourcing. These priorities are honed down it the Commission's Communication into several specific objectives. The first objective is the strengthening of individuals' rights. The Commission raises the issue of the definition of personally identifiable data in this context and says that additional measures are needed. The aim is to ensure a coherent application of data protection rules, taking into account the impact of new technologies on individuals' rights and freedoms and the objective of ensuring the free circulation of personal data within the internal market. The second objective is more difficult still - to increase transparency for data subjects. The Commission proposes three different strands of action on this point. It suggests a general principle of transparent processing, bolstered by specific obligations on what information to provide and how to provide it and with standard EU forms for data controllers. Finally, as it was almost unavoidable after the introduction of a sector-specific breach notification obligation in the e-privacy Directive, the Commission suggests a general breach notification obligation. The third objective is a clearer power of citizens to have control over their own data, where theoretical rights granted by the existing Directive are currently very difficult to enforce in practice. The aim of the Commission is to improve the procedures for exercising the rights of access, rectification, erasure and blocking of data - including the "right to be forgotten" - and "data portability" ("as far as technically feasible" - which will obviously need to be carefully worded to avoid businesses devising systems to make this technically unfeasible). The fourth objective is to increase the level of awareness of data protection rights in Europe, including funding for this via the EU budget and through an obligation on Member States to raise awareness. Fifth, the Commission sets an objective of ensuring free and informed consent but, unsurprisingly, as this is a particularly difficult issue, it makes few proposals at the moment, beyond suggesting that self-regulatory initiatives designed to develop solutions consistent with EU law may be a way of making progress. The sixth objective is updating the protection for sensitive data, in particular with regard to the extension of the definition of sensitive data and harmonizing the conditions for processing such data. Finally, and importantly, the Commission wishes to prioritise the issue of making remedies and sanctions more effective. It suggests that this could be done via group actions and strengthening existing provisions on sanctions. With regard to the single market, the Commission recognizes the failures of the existing framework and undertakes to "examine the means to achieve further harmonisation of data protection rules at EU level." The Commission aims to achieve this in part through a simplification of the current notification system. Following from this, it will seek to solve the issue of applicable law, which is causing problems for companies established in several EU Member States. The Commission undertakes to examine how to revise and clarify the existing provisions on applicable law. The Commission is keen to ensure that simplification of procedures will not lead to a weakening of rights and therefore aims to create specific obligations including data protection impact assessments and the use of privacy enhancing technologies. This approach would be bolstered by self-regulatory initiatives such as codes of conduct. The Commission ambitiously aims to address the problems of data protection in the field of police and judicial cooperation. While there is a Framework Decision on this subject, it does not cover domestic processing of data and also is too weak with regard to purpose limitation. To overcome these and other problems, the Commission suggests considering the extension of the application of the general data protection rules to the areas of police and judicial cooperation in criminal matters and considers the possibility of specific and harmonised provisions in the new general Data Protection Framework, for example on data protection regarding the processing of genetic data for criminal law purposes or distinguishing the various categories of data subjects (witnesses, suspects etc.) in the area of police cooperation and judicial cooperation in criminal matters. In addition, it is contemplating a specific consultation on the revision of current supervision systems in this area and the alignment of existing sector-specific rules to the general data protection framework. With regard to the many and varied problems related to international data transfer, the Commission says that it intends to examine how to improve and streamline the current procedures for international data transfers, to clarify the Commission's adequacy procedure and better specify the criteria and requirements for assessing the level of data protection in a third country or an international organisation. It will also look at defining core EU data protection elements, which could be used for all types of international agreements. Consultation - A comprehensive approach on personal data protection in the European Union (4.11.2010) http://ec.europa.eu/justice/news/consulting_public/0006/com_2010_609_en.pdf Council Framework Decision on the protection of personal data processed in the framework of police and judicial cooperation in criminal matters (27.11.2008) http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32008F0977:EN:NOT (Contribution by Joe McNamee - EDRi) ============================================================ 5. Kroes wants copyright as a building block, not a stumbling block ============================================================ During the Avignon Forum for the international meetings of culture, economy and media that took place on 5 November 2010, Neelie Kroes, European Commission Vice-President for the Digital Agenda, expressed her very strong conviction that copyright regulations had to change. The Commissioner believes the existing copyright rules are not adapted to the development brought by the Internet and that any big technological revolution brings forth the necessity for adaptation. In her opinion, the intermediaries between the artists and the public are those that must understand the change and adapt. The "content industry has failed to capitalise on the changing market." The present copyright laws have become a burden. "Despite the fact that thanks to the Internet the world has gotten smaller than ever before, making it extremely easy for artists to get their creations to as many people as possible, copyright law and the content industry stand in their way." Kroes drew the attention that culture intermediaries might not be spared by the "Internet revolution, which is unveiling the unsustainable position of certain content gatekeepers and intermediaries. No historically entrenched position guarantees the survival of any cultural intermediary. Like it or not, content gatekeepers risk being sidelined if they do not adapt to the needs of both creators and consumers of cultural goods." In other words, change or face the consequences! "I believe that those who will prosper in the digital age are those who understand that convergence is one of the keys," because "convergence means creative freedom and more inspirational content ready to meet the expectations of a public that evolves with art and content." The Commissioner believes the development of the Internet will not kill other type of media just as "cinema did not kill theatre, nor did television kill radio." She used as argument the statistics that show that actually the Internet increases the interest in art and creation. "...people who spend more time on the Internet tend to read more, and to go to cinema and to concerts more often than the population as a whole. Studies show that nowadays, people increasingly watch TV and browse the Internet at the same time - simply to get more information about something that intrigued them." Kroes expressed her goal of promoting cultural diversity and content adapted to the digital age and her hope that "Europe is and must remain a global cultural force." She reminded the fact that copyright was not an end in itself and that although it had been useful for 200 years to artists and the creative industries, it was nowadays outdated. "We must ensure that copyright serves as a building block, not a stumbling block." And she gave the example of Europeana project, the online portal of libraries, museums and archives in Europe which is endangered by copyright. "...when it comes to 20th century materials, even to digitise and publish orphan works and out-of-distribution works, we have a large problem indeed. Europeana could be condemned to be a niche player rather than a world leader if it cannot be granted licenses and share the full catalogue of written and audio-visual material held in our cultural institutions." The Commissioner criticised the fragmented copyright system which is not adapted to the reality of today and which has reached a point where it gives a more important role to intermediaries than to artists. "It irritates the public who often cannot access what artists want to offer and leaves a vacuum which is served by illegal content, depriving the artists of their well deserved remuneration. And copyright enforcement is often entangled in sensitive questions about privacy, data protection or even net neutrality." As Kroes thinks an immediate debate on the topic is necessary, she announced that the Commission would soon make some legislative proposals after examining the issue of divergent national private copy levies and multi-territorial and pan-European licensing. The Commissioner made an appeal to go back to sense rather than having "a dysfunctional system based on a series of cultural Berlin walls," and to create a "system where there is scope to create new opportunities for artists and creators, and new business models that better fit the digital age." For the time being, we face situations like that of a young man accused, in a P2P case in US, of illegally downloading and distributing 24 tunes on the net, who was found in breach of copyright and fined with 1,1 million Euro (about 46 000 Euro/song). A similar case in Germany brought about a 15 Euro fine/song. Although the cases are not identical in their details, they illustrate the very different approaches to copyright infringement in different jurisdictions. Press release - Speech of Neelie Kroes European Commission Vice-President for the Digital Agenda A digital world of opportunities at Avignon Forum (5.11.2010) http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/10/619&format=HTML&aged=0&language=EN&guiLanguage=en Kroes: EU copyright rules need major overhaul (5.11.2010) http://www.advanced-television.tv/index.php/2010/11/05/kroes-eu-copyright-rules-need-major-overhaul/ $42 German P2P fine stark contrast to seven-figure US judgments (5.11.2010) http://arstechnica.com/tech-policy/news/2010/11/42-german-p2p-fine-stark-contrast-to-seven-figure-us-judgments.ars EDRI-gram: EDRi and partners launch Copyright for Creativity declaration (5.05.2010) http://www.edri.org/edrigram/number8.9/copyright-for-creativity-edri ============================================================ 6. Dutch government cancels plans for national database on bank data ============================================================ After facing enormous pressure from the media, civil society and several MPs, The Dutch Ministry of Security and Justice announced that it will not develop a national database or search engine containing bank data of all Dutch citizens. The Dutch digital rights organization Bits of Freedom discovered plans to this end in one of 27 internal documents, that were made public after a Freedom of Information Act requests by independent researcher Rejo Zenger. As the response of the Government followed only one day after these plans hit the news, the campaign illustrates the crucial role civil society can and must play to protect digital civil rights. The ambitions are a part of the much larger 'Project verkeerstoren' (Traffic Tower), that seeks to centralize the retention of and access to several categories of personal data, in order to ease the procedure for data requests by law enforcement agencies (LAEs). As telecommunications subscriber data are already stored in the national database CIOT (Centraal Informatiepunt Onderzoek Telecommunicatie) - accessed approx. 3 million times a year by Dutch LAEs - the Government had been investigating in 'Project dataretentie' the extension the CIOT-model to historical telecommunications subscriber data, traffic- and location data following the enactment of the Data retention directive. In one document however, the Government discusses the Traffic Tower project and writes that bank data could follow, after the successful implementation of the Data retention project. After the confirmation of these ambitions by the Ministry to several journalists, the plans received considerable media attention and critique from MPs. Two days later, the Ministry cancelled the national database on bank data. The implications of the CIOT-database function creep were put in context by a second finding: at least 78.000 requests of traffic- and location data by Dutch LAEs in the last year. Until now, the Ministry had kept secret this information for the general public. Consequently, the news that Dutch LAEs are a European frontrunner when it comes to telecommunications data - subscriber-, traffic and locations data - requests was mentioned along the plans for the centralization of bank data. These revelations follow up a Bits of Freedom analysis of last summer, that concluded that the LAEs have been neglecting the data protection rules surrounding the database for at least three years in a row, even though internal audit reports had strongly called upon the LAEs to respect the privacy and data protection rights since the errors where 'undermining the legitimacy of the Law Enforcement effort'. Bits of Freedoms disclosure that authorized police officers had been giving their PIN-codes away to their colleagues and that the entire request procedure had not been subject to either independent oversight or prior check of legitimate access, were two of the more striking examples that reached the headlines in mainstream media back then. If that weren't enough, ISP and telecoms incumbent KPN stated in a letter - amongst the 27 released documents - that the operator rather keeps the data for itself, than handing it over to the CIOT-database. Hence, the cancellation of the database on bank data is of important symbolic value. It casts light on the Traffic Tower project, the impact of mandatory centralized personal data storage and shows that civil society can stop such ambitions as it has the facts on its side. It also shows that civil society is needed in the future: the Ministry is still working out the centralization of telecommunications traffic- and location data of all Dutch citizens, to the effect that every single communication and movement of all Dutch citizens can be requested with one mouse click. Bits of Freedom will continue to put any ambitions to this end under close scrutiny. Rejo Zenger website, 27 released documents on 'Project dataretentie' (only in Dutch) https://rejo.zenger.nl/inzicht/project-dataretentie-ministerie-van-justitie NOS Journaal, 'Justitie wil bankgegevens sneller' (only in Dutch, 9.11.2010) http://nos.nl/video/197409-justitie-wil-bankgegevens-sneller.html Bits of Freedom, 'Nederland Europees koploper opvragen telecomgegevens' (only in Dutch, 10.11.2010) https://www.bof.nl/2010/11/11/persbericht-nederland-europees-koploper-opvragingen-telecomgegevens/ Bits of Freedom, 'Meteen succes: landelijke zoekmachine bankgegevens van de baan (only in Dutch, 11.11.2010) https://www.bof.nl/2010/11/12/meteen-succes-landelijke-zoekmachine-bankgegevens-van-de-baan/ Bits of Freedom, 'Opsporingsdiensten negeren privacyregels stelselmatig' (only in Dutch, 26.07.2010) https://www.bof.nl/2010/07/26/persbericht-opsporingsdiensten-negeren-privacyregels-telecomdatabank-stelselmatig/ (Contribution by Axel Arnbak - EDRi-member Bits of Freedom) ============================================================ 7. EP and Article 29 WP opinions on PNR transfers to third countries ============================================================ As negotiations continue between EU and USA on the issue of air passenger data (PNR) transfer, so is the debate on the issue between the European Commission and the other EU bodies. The European Parliament (EP) issued on 11 November 2010 a resolution on the matter. While reaffirming its determination to fight terrorism and organised crime, and welcoming the Commission's recent communication on the global approach to transfers of PNR data to third countries, the EP re-emphasizes the firm belief that that civil liberties and fundamental rights must be protected, "including the rights to privacy, informational self-determination and data protection". As proportionality remains a key issue for the EP, the resolution asks from the Commission to give "factual evidence that the collection, storage, and processing of PNR data is necessary for each of the stated purposes". As it has a veto right, the EP requires to be fully informed on any PNR developments related to "bilateral agreements and memorandums of understanding between Member States and the USA concerning the exchange of law-enforcement data and participation in the US Visa Waiver Programme, as well as the One-Stop Security programme". On this occasion, it reminds us that "bilateral memorandums of understanding between Member States and the USA, alongside negotiations between the EU and the USA, are contrary to the principle of loyal cooperation between the EU institutions". In October, European Data Protection Supervisor Peter Hustinx also expressed his concerns regarding the necessity and legitimacy of PNR collection schemes and called for better safeguards in international PNR agreements. "The conditions for collection and processing of PNR data should be considerably restricted. I am particularly concerned about the use of PNR schemes for risk assessment or profiling," he said. He also criticised the Commission for doing its work in reverse order, dealing with international PNR agreements before having any kind of system within the EU. An intra-EU equivalent scheme is not scheduled until 2012. "We have PNR (agreements) with the US and the EU. It is a lack of logic that we are not sharing (PNR) in the EU," said Home Affairs Commissioner Cecilia Malmstrvm who added that all the state members had required such an agreement. On 15 November, Article 29 Data Protection Working Party (WP) issued an opinion stating that the European data protection authorities belonging to the WP remained critical on the exchange of PNR data with countries outside the EU. In its opinion, issued as a reaction to the European Commission communication on the global approach to PNR transfers of 21 September 2010, Article 29 WP questions "the necessity of large-scale profiling for law enforcement purposes on the basis of passengers' data." Article 29 WP believes there still is no objective proof or statistics showing that PNR data are valuable in combating transnational crime and terrorism. The data protection authorities consider that although the Commission has made some movements in the right direction there is still room for improvement such as the standards referring to onward transfer of collected data where "the principle of purpose limitation should apply, which means that the collected data may not be used by other government authorities in the receiving country for purposes not related to the combating of transnational serious crime and terrorism." European Parliament resolution of 11 November 2010 on the global approach to transfers of passenger name record (PNR) data to third countries, and on the recommendations from the Commission to the Council to authorise the opening of negotiations between the European Union and Australia, Canada and the United States (11.11.2010) http://www.europarl.europa.eu/sides/getDoc.do?type=TA&reference=P7-TA-2010-0397&format=XML&language=EN Article 29 Data Protection Working Party - PRESS RELEASE - 'Data Protection Authorities Critical on sharing passengers' data' (15.11.2010) http://ec.europa.eu/justice/policies/privacy/news/docs/pr_15_11_10_en.pdf EU to revive debate over air passenger data (12.11.2010) http://www.euractiv.com/en/justice/eu-revive-debate-over-air-passenger-data-news-499618 EC Communication - On the global approach to transfers of Passenger Name Record (PNR) data to third countries (21.09.2010) http://ec.europa.eu/commission_2010-2014/malmstrom/archive/COMM_NATIVE_COM_2010_0492_F_EN_COMMUNICATION.pdf Opinion 7/2010 on European Commission's Communication on the global approach to transfers of Passenger Name Record (PNR) data to third countries (12.11.2010) http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp178_en.pdf ============================================================ 8. Czech 2010 Big Brother Awards ============================================================ The sixth edition of the Czech Big Brother Awards has recently been organised by EDRi member Iuridicum Remedium in Prague BIO eye where an expert jury selected the winners for 2010 from more than 140 nominations. The Czech police received the Big Brother award in the long-term spying category, for having violated people's privacy by "their serious and long-term interference in people's privacy, mainly for archiving photographs of cars and its drivers from camera-monitoring systems," as the organiser explained. The police was also criticised for its overuse of applications for access to sensitive data from mobile phones. For the second year in a row, Facebook received the mock award as the largest corporate spy, for pushing users to enable anybody to have access to private data by its deceptive strategy and technical parameters. Facebook gets the maximum information from personal profiles, increasing their commercial potential. The Interior Ministry was given the award in the category of the biggest official spying, for having hindered the preparation of the legislation for the improvement of personal data protection from camera monitoring systems, wiretapping and DNA databases. Even the European Union received an award, at spying among nations category, for the negotiations in the Anti-Counterfeiting Trade Agreement (ACTA) and for funding the INDECT project aimed at developing computer programmes to detect "abnormal behaviour". The project will research the use of CCTV systems in combination with audio recordings in urban areas. For the surveillance of citizens on the Internet, the system focuses on monitoring forums, blogs and social networks. The end users of the system will be a European police force. The winner in the category of "The Big Brother's statement" was "Facebook father" Mark Zuckerberg for his statement that the right to privacy is simply a social norm developing over time and that people are now satisfied with eliminating privacy. In his opinion, "the age of privacy is over." ACTA got the award at the legal standard category for disregarding human rights in favour of the industry. The positive award for privacy protection was obtained by the citizens in Vir nad Svratkou, South Moravia, for having stood up against the installation of a camera monitoring system in their village. Police receive mock award for violating privacy (11.11.2010) http://www.praguemonitor.com/2010/11/11/police-receive-mock-award-violating-privacy Big Brother Awards, Award for long-term spying gained Police (only in Czech, 10.11.2010) http://www.slidilove.cz/content/cenu-big-brother-awards-za-dlouhodobe-slideni-ziskala-policie-cr ============================================================ 9. Macedonia: New copyright law ============================================================ Prison sentences of up to five years for copyright infringement are projected in the new Law on Copyright and Related Rights adopted in September 2010 in Macedonia. With this law, which in addition to authors' and artists' rights also regulates the rights of film and stage producers, radio and television organizations, as well as the rights of publishers and database developers, copyright infringement is actually becoming a crime. With these changes to the law that was being prepared for four years, Macedonia now formally has the same copyright protection standards as the EU member states. However, the general impression is that the formal progress is far from significant, as copies of film and music works are being sold on the side walks of the busiest intersections in the capital, and some of the film festivals are still screening films using DVDs. Representatives of agencies working in the IP field and fighting infringers of the Law on Copyright and Related Rights say that major violations of this Law are taking place in Macedonia, and no sphere is an exception; from the textile, pharmaceutical, to the tobacco and automotive industry. We're seeing counterfeited material, copies of registered trademarks in every area - says Mite Kostov, chairman of the Coordination Body for Intellectual Property. He added that a great number of DVD stores across the country were closed as part of a copyright protection campaign. In Strumica, for example, out of 22 DVD stores, only a few remained in business, and only seven out of thirty in Tetovo, i.e. the ones that legally exist - Kostov said. The common impression of experts in this sphere is that the biggest problem regarding the sanctioning of offenders is in the courts. This was also noted in the latest EU 2010 Progress Report on Macedonia, stating that only 23 out of 98 court procedures on copyright have been completed - Pepeljugovski said. New Macedonian Copyright law (only in Macedonian) http://sobranie.mk/ext/materialdetails.aspx?Id=34e7be57-9c83-4398-b75d-426e569c191d Macedonia: Up to five years in prison for piracy (only in Macedonian, 12.11.2010) http://www.metamorphosis.org.mk/makedonija/za-piratite-kazna-i-do-pet-godini-zatvor.html (Contribution by EDRi-member Metamorphosis - Macedonia) ============================================================ 10. ENDitorial: Net neutrality - wait and see the end of the open Internet ============================================================ At the joint European Parliament and European Commission net neutrality summit in Brussels on 11 November there was a clear political message - that interference with Internet traffic is permissible as long as companies tell their consumers that it is happening. The Commission will "wait and see" if such interferences cause problems for the market and will consider taking action if this is the case. In a whole day of discussions, the fundamental rights aspects of the interference by private companies with citizens' communications were only questioned by Jeremie Zimmermann from La Quadrature du Net and Jan Albrecht MEP (Greens/EFA, Germany). Anyone who has been active in telecoms regulation in Brussels for the past decade would have been forgiven for suffering from a severe bout of "dij` vu". The large operators were out in force explaining that the market is very competitive and they could not afford any regulatory interventions. No regulatory intervention is needed, they explained, because the market will take care of all problems. Catherine Trautmann MEP (S+D, France) demanded a Commission Recommendation which, while not binding, would at least create a methodological framework adaptable for binding legislation after it fails. Her arguments were insightful, forceful and apparently ignored by the Commission. The European Commission has heard the large operators' arguments before and was convinced to delay urgent regulatory interventions. In 1999/2000, there was an urgent need to open the "last mile" of telecoms infrastructure to competition, in order to boost Internet access in Europe. The Commission decided against the legislation and opted to "wait and see". When nothing happened, they proposed a Recommendation on opening the market. When this also failed, they proposed a Regulation which was implemented well in some countries and badly in others, partly due to the rushed nature of the legislative intervention. "Wait and see" had failed European citizens. The European Commission heard those arguments again when it started asking questions about the huge cost of mobile phone roaming. After initially waiting to see the scale of the issue, it started investigating the problem at the end of 2004 and a Regulation entered into force in June 2007. It took a further three years to deal with data roaming. The cost of this "wait and see" delay was the loss of millions of Euro for European businesses and European citizens. "Wait and see" had failed European citizens again. And now, when developing policy to address interferences with private communications, when developing a policy which deals with a core element of modern democracy, the Commission has decided to "wait and see". This time, however, the Commission will not be able to intervene once all other options have failed. Once Internet intermediaries start interfering more overtly with communications, they will find it more and more difficult to argue that they should be entitled to do this for their own benefit, but not for other vested interests. Already, access providers are being asked to block peer to peer communications (see the Scarlet/Sabam case) and to block certain websites for the vested interests of the copyright industry, to block gambling websites for the benefit of vested interests of national gambling monopolies (in France, Italy and elsewhere) and to block websites accused of containing child abuse material, to hide the inadequacy of national administrations that are unwilling to make the effort to have the crime scenes taken offline and to prosecute the criminals behind them. When the Commission finally decided to act in relation to unbundling and roaming, it just had to face the lobbying power of the telecoms companies. With the non-neutral Internet, however, things will be very different. It will face the opposition not just of the large telecom providers, but also every company and organisation with a vested interest in restricting access to communication. It will also face the opposition of organisations arguing for policing of the net by access providers. The OECD is currently discussing how Internet intermediaries can police the Internet to achieve public policy objectives, the Council of Europe has asked for "reflection" on the liability of intermediaries in relation to online intellectual property infringements, the ACTA Agreement (which the EU is currently finalising) calls for the cooperation of Internet intermediaries in combating online intellectual property infringements, the UN has called for their cooperation to protect children online, the OSCE is discussing how they can cooperate to address hate speech. The list is endless. Once the Commission has waited and seen that regulatory intervention is needed, it will be too late. Just wait and see. The "Sabam vs Scarlet"-case will be continued before the European Court of Justice (7.02.2010) http://www.timelex.eu/en/blog/p/detail/the-sabam-vs-scarlet-case-will-be-continued-before-the-european-court-of-justice OSCE - Role of the Internet industry in addressing hate on the Internet (10.05.2010) http://www.osce.org/documents/odihr/2010/05/44808_en.pdf OECD - The Economic and Social Role of Internet Intermediaries (16.06.2010) http://www.oecd.org/dataoecd/8/59/45997042.pdf UN (Tunis Agenda) (18.11.2005) http://www.itu.int/wsis/docs2/tunis/off/6rev1.html ACTA (15.11.2010) http://trade.ec.europa.eu/doclib/docs/2010/november/tradoc_147002.pdf (Contribution by Joe McNamee - EDRi) ============================================================ 11. Recommended Reading ============================================================ Action on Rights for Children (ARCH) Policy on Internet Blocking - Letter to MEPs (15.11.2010) http://www.archrights.org.uk/index.php?option=com_phocadownload&view=category&download=22&id=10&Itemid=23 LOPPSI2: Childhood protection - the Trojan horse of generalized Internet filtering? (only in French, 15.11.2010) http://www.ange-bleu.com/article.php?type=actualites&origine=juriactu&id=112 Access to Knowledge for Consumers - Reports of Campaigns and Research 2008-2010 http://www.soros.org/initiatives/information/focus/access/articles_publications/publications/ci-survey-20100920/ci-survey-20100910.pdf ============================================================ 12. Agenda ============================================================ 18-19 November 2010, London, UK Open Government Data Camp http://opengovernmentdata.org/camp2010/ 3 December 2010, Brussels, Belgium Taking on the data retention directive http://www.dataretention2010.net/init.xhtml?event=31 27-30 December 2010, Berlin, Germany 27th Chaos Communication Congress (27C3) http://events.ccc.de/congress/2010 25-28 January 2011, Brussels, Belgium The annual Conference Computers, Privacy & Data Protection CPDP 2011 European Data Protection: In Good Health? http://www.cpdpconferences.org/ 1 April 2011, Bielefeld, Germany Big Brother Awards Germany Nominations open until 31 Dec 2010 http://www.bigbrotherawards.de/index_html-en ============================================================ 13. About ============================================================ EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 27 members based or with offices in 17 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edri/2.html - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Nov 17 12:31:12 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 17 Nov 2010 21:31:12 +0100 Subject: EDRi-gram newsletter - Number 8.22, 17 November 2010 Message-ID: <20101117203112.GT9434@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From selena_lashon_wt at keci.com Thu Nov 18 00:14:22 2010 From: selena_lashon_wt at keci.com (Selena Lashon) Date: Thu, 18 Nov 2010 01:14:22 -0700 Subject: Codeine (Methylmorphine) is a narcotic pain reliever, 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 j1ui In-Reply-To: <836801cb819f$87d3033e$d8d10509@kygq482> Message-ID: <4CE4E05E.03A81E0F@keci.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://medpavlov60d.ru/pill/Codeine -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 663 bytes Desc: not available URL: From 0-0-auberge.vigneron at ataraxie.fr Thu Nov 18 00:27:27 2010 From: 0-0-auberge.vigneron at ataraxie.fr (ctufts@tufts-assoc.com) Date: Thu, 18 Nov 2010 05:27:27 -0300 Subject: 50% Off on all Luxury Items! Message-ID: <3990359089.09VMKWUF769404@rnjtwdci.imhciuuti.org> Stop paying retail, Click here http://brickcheap.com -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 259 bytes Desc: not available URL: From infonn at rcs.ru Thu Nov 18 01:52:55 2010 From: infonn at rcs.ru (Gerald Simmons) Date: Thu, 18 Nov 2010 11:52:55 +0200 Subject: =?koi8-r?B?58HSwc7UydLP18HOztnFINvFzsfFztPLycUg18na2SDP1CAzIM3F0yDE?= =?koi8-r?B?zyAzLcggzMXUISDzzM/WztnFINPM1d7BySE=?= Message-ID: <000d01cb8706$5fa714d0$6400a8c0@infonn> ЛЕГАЛЬНЫЙ ВИЗОВЫЙ ОПЕРАТОР   Телефоны: +7 (499)3431902; +7 (495) 649 9170 (без выходных) СПЕЦПРЕДЛОЖЕНИЕ.═ Испания. Шенгенская мульти-виза - 6 месяцев за 350 у.е. Шенгенские ДЕЛОВЫЕ мульти-визы за 4 РАБОЧИХ ДНЯ АКЦИЯ!!!!! ДО КОНЦА НЕДЕЛИ СКИДКА НА ДЕЛОВЫЕ МУЛЬТИВИЗЫ 5%!!!!СПЕШИТЕ! Среднесрочные - 1 год - 900 у.е, 6 месяцев - 700 у.е, 3 месяца - 500 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е. (сбор включен) БЕЗ СОБЕСЕДОВАНИЯ, БЕЗ ПРИСУТСТВИЯ!!!! Работаем со сложными случаями - мультивизы для уроженцев и жителей Северного Кавказа и паспортов с отказами ВИЗЫ в США, Великобританию, Кипр, Китай и др. ОПЛАТА только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. Телефоны: +7 (499)3431902; +7 (495) 649 9170 (без выходных) ═ ПРИГЛАШЕНИЯ для иностранцев, страхование, ЗАГРАНПАСПОРТА, ПЕРЕВОДЫ документов. Телефоны: +7 (499)3431902; +7 (495) 649 9170 (без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3274 bytes Desc: not available URL: From glbuh at power.ioffe.rssi.ru Thu Nov 18 03:46:02 2010 From: glbuh at power.ioffe.rssi.ru (Shawn Rodrigues) Date: Thu, 18 Nov 2010 12:46:02 +0100 Subject: =?koi8-r?B?+8XOx8XO08vJxSDN1czY1Mkt18na2SEg58HSwc7UydEhIO/QzMHUwSDQ?= =?koi8-r?B?z9PMxSDX2cjPxMEg18na2SEg?= Message-ID: <000d01cb8716$2cc96ee0$6400a8c0@glbuh> КРУПНЕЙШИЙ ЛЕГАЛЬНЫЙ ВИЗОВЫЙ ОПЕРАТОР. +7 (495) 229 11 97 (круглосуточно / без выходных) Телефон нашего колл-центра - +7 (495) 229 11 97 СПЕЦПРЕДЛОЖЕНИЕ. Испания. Шенгенская мульти-виза - 6 месяцев за 350 у.е Шенгенские ДЕЛОВЫЕ мульти-визы (Италия, Швейцария, Франция, Германия) Мульти-виза за 3 РАБОЧИХ ДНЯ Среднесрочные - 1 год - 950 у.е, 6 месяцев - 750 у.е, 3 месяца - 550 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е, 4 года - 3 200 у.е. (сбор включен) Шенгенские мультивизы для уроженцев и жителей Северного Кавказа и паспортов с отказами (граждане России). Мы также поможем с визой в: США, Великобритания, Кипр, Китай. Найдете ДЕШЕВЛЕ - мы дадим СКИДКУ !!! ОПЛАТА только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. +7 (495) 229 11 97 (круглосуточно / без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2390 bytes Desc: not available URL: From alexandr at uks.kiev.ua Wed Nov 17 23:20:17 2010 From: alexandr at uks.kiev.ua (Kory Hopper) Date: Thu, 18 Nov 2010 12:50:17 +0530 Subject: =?koi8-r?B?IPrBws/SIMfP1M/X2cou?= Message-ID: <0121386189754D65910FD297A6AC177D@kunalhome> ЗАБОРЫ СВАРНЫЕ Готовые секции ПРОДАЮТСЯ. Из профильной трубы 20х20 мм. Секции с пиками - длина 3,0 м высота 2,0 м. – 300 штук. Цена от 3000 руб. за штуку. Столбы от 300 руб за штуку. Скидки на объемы. На заказ любые. Производство на Волоколамском шоссе. 8 (903) 549 – 03 – 49 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1155 bytes Desc: not available URL: From c_josefa_mh at mygothicblog.com Thu Nov 18 12:10:36 2010 From: c_josefa_mh at mygothicblog.com (Cathryn Josefa) Date: Thu, 18 Nov 2010 13:10:36 -0700 Subject: Discount Brand Watson - 10/325 mg: 30 - $199 / 120 - $588, NoPrescription Required, 4hh In-Reply-To: <77af01cb862c$f405db7a$1c08cff0@9dg8wkc> Message-ID: <4CE5883C.D9D83FE4@mygothicblog.com> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://cxjish.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 787 bytes Desc: not available URL: From terica_dolly_el at hughburchill.net.jfet.org Thu Nov 18 15:36:12 2010 From: terica_dolly_el at hughburchill.net.jfet.org (Terica Dolly) Date: Thu, 18 Nov 2010 16:36:12 -0700 Subject: Free Shipping Options - Viagra50/100mg - $1.85 - Free Pills With Every Order = Best Deal Ever! 8ja0 Message-ID: <4CE5B86C.7819CCE9@hughburchill.net> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://xtotp.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 536 bytes Desc: not available URL: From dethel_am at bracco.com Thu Nov 18 15:50:01 2010 From: dethel_am at bracco.com (Daisy Ethel) Date: Thu, 18 Nov 2010 16:50:01 -0700 Subject: "If You Are In Pain You Will Qualify", Hydrocodone $4.40, Xanax$1.90, Valium$2.15, Ativan$2.15 g5u5 Message-ID: <4CE5BBA9.61D09C80@bracco.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://order-genuine.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 702 bytes Desc: not available URL: From eugen at leitl.org Fri Nov 19 02:10:50 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 19 Nov 2010 11:10:50 +0100 Subject: Google charges feds $25 a head for user surveillance Message-ID: <20101119101050.GK9434@leitl.org> http://www.theregister.co.uk/2010/11/18/microsoft_does_not_charge_for_government_surveillance/ Google charges feds $25 a head for user surveillance Alert Print Post comment Retweet Facebook Microsoft charges zilch By Cade Metz in San Francisco b" Get more from this author Posted in ID, 18th November 2010 23:22 GMT Microsoft does not charge for government surveillance of its users, whereas Google charges $25 per user, according to a US Drug Enforcement Admission document turned up by security and privacy guru Christopher Soghoian. With a Freedom of Information Act (FOIA) request, Soghoian has exposed four years of DEA spending on wiretaps and pen registers. A wiretap grabs actual telephone or Internet conversations, whereas a pen register merely grabs numbers and addresses that show who's doing the communicating. In 2010, the document shows, the DEA paid ISPs, telcos, and other communication providers $6.7 million for pen registers and $6.5 million for wiretaps. Pen register payments more than tripled over the past three years and nearly doubled over the past two. Wiretap payments stayed roughly the same. The documents confirm that Microsoft does not charge for surveillance. "There are no current costs for information requested with subpoenas, search warrants, pen registers, or Title II collection [wiretaps] for Microsoft Corporation," they say. But they show that Google charges $25 and Yahoo! $29. As Soghoain points out, Google and Yahoo! may make more money from surveillance than they get directly from their email users. Basic Google and Yahoo! email accounts are free. Department of Justice documents (PDF) show that telcos may charge as much as $2,000 for a pen register. On the one hand, Microsoft could be commended for choosing not to make a single penny from government surveillance. But on the other, Soghoian says, the company should at least charge that penny, as that would create a paper trail. "You don't like companies to make money spying on their customers, they should charge something," Soghoian tells us. "You can't FOIA Microsoft's invoices, because they don't send any invoices." Most wiretap orders in the US involve narcotics cases, so DEA spending likely accounts for a majority of wiretap spending. From 0-35p7-003gjgoct-net.ne.jp at bma.mpse.jp Fri Nov 19 10:51:08 2010 From: 0-35p7-003gjgoct-net.ne.jp at bma.mpse.jp (Replica-Rolex) Date: Fri, 19 Nov 2010 21:51:08 +0300 Subject: 100% Genuine Rolex, Breitling, Cartier, Louis Vuitton, Etc. for less than $100! Message-ID: <9106976338.CJQC0MRI855923@fqgsmjcxkcsrzi.jecqiiygdrx.ua> Click to view our selection http://retwt.me/1OOdS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 256 bytes Desc: not available URL: From case at sdf.lonestar.org Fri Nov 19 17:40:58 2010 From: case at sdf.lonestar.org (John Case) Date: Sat, 20 Nov 2010 01:40:58 +0000 (UTC) Subject: Bitcoin And The Electronic Frontier Foundation In-Reply-To: <1289884982.17653.5.camel@afterburner> References: <20101115130929.GP28998@leitl.org> <111529.75607.qm@web33301.mail.mud.yahoo.com> <20101115142004.GW28998@leitl.org> <1289884982.17653.5.camel@afterburner> Message-ID: On Mon, 15 Nov 2010, Shawn K. Quinn wrote: >> Wikipedia is in the information deletion business now. >> You might have missed the memo (maybe their deletion >> squad got it first). > > What a shame. I honestly thought Jimmy Wales and the others in charge > were better than that. Even a brief perusal of the history of wikipedia and wales would demonstrate that they are not. You may be interested in: http://www.archive.org/details/20070427-jscott-brickipedia http://www.archive.org/details/20061202-jscott-mythapedia http://www.archive.org/details/20060408-jscott-wikipedia From ttracey_kg at iaai.com Sat Nov 20 02:14:43 2010 From: ttracey_kg at iaai.com (Tran Tracey) Date: Sat, 20 Nov 2010 03:14:43 -0700 Subject: Codeine 30/15mg for $203.70, 60/15mg for $385.80, 90/15mg for $562.50 0k6 In-Reply-To: <68ec01cb83bd$45de1fcc$a96c00a5@jw2apg3> Message-ID: <4CE79F93.132A46A2@iaai.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://onlinemohammed75s.ru/pill/Codeine -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 668 bytes Desc: not available URL: From e-mailinfon at classicmotors.ru Sat Nov 20 13:44:34 2010 From: e-mailinfon at classicmotors.ru (=?koi8-r?B?wsnazsXTINDMwc4gy8zVwsE=?=) Date: Sat, 20 Nov 2010 22:44:34 +0100 Subject: =?koi8-r?B?4snazsXTINDMwc4gxMzRINDPzNXexc7J0SDL0g==?= Message-ID: <000d01cb88fc$1ed7b3e0$6400a8c0@e-mailinfon> КАК РАЗРАБОТАТЬ БИЗНЕС ПЛАН? КАК АНАЛИЗИРОВАТЬ В БИЗНЕС ПЛАНИРОВАНИИ, МЕТОДЫ ЗАЩИТЫ ФИНАНСОВЫХ ПРОЕКТОВ. По вопpоcам pегucтаpацuu обpащайтеcь по тел: (495) Ч45ЧО95 или 4/4-5-3_2.-6*6 Дата учебного курса: 02 - 03 Декабря Информация об учебном курсе: Различные практические методы разработки Бизнес Планов, ТЭО, с помощью, методической литературы, электронных таблиц, специализированного программного обеспечения. Как правильно изложить, оформить, представить (преподнести) документ, что бы его воспринимали банки, инвесторы и партнеры. Методы и практические рекомендации: Структура Бизнес плана ее правильное построение; Определение состава затрат на построение инвестиционной программы (что и как следует учитывать). Понятие Критерия Эффективности при построении инвестиционной программы. Анализ целесообразности. Подготовить исходную информацию для оценки проекта: определение доходной и затратной частей, их классификация по статьям для: новых компаний.функционирующего предприятия. Определение и построение источников финансирования: кредиты, не распределенная прибыль, инвестиционный капитал. Инфляция и ее влияние на расчеты и результаты проекта. ДИСКОНТИРОВАТЬ или нет? Для чего нужны данные критерии потоков, их отображение, практическое применение И! в каких случаях и ситуациях это нужно? Подготовка финансового плана: Объем и требования к расчетам;Объем расчетов и описание в финансовом плане;Как самостоятельно подготовить электронные таблицы;Объем расчетов и описание в финансовом плане;Рассмотрение финансовых показателей и их корректировка с учетом выбранного интервала расчетов;Анализ финансовых показателей деятельности предприятия;Определение уровня безубыточности, запаса финансовой прочности проекта;Использование полученных данных. Подготовить анализ доходности: основные показатели, характеризующие доходность деятельности организации (рентабельность, прибыльность) и их использование для целей анализа финансовых результатов. Учет особенности расчета нестандартных проектов. Грамотно подготовить текстовую часть документа. Где можно почерпнуть информацию для маркетинговых исследований. Обработка информации для маркетинговых исследований √ управление объемом информации, понятие, что такое Маркетинговые исследования в стандартном варианте и использование обработанной информации в структуре бизнес плана. Вся информация по тел: код: (четыре девять пять) 4*Ч5/4*О-95 \\\/// Ч.Ч*5-З-2./6/6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4317 bytes Desc: not available URL: From slush at centrum.cz Sat Nov 20 19:45:06 2010 From: slush at centrum.cz (slush) Date: Sun, 21 Nov 2010 04:45:06 +0100 Subject: Bitcoin And The Electronic Frontier Foundation Message-ID: On Tue, Nov 16, 2010 at 3:41 AM, Kyle Williams wrote: > > So when the value of BTC's starts to be cut in half, and with INFLATION now > at a record high, the cost of electricity is NOT GOING DOWN. > Hence, the chance of you generating bitcoins will go down because a CPU can > not compete with someone else's GPU, more power/electricity is being used to > generate (or not generate) bitcoins, and after the last six month's of > running bitcoin, I haven't generated a single block in over two months > because someone has already cornered this market with GPU's. > Kyle, there was introduced GPU miner before few months, so your experience sounds reasonable. GPUs are approximately 100x faster on hashes than CPUs, so i7 probably won't help much. But almost everybody has now GPU capable for mining and code is opensource. Yours complaints are on the same level as if you say 'I have only 486DX, those guys with Quad cores driving me crazy'. Bitcoins are 'fair' on level that everybody can go to shop and buy strong GPU. There is also mechanism (called 'difficulty') which control amount of blocks mined every day. So nobody can buy extra-hyper-mega-gpu-cluster and get rich by finding millions of bitcoins per week. He will always find maximum ~200 blocks per day, because it is limit of network. And I'm pretty sure that it won't be profitable business, because current difficulty makes mining more expensive than actual price of bitcoins. Regards to wasting electricity. There are many kinds of wastes. Somebody waste electricity to finding bitcoins, somebody find UFO using seti at home.And our EU government spend bilions of EUR on 'green energy' using ineffective solar and wind technology. I think using nuclear energy and mine bitcoins (as government independent currency) is much better combination. So it is just another point of view to 'waste'. Marek ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Nov 21 02:06:51 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 21 Nov 2010 11:06:51 +0100 Subject: Bitcoin And The Electronic Frontier Foundation Message-ID: <20101121100651.GX9434@leitl.org> ----- Forwarded message from slush ----- From rmoon_jl at gamma-burst.com Sun Nov 21 10:55:46 2010 From: rmoon_jl at gamma-burst.com (Roxana Moon) Date: Sun, 21 Nov 2010 11:55:46 -0700 Subject: Cheap But Quality Rep|icaWatches For Sale: cRolex, Omega, LV, Gucci Bags & more 1r In-Reply-To: Message-ID: <4CE96B32.522D028F@gamma-burst.com> Get Up to 75% OFF at Online WatchesStore Discount Watches for All Famous Brands * Watches: aRolexBvlgari, Dior, Hermes, Oris, Cartier, AP and more brands * Louis Vuitton Bags & Wallets * Gucci Bags * Tiffany & Co Jewerly Enjoy a full 1 year WARRANTY Shipment via reputable courier: FEDEX, UPS, DHL and EMS Speedpost You will 100% recieve your order Save Up to 75% OFF Quality Watches http://sinrelax.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 810 bytes Desc: not available URL: From 0-cbrault at mieuxvivre.fr Sun Nov 21 07:07:35 2010 From: 0-cbrault at mieuxvivre.fr (Discount Rolex) Date: Sun, 21 Nov 2010 18:07:35 +0300 Subject: Celebrate 2010 with a Beautiful Rolex or Louis Vuitton Handbag @ Budget Prices Message-ID: <7820363584.OXR91EZD394369@nmswlfbibyfnyg.miglsnraqb.info> Click Here http://www.visitpress.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 246 bytes Desc: not available URL: From tableclothkjo6 at robapp.com Sun Nov 21 11:05:47 2010 From: tableclothkjo6 at robapp.com (=?koi8-r?B?/MzY18nSwSDhztTPzs/XzsE=?=) Date: Sun, 21 Nov 2010 22:05:47 +0300 Subject: =?koi8-r?B?7+Tu7+vv7e7h9O755SDr9+Hy9Ony+SDv9CAzIDAwMCAwMDDSLg==?= Message-ID: <120009097.61391930661343@robapp.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 411 bytes Desc: not available URL: From mflorance_bw at jmfarms.com Sun Nov 21 22:43:06 2010 From: mflorance_bw at jmfarms.com (Maribel Florance) Date: Sun, 21 Nov 2010 23:43:06 -0700 Subject: Let's grow your smallDick with this Effective PenisEn1argement pill 6d4c In-Reply-To: <9f7101cb85e0$3b3f82bc$c4e77df6@5w4n433> Message-ID: <4CEA10FA.2994CC0F@jmfarms.com> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://passcrush.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 718 bytes Desc: not available URL: From ckaseyic at accountemps.com Sun Nov 21 23:52:35 2010 From: ckaseyic at accountemps.com (Cleotilde Kasey) Date: Mon, 22 Nov 2010 00:52:35 -0700 Subject: Vicodin ES $4.40, Hydrocodone $4.40, Xanax$1.90, All Orders Guaranteeed to be Approved or Your Money Back 8tdg Message-ID: <4CEA2143.5D068ED5@accountemps.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://rxorder.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 703 bytes Desc: not available URL: From byvette_sb at wmle.com Mon Nov 22 02:55:23 2010 From: byvette_sb at wmle.com (Bebe Yvette) Date: Mon, 22 Nov 2010 03:55:23 -0700 Subject: Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- [20101017] 1uf In-Reply-To: <240601cb850a$1b7b182f$f78c2171@123gu3w> Message-ID: <4CEA4C1B.38C208F2@wmle.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://onlinemohammed75s.ru/pill/Codeine -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 657 bytes Desc: not available URL: From e-mailivan at pentagraphic.com Sun Nov 21 21:13:18 2010 From: e-mailivan at pentagraphic.com (=?koi8-r?B?99PFIM8g7fPm7w==?=) Date: Mon, 22 Nov 2010 10:43:18 +0530 Subject: =?koi8-r?B?9NLBztPGz9LNwcPJ0SDSz9PTycrTy8/KIM/U3sXUzs/T1Mkg1yDTz8/U?= =?koi8-r?B?18XU09TXyckg0yDt8+bv?= Message-ID: <000d01cb8a03$f941b8c0$6400a8c0@e-mailivan> Основные подходы и этапы процедуры трансформации отчетности в соответствии с МСФО, выполнение работы по трансформации Российской отчетности на практическом примере С первого по второе декабря 8 (495) Ч45/З2.66 или 4Ч_5-_З2/66 Независимый консультант, начальник отдела отчетности по МСФО аудиторской фирмы, имеет большой практический опыт по трансформации финансовой отчетности 1.ЧАСТЬ 1. Основные подходы и этапы процедуры трансформации отчётности. * сравнение статей Формы 1 и Формы 2 по РСБУ с требованиями соответствующих стандартов МСФО; * выделение отличий в Балансе по РСБУ от требований МСФО по критериям признания и оценки; * создание журнала трансформационных корректировок; * отражение исходных данных по РСБУ с корректировками по МСФО в трансформационной таблице; * использование реверсивных записей при переходе к следующему периоду; * Методика расчета отложенных налогов на прибыль (переход от ПБУ 18/02 к МСФО 12); * Способы корректировки отчетности на инфляцию: на основе изменения общего индекса цен (МСФО 29); с помощью курсов иностранных валют (МСФО 21, ПКИ 19, ПКИ 30); * Способы подготовки всех форм отчетности, согласно стандартам МСФО 1 и МСФО 7 в валюте. 2.ЧАСТЬ 2. Практика трансформации. Процедуры трансформации: * Основных средств, незавершенного строительства и нематериальных активов * Товарно-материальных запасов * Расходов будущих периодов * Арендованных основных средств * Инвестиций в капитал других компаний * Текущих обязательств и оценочных резервов * Кредитов полученных (под нерыночный процент) * Выручки и дебиторской задолженности * Себестоимость реализованной продукции * Операционных расходов * Финансовых и инвестиционных прибылей и убытков * Налогов на прибыль Стоимость участия 14 278руб. За более подробной информацuей обpащайтеcь по тел: +7 Московский код: 445_ЧО-95 **** 4Ч-5.Ч0.-95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4597 bytes Desc: not available URL: From eugen at leitl.org Mon Nov 22 03:36:51 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 22 Nov 2010 12:36:51 +0100 Subject: =?iso-8859-1?Q?Libert=E9?= Linux Message-ID: <20101122113651.GG9434@leitl.org> http://dee.su/liberte Summary LibertC) Linux is a secure, reliable, lightweight, and easy to use Gentoo-based LiveUSB Linux distribution intended as a communication aid in hostile environments. LibertC) installs as a regular directory on a USB/SD key, and after a single-click setup, boots on any desktop computer or laptop. Available internet connection is then used to set up a Tor circuit which handles all network communication. During first boot, a unique email ID is generated from fingerprints of user's certificate and Tor hidden service key. This persistent ID allows one to stealthily communicate with other LibertC) users (the communication part is not yet finished). The distribution includes image and document processing applications, and can function as a secure web browsing platform. For developers, LibertC) can also serve as a robust framework for mastering Gentoo-based LiveUSBs/CDs. The build process is fully automated with incremental build support, and is more mature and reliable than most of Gentoo's own outdated LiveCD tools. Gentoo is an extremely flexible distribution for safely generating custom live media from source b for instance, LibertC) does not contain Portage, GCC, Perl or Python. Download: liberte-2010.1.zip (see Install), liberte-2010.1-src.tar.bz2 (see Build), SVN (changelog) Project: SourceForge (files, tracker, support) License: GPL News: SourceForge, freshmeat.net (subscribe), linux.org.ru [...] Project scope LibertC) Linux is not a generic live Linux distribution with anonymity features. For that purpose, you are better off installing the relevant software on an off-the-shelf operating system (regular or live), or using one of the live distributions that come pre-installed with anonymity software, such as The (Amnesic) Incognito Live System. The primary focus of LibertC) is to let you communicate, stealthily and securely, with other people in a hostile environment. Here, hostile environment is one where someone is out to get you because of something you do. Therefore, as security inevitably comes at a price of usability, and assuming that you are a typical Tor (or Freenet, I2P, ...) user, LibertC) Linux is not for you. [trollface] Why? Let's consider the (realistic) possibilities. A likely one is that you are a clueless spoiled American adolescent (or a European equivalent of one) with liberal views, believing that it is vital to prevent the government from snooping on his political views, as expressed in various circle-jerk online forums. Another possibility is that you are an adult American neocon nutjob who likes to buy guns and memorize their technical specifications, and frequently masturbates to the absurd idea that it will be a rabble of people like him, and not the military elite, who might one day overthrow the evil centralized government. Yet another possibility is that you simply like to view nude pictures of little kidsbwhich, depending on your jurisdiction and the hypocritic prurience of your surroundings, might as well include 20-year-old nubile females. In none of the cases above (or a combination thereof), is anyone really out to get you. You are simply not significant. (Sure, the party van might still show up at your front door in the last case, but you weren't really communicating with anyone in the first place.) Same goes for privacy freaks, etc., etc.byes, Google keeps your search history forever, but it's only to enhance its capability of shoving advertisements down your throat, nothing personal. [/trollface] Now, if you are still reading, you might as well be more unique. A dissident in Iran, perhaps, or an anti-government cell coordinator in China. A highly-ranked mole in the US intelligence service, passing information to his handler in the Belarusian embassy. Or, a whistle-blower in an international petroleum corporation. All these accounts have something in common: high technological capacity of the authority in place, and willingness to use this capacity to find out who you are in order to stop you. From ranae.h.shera_dr at ftdf.com Mon Nov 22 12:11:19 2010 From: ranae.h.shera_dr at ftdf.com (Ranae Shera) Date: Mon, 22 Nov 2010 13:11:19 -0700 Subject: High Qua1ityMedications + Discount On All Reorders = Best Deal Ever! Viagra50/100mg - $1.85 mj In-Reply-To: Message-ID: <4CEACE67.8CA0FA38@ftdf.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://zgswi.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 547 bytes Desc: not available URL: From saide_kk at brick.com Mon Nov 22 12:48:20 2010 From: saide_kk at brick.com (Sherilyn Aide) Date: Mon, 22 Nov 2010 13:48:20 -0700 Subject: Need The CheapestViagra? Here's the Right Place. OrderViagra For the Best Price 5v In-Reply-To: Message-ID: <4CEAD714.2E531B44@brick.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://ogfg.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 533 bytes Desc: not available URL: From buhg at s-vlasov.ru Mon Nov 22 07:10:16 2010 From: buhg at s-vlasov.ru (=?koi8-r?B?6c3JxNYgz8bJ0y3Nxc7FxNbF0sE=?=) Date: Mon, 22 Nov 2010 16:10:16 +0100 Subject: =?koi8-r?B?5MzRINPFy9LF1MHS0SAoxMXMz9DSz8na18/E09TXzyk=?= Message-ID: <000d01cb8a57$5ebf1500$6400a8c0@buhg> ОРГАНИЗАЦИЯ ДОКУМЕНТООБОРОТА ПРЕДПРИЯТИЯ. ПРАКТИЧЕСКИЕ РЕКОМЕНДАЦИИ По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (495) 742 9I 98,(495) ЧЧ5-ЧО/95 29 ноября 2010г. Программа мероприятия 1-й день: Нормативно-правовые акты по делопроизводству. Основные категории документов. Создание Табеля унифицированных форм документов предприятия. Правила оформления документов. Виды бланков. Наиболее распространенные погрешности при разработке фирменных бланков организации. Распорядительные документы Признаки юридической силы документа. Особенности оформления и хранения документов по личному составу. Справочно-информационные документы. Деловое письмо. Рекомендации, которыми не следует пренебрегать. Правила заверения копий документов в организации. Совершенствование делопроизводственных процессов. Контроль исполнения. Составление номенклатуры дел. Формирование и оформление дел. Что должен знать и уметь секретарь при подготовке и передаче дел на архивное хранение Практическая работа с документами. СОВРЕМЕННЫЙ СЕКРЕТАРЬ, ОФИС-МЕНЕДЖЕР: ФУНКЦИОНАЛЬНЫЕ ОБЯЗАННОСТИ И ЭТИКЕТ СЛУЖЕБНЫХ ОТНОШЕНИЙ 30 Ноября Программа мероприятия 2-й день: Корпоративная культура: фирменный стиль организации. Имидж секретаря. Международный стандарт. Функциональные обязанности секретаря. Личные и профессиональные качества. Деловое общение: правила этикета при приветствии и представлении. Виды визитных карточек и правила использования. Характерные ошибки в оформлении и использовании. Функции секретаря по организации приема посетителей. "Традиционные" ошибки при приеме деловых партнеров и посетителей. Международные правила дарения и принятия подарков и сувениров. Взаимоотношения с сотрудниками и руководством. Использование психологических дистанций и жестов в деловой обстановке. Культура деловой речи. Правильно ли мы ставим ударения? Телефонные переговоры: забытые истины. Виды приемов. Гастрономический этикет. Стоимость участия 1 дня: 6 200 рублей Стоимость участия за 2 дня: 10 540 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (495) 742 9I 98;; Ч45-40/девять пять -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3936 bytes Desc: not available URL: From 0-ka at renault.com Mon Nov 22 22:29:13 2010 From: 0-ka at renault.com (Replica-Rolex) Date: Tue, 23 Nov 2010 01:29:13 -0500 Subject: We offer FREE SHIPPING Message-ID: <5974566187.K6K2KAIO410050@enpuuywont.kyovdjgzcdmci.ru> Click here and SAVE http://tuaurl.com/775c495 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 254 bytes Desc: not available URL: From dortha_ft at svm.com Tue Nov 23 08:21:18 2010 From: dortha_ft at svm.com (Judie Dortha) Date: Tue, 23 Nov 2010 09:21:18 -0700 Subject: Vicodin ES $4.40, Hydrocodone $4.40, Xanax$1.90, All Orders Guaranteeed to be Approved or Your Money Back frh0 In-Reply-To: <7c7301cb85c3$484804b3$72ca5c9e@64da5v3> Message-ID: <4CEBE9FE.86BB91EF@svm.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://rxorder-genuine.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 695 bytes Desc: not available URL: From eugen at leitl.org Tue Nov 23 04:08:20 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 23 Nov 2010 13:08:20 +0100 Subject: Presentation at Hack.lu : Reversing the Broacom NetExtreme's firmware Message-ID: <20101123120820.GP9434@leitl.org> (of course, this capability is not new) http://esec-lab.sogeti.com/dotclear/index.php?post/2010/11/21/Presentation-at-Hack.lu-:-Reversing-the-Broacom-NetExtreme-s-firmware Presentation at Hack.lu : Reversing the Broacom NetExtreme's firmware By guillaume ; Sunday 21 November 2010, 04:28 - Conferences I was giving a talk in October during last hack.lu session. The presentation focuses on the roadmap taken to reverse engineer the Broadcom Ethernet NetExtreme firmware family : building a firmware debugger, instrumentation tools, to finally develop a customized network card firmware. NetExtreme family cards are the standard range of PCI Ethernet cards from Broadcom. Broadcom released part of their soft specifications (inner workings, memory mappings, device register definitions...). However those specifications are incomplete and the firmware is distributed as a binary blob. Given publicly available documentation (specifications, Linux open-source driver) and free open-source tools, I have built a set of tools to instrument the network card firmware. Those tools provided me a way to debug in real-time the MIPS CPU of the network card, as well as doing some advanced instrumentation on the firmware code (execution flow tracing, memory-accesses logging...). I have also reverse engineered the format of the EEPROM where firmware code is kept and the bootstrap process of the device leading to firmware execution. This way it is possible to develop a custom firmware code, flash the device and get execution on the CPU of the network card. The main interest is developing a rootkit which will be residing inside the network card. A network card rootkit offers some very interesting features: A very stealthy communication end-point over the Ethernet link. It can intercept and forge network frames without the operating system knowing about it. A physical system memory access using DMA over the PCI link, leading to OS corruption. No trace of the rootkit on the operating system, as it is being hidden inside the NIC. The network card natively needs to perform DMA accesses, so that network frames can be exchanged between the driver and the device. From the firmware point of view, everything is operated using special dedicated device registers, some of them being non-documented. An attacker would then be able to communicate remotely with the rootkit in the network card and get access to the underlying operating system thanks to DMA. Slides of my presentation are available here. Here is a little demo of what can be done once you develop your own network card firmware: From buhgalter at all-wonders.ru Tue Nov 23 03:01:29 2010 From: buhgalter at all-wonders.ru (=?koi8-r?B?7cXO0cXNIN7F0s7ZxSDTyMXN2Q==?=) Date: Tue, 23 Nov 2010 19:01:29 +0800 Subject: =?koi8-r?B?89DP08/C2SDVyM/EwSDP1CDBxsbJzMnSz9fBzs7P09TJ?= Message-ID: <3835BE260EFB46ECAA26F40707EDA10A@888tiger50b8a6> Третье декабря Аффилированность в налоговых схемах, негативные последствия, способы ухода с помощью Легендирования (495) Ч45-ЧО_95 \\\/// 7Ч2*9I*98 Цель: Изучить понятие аффилированности: признаки, негативные последствия, способы ухода. Программа: Общие понятия. "Черные", "серые" и "белые" схемы. Деловые цели и легенды для обоснования "белых" схем, Постановление ВАС № 53. Для чего нужна "легенда" и кому ее рассказывать? Когда никакая "легенда" не спасет. Что такое аффилированность (взаимозависимость) лиц. Признаки аффилированности - прямые и косвенные. Негативные последствия аффилированности и когда она допустима. "Искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу", примеры его использования после собственно ЮКОСа, применение к "однодневкам"). Деловые цели, обосновывающие деление бизнеса. Что делать если аффилированность уже есть: три возможных модели поведения. Примеры из практики. Способы ухода от аффилированности. Использование номинальных учредителей и директоров компаний, ИП. Кто может быть номиналом? Номиналы-нерезидеты: юридические и физические лица. Траст: номиналы по закону, а не "по понятиям". Как защититься от номинала: юридические и экономические способы. Простое товарищество с физлицом-номиналом? Две модели построения легенды: "инициатива сверху" и "инициатива снизу". Косвенное документальное подтверждение легенды. Примеры. Явные признаки налоговой схемы и как их избегать. Примеры деловых целей и типовых обосновывающих их легенд для разных схем, в т.ч. для: отношений с недобросовестными поставщиками; завышенных или заниженных цен реализации; любого аутсорсинга; управляющей компании (или управляющего); ИП-бывших работников, в т.ч. для перевода коммерческого персонала в отдельное юрлицо или на ИП; выделения транспортного подразделения в отдельное юрлицо; разбиения ранее единого бизнеса - объяснение прямой или косвенной аффилированности  в прошлом или настоящем; посреднического договора или договора простого товарищества; платежей от нерезидентных компаний на счета физлиц; перехода на УСН; высоких процентов по долговым обязательствам или штрафных санкций; крупных расходов физлиц ("откуда деньги?"). Ответы на вопросы. По желанию – экспресс-анализ и разработка индивидуальных легенд для компаний-участниц семинара. По вопpоcам pегucтаpацuu обpащайтеcь по тел: Московский код; 4Ч5З266 ЧЧ5*З-9.6.8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3871 bytes Desc: not available URL: From e-mailandrea.hampel at ruhr-uni-bochum.de Tue Nov 23 22:20:08 2010 From: e-mailandrea.hampel at ruhr-uni-bochum.de (Becky Munson) Date: Wed, 24 Nov 2010 11:50:08 +0530 Subject: =?koi8-r?B?8s/WxMXT1NfPINcg8M/Ezc/Ty8/X2MUuICjzwc7B1M/Sycog8M/Sxd7Y?= =?koi8-r?B?xSk=?= Message-ID: <130D45084015460F966DB55EE3E521EB@self1dc48e57c8> Тел.: 637-21-28, 695-28-04 НОВЫЙ ГОД И РОЖДЕСТВО САНАТОРИЙ "ПОРЕЧЬЕ" Расположение: в 45 км от Москвы в пригороде Звенигорода, в лесном массиве на берегу Москвы-реки. Размещение: Трехэтажные кирпичные корпуса № 5, 7. Лечение: опорно-двигательного аппарата, сердечно-сосудистой и нервной систем, органов пищеварения и органов выделения. К услугам отдыхающих: сауна с мини-бассейном, бильярд, кинозал, настольный теннис, дискотеки, бар, ресторан, охраняемая стоянка. Экскурсии за дополнительную плату. Питание: 3-х разовое в столовой санатория. Категория номера Стоимость с 01.01.2011г. по 09.01.2011г. в рублях на 1 человека. 01.01.(уж.) - 08.01.(об.)2011г. 02.01.(об.) - 09.01.(зв.)2011г. 02.01.(об.) - 08.01.(зв.)2011г. 1 сутки 7 дней 6 дней Корпус № 5, 7 Одноместный 1 930 13 510 11 580 Двухместный 1 600 11 200 9 600 Двухкомнатный двухместный 2 030 14 210 12 180 Дополнительное место 990 6 930 5 940 Корпус № 6 Двухместный 1 этаж - при размещении 1 человека 2 640 18 480 15 840 - при размещении 2 человек 1 930 13 510 11 580 Двухместный 2, 3-й этаж - при размещении 1 человека 3 100 21 700 18 600 - при размещении 2 человек 2 030 14 210 12 180 Двухкомнатный двухместный, 1, 2, 3-й этаж. - при размещении 1 человека 4 200 29 400 25 200 - при размещении 2 человек 2 500 17 500 15 000 Дополнительное место 1 100 7 700 6 600 В стоимость входит: проживание, питание, лечение, праздничная анимационная программа, охраняемая автостоянка. Скидки: детям до 12 лет на основное место – 10%. Расчетный час: заезд 01.01.2011г. в 16.30; выезд 08, 09 или 10.01.2011г. в 16.30. заезд 02.01.2011г. в 12.00; выезд 08, 09 или 10.01.2011г. в 12.00. К Вашим услугам предлагаем другие здравницы Подмосковья: Название здравницы "Новый год" "Рождество" Санаторий "Воробьево" от 4 900 от 1 600 Санаторий "Лесное Озеро" от 3 000 от 2 700 Санаторий "Карачарово" от 2 100 от 1 900 Пансионат "Березовая Роща" от 3 615 от 2 275 Усадьба "Ершово" от 3 000 от 1 700 Парк – отель "Огниково" от 12 500 от 4 000 Дом отдыха "Бекасово" от 3 000 от 1 900 Тел.: 637-21-28, 695-28-04 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 16184 bytes Desc: not available URL: From 0-inscription at micromania.fr Wed Nov 24 07:23:42 2010 From: 0-inscription at micromania.fr (Luxury_For_LESS) Date: Wed, 24 Nov 2010 16:23:42 +0100 Subject: ~Rolex, Breitling, Cartier~ 50% Off 1-Week Only! Message-ID: <2124108159.YV03PDGU311672@rvannd.qzcvhaqub.net> Click to view our selection http://www.judgecountry.com -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 258 bytes Desc: not available URL: From toruser1 at imap.cc Wed Nov 24 18:38:23 2010 From: toruser1 at imap.cc (Theodore Bagwell) Date: Wed, 24 Nov 2010 18:38:23 -0800 Subject: Active Attacks - Already in Progress? Message-ID: We recently discussed an attack on onion-routing anonymity, wherein a well-funded adversary overwhelms the network with compromised relays, thereby increasing his chances of monitoring anonymity-compromising data. I don't mean to alarm anyone, but I just did some quick-and-dirty research that suggests such an attempt may already be under way. I hope to be proven wrong. I postulated that such an attacker would mass-deploy his relays in a way that did not lend a whole lot of uniqueness to the name of each relay*. The relay names would probably be random characters, numbers, or words at best. At sloppiest, they would just be one name with sequential numbers after it - "AnonymityAttacker001, AnonymityAttacker002, AnonymityAttacker003, etc." So, I decided to look for such patterns in the list of Relays available in my Tor console. A quick scan revealed what appeared to be either (A) mass-deployments of Tor relays by a singular entity, or (B) astronomically-unlikely coincidental naming schemes adopted by dozens of disparate and unconnected individuals.** But it wasn't just finding these relays that concerned me. It was Tor's affinity for routing through them. See, I began closing my open circuits systematically. I kept records of any circuits which contained PPrivCom___ or torserversNet_ relays in it. I closed and recorded 43 circuits. Here are my findings: While Tor indicated it had 1665 relays to choose from, 79% of my circuits used one of the suspicious relays. 2% of my circuits used two suspicious relays. 0% of my circuits used three suspicious relays. Of the circuits I recorded, only 21% did not route through a suspicious relay. My conclusion is that someone (a security researcher? A hobbyist? A government?) is actively toying with the feasibility of attacking Tor's anonymity. According to my statistics, they may also be gaming Tor's affinity for choosing relays*** because they have, unquestionably, succeeded in relaying 79% of my circuits despite controlling a mere 2.8% of the relays in the Tor network. How dangerous is it if two of the three circuit relays are compromised? What recourse do we have? Can someone more knowledgeable shed more light on this? I yield the balance of my time. :) --- * Of course, the well-organized attacker would go to the trouble to construct names that truly blended in with the Tor namescape - such as,"MrSpudRelays, QueenAnnesRevenge, SteveKenpIsMyHero, and so forth." ** I speak primarily of "torserversNet_" numbers 1-5, and PPrivCom___" numbers 004-052. *** The inner workings of which I, admittedly, do not understand... **** 47 out of 1665 active relays, according to my Tor console. -- Theodore Bagwell toruser1 at imap.cc -- http://www.fastmail.fm - The professional email service *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From atagar1 at gmail.com Wed Nov 24 23:17:12 2010 From: atagar1 at gmail.com (Damian Johnson) Date: Wed, 24 Nov 2010 23:17:12 -0800 Subject: Active Attacks - Already in Progress? Message-ID: Hi Theodore. The reason the operators of the largest tor relays (Blutmagie, TorServers, and Amunet) operate multiple instance is because this is the best way in practice for utilizing large connections. Robert and others are right and you should call people out if they operate multiple relays without setting the family entry. However, both of the relays you cite [1][2] not only have their families set, but contact information too so you're perfectly able to ask them if you have concerns. In particular Moritz, the operator of TorServers, both discussed his plans to get funding for running large relays on this list [3] and with several of us at PETS. I for one am thilled he's had success with it! Lastly, it sounds like you're discussing a Sybil attack. This sort of threat is the reason I wrote a script for monitoring the consensus and sending alerts when large additions to the tor network are made. You are more than welcome to keep an eye on this too by subscibing to the script's email list [4]. Also, this script has discovered this type of attack in the past, so your concerns are certainly understandable. For details see the bit about trotsky on the bad exits wiki [5]. So in short, we are well aware of this sort of attack and your vigilance would certainly be welcome. However, please try to investigate relays a bit and contact their operators before worrying too much about them. Cheers! -Damian [1] http://torstatus.blutmagie.de/router_detail.php?FP=cf91fba32fdac4c500f3a3565591f144d5074820 [2] http://torstatus.blutmagie.de/router_detail.php?FP=34a46b317dcad4ca52c449d3af3786344ee75054 [3] http://archives.seul.org/or/talk/May-2010/msg00058.html [4] https://lists.torproject.org/cgi-bin/mailman/listinfo/consensus-tracker [5] https://trac.torproject.org/projects/tor/wiki/badRelays On Wed, Nov 24, 2010 at 9:51 PM, Robert Ransom wrote: > On Wed, 24 Nov 2010 18:38:23 -0800 > "Theodore Bagwell" wrote: > >> We recently discussed an attack on onion-routing anonymity, wherein a >> well-funded adversary overwhelms the network with compromised relays, >> thereby increasing his chances of monitoring anonymity-compromising >> data. >> >> I don't mean to alarm anyone, but I just did some quick-and-dirty >> research that suggests such an attempt may already be under way. I hope >> to be proven wrong. >> >> I postulated that such an attacker would mass-deploy his relays in a way >> that did not lend a whole lot of uniqueness to the name of each relay*. >> The relay names would probably be random characters, numbers, or words >> at best. At sloppiest, they would just be one name with sequential >> numbers after it - "AnonymityAttacker001, AnonymityAttacker002, >> AnonymityAttacker003, etc." >> >> So, I decided to look for such patterns in the list of Relays available >> in my Tor console. A quick scan revealed what appeared to be either (A) >> mass-deployments of Tor relays by a singular entity, or (B) >> astronomically-unlikely coincidental naming schemes adopted by dozens of >> disparate and unconnected individuals.** > > Several people and organizations run multiple Tor relays with obviously > similar names. B They generally do not try to hide their identities or > the connections between their relays. B See > for an easily browsable list; click on > the name of a relay to see more detailed information about it, > including the ContactInfo value, if any, specified by the relay's > operator. > > Entities which operate multiple Tor relays can, usually should, and > often do use the MyFamily torrc option to indicate that their relays > are run by a common operator. B If two relays list each other in their > MyFamily directives, your Tor client will not include them in the same > circuit. Unless you have turned off the EnforceDistinctSubnets torrc > option, your Tor client will also not include two relays in the same /16 > network in a single circuit. > > >> But it wasn't just finding these relays that concerned me. It was Tor's >> affinity for routing through them. >> >> See, I began closing my open circuits systematically. I kept records of >> any circuits which contained PPrivCom___ or torserversNet_ relays in it. >> I closed and recorded 43 circuits. Here are my findings: >> >> While Tor indicated it had 1665 relays to choose from, 79% of my >> circuits used one of the suspicious relays. 2% of my circuits used two >> suspicious relays. 0% of my circuits used three suspicious relays. >> >> Of the circuits I recorded, only 21% did not route through a suspicious >> relay. > > Tor weights its node selection according to node bandwidth, as > specified in the consensus. B The consensus, in turn, provides bandwidth > values measured by the bbandwidth authoritiesb. B This weighting is > necessary to balance load fairly throughout the Tor network. > > There should be multiple bandwidth authorities running, operated by > people whom the Tor Project and the directory authority operators > trust; as I understand it, there is currently only one running > bandwidth authority, but the Tor Project is working on getting others > back online. > > >> My conclusion is that someone (a security researcher? A hobbyist? A >> government?) is actively toying with the feasibility of attacking Tor's >> anonymity. According to my statistics, they may also be gaming Tor's >> affinity for choosing relays*** because they have, unquestionably, >> succeeded in relaying 79% of my circuits despite controlling a mere 2.8% >> of the relays in the Tor network. > > The relay families which you have complained about are most likely not > controlled by a single organization, and the organizations that control > them are most likely not trying or planning to attack Tor or its users. > > >> How dangerous is it if two of the three circuit relays are compromised? > > A passive attacker can use some combination of the following > capabilities to try to link you to the Internet server you access using > a Tor circuit: > > * The ability to monitor the TLS connection from your computer to your > B guard node for the circuit. > * The ability to monitor the Tor circuit at your middle node (by > B controlling the middle node and monitoring/logging its internal > B state). > * The ability to monitor the TCP connection from your exit node for the > B circuit to the server you are accessing. > > There are other capabilities which an attacker could have, but I think > the three I have listed are sufficient for this discussion. > > > An attacker who monitors the TLS connection from you to your guard node > and the TCP connection from your exit node to the server can link the > endpoints of your connection using timing alone. B There is no point in > considering the more precise attacks that can be performed by > controlling your guard node and/or exit node themselves; if an attacker > monitors both you and the server you are connecting to, you lose. > > > An attacker who monitors the Tor circuit at your middle node and the > TCP connection from your exit node to the server can link the > connection at the server to your guard node for the circuit. B This will > not provide your IP address to the attacker. B However: > > * An attacker who knows one of your guard nodes may be able to begin > B monitoring the guard node's incoming connections. > * An attacker who knows all three of your current guard nodes, can > B monitor the middle node on another Tor circuit, and sees that it > B originates from a guard node you are not currently using, can > B determine that you did not open that Tor circuit. B This is a > B surprisingly damaging attack, especially if your Tor client has > B chosen one or more low-bandwidth (and therefore relatively unpopular) > B guard nodes. > > > An attacker who monitors the TLS connection from you to your guard node > and the Tor circuit at your middle node may later gain access to logs > kept by the server you are accessing, match the IP address and times of > connections to the server with the times at which you opened TCP > connections through the Tor circuit, and thereby determine what > requests you sent to the server. > > >> What recourse do we have? Can someone more knowledgeable shed more light >> on this? > > There are several torrc options that you can set if you are afraid of > certain relays -- ExcludeNodes, ExcludeExitNodes, StrictNodes, > StrictExitNodes, NodeFamily, and perhaps others. B ExcludeExitNodes may > be useful if you find that an exit node is misbehaving and is not yet > flagged as a BadExit. B I strongly recommend that you DO NOT set any of > these directives, with the possible exception of ExcludeExitNodes, if > you are *very* certain that a particular exit node is actively > malicious. > > All of the above options will change the probability distribution from > which your Tor client chooses circuits. B If you blacklist a few > low-bandwidth relays, you probably won't change the distribution > noticeably, but you won't improve your security noticeably, either. B If > you blacklist one or more of the major families of high-bandwidth Tor > relays and/or exits, you will change the distribution quite noticeably, > and you will make yourself quite distinguishable from normal Tor users. > > The most obvious way in which choosing circuits from an unusual > probability distribution can hurt you is through the distribution from > which you choose exit nodes. B An adversary can capture and examine a > particularly sensitive server's logs, notice that someone is accessing > it only through relatively low-probability Tor exits, and then go look > for logs from less sensitive servers to which you might have given > information that readily identifies you. B If the adversary knows that > someone is posting information they want to suppress to a blog or forum > through low-probability Tor exits, and then finds that Fred Foobar > routinely accesses a shopping site through the same low-probability Tor > exits, Fred Foobar is in trouble. > > There is another, somewhat less obvious way in which choosing circuits > from an unusual distribution can hurt you -- if you routinely download > large files from an adversary-monitored server through high-bandwidth > exit nodes, but low-probability, low-bandwidth middle nodes, the > adversary may be able to detect this fact from the server alone, and > use it to link your connections together. > > I assume that choosing circuits from an unusual distribution can allow > other attacks as well. B In general, the Tor developers try to avoid > making different clients' circuit distributions distinguishable, and > would prefer that you not make your Tor client's circuit distribution > distinguishable yourself, even if there is no obvious way that your > particular change will allow an attack on your anonymity. > > >> * Of course, the well-organized attacker would go to the trouble to >> construct names that truly blended in with the Tor namescape - such >> as,"MrSpudRelays, QueenAnnesRevenge, SteveKenpIsMyHero, and so forth." > > The Adversary would like to thank you for providing those names. B They > will be *very* useful. > > > Robert Ransom > *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From buhgalter at averstrading.ru Wed Nov 24 20:30:20 2010 From: buhgalter at averstrading.ru (=?koi8-r?B?8NLPzdnbzMXOztnKINvQyc/OwdY=?=) Date: Thu, 25 Nov 2010 07:30:20 +0300 Subject: =?koi8-r?B?79LHwc7J2sHDydEg0sHCz9TZIPPM1dbC2SDJzsbP0s3Bw8nPzs7PyiDC?= =?koi8-r?B?xdrP0MHTzs/T1MkgKPPp4ikg0NLFxNDSydHUydE=?= Message-ID: <000d01cb8c59$783e06e0$6400a8c0@buhgalter> ------------------------------------------------------------------------- | ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ: |инновационный подход, современные технологии и практические решения |в условиях экономической нестабильности ------------------------------------------------------------------------- 07 Декабря > +7 (495) ЧЧ5ЧО95 \\// 4Ч5_ЧО95 > ПPОГРАММА 1.Актуальность вопроса защиты информации ∙Актуальность проблемы защиты информации. Защита информации как составная часть общей системы безопасности организации (предприятия) ∙Основные понятия, термины и определения в области защиты информации ∙Основные направления защиты информации ∙Законодательная и нормативная база правового регулирования вопросов защиты информации ∙Требования к организации защиты конфиденциальной информации на предприятии (организации) ∙Составные части (основа) системы защиты информации 2.Коммерческая тайна ∙Понятие "коммерческой тайны" в предпринимательской деятельности. Законодательство РФ в области защиты коммерческой тайны ∙Методика составления Перечня сведений, содержащих коммерческую тайну ∙Внутренние нормативные документы, регламентирующие деятельность компании в области защиты коммерческой тайны 3.Угрозы информации. Возможные каналы утечки информации ∙Виды угроз информационной безопасности ∙Определение предмета и объекта защиты. ∙Технические каналы утечки информации. Их классификация. Механизмы образования ∙Организационные, организационно-технические меры и технические средства защиты информации от утечки по техническим каналам ∙ Угрозы несанкционированного доступа (НСД) к информации. Источники угроз. Классификация угроз ∙Возможная тактика использование программных и аппаратных закладных устройств (ЗУ). Уязвимость современных технических средств обработки информации (проводные и беспроводные системы, Интернет, мобильные средства связи и пр) 4.Мероприятия по защите информации. Противодействие промышленному шпионажу. Технические средства защиты информации ∙Формирование организационной структуры системы защиты информации на предприятии Принципы формирования, факторы и критерии принятия решения ∙Технические средства промышленного шпионажа ∙Защита информации от утечки по техническим каналам ∙Меры и средства защиты информации от технических средств ее съема ∙Приборы обнаружения технических средств промышленного шпионажа ∙Общие требования по защите помещений и технических средств ∙Организационные мероприятия по защите информации. Допуск, доступ, учет, хранение ∙Организационно- технические мероприятия защиты информации ∙Человеческий фактор в утечке информации. Превентивные мероприятия по предупреждению возможной утечки защищаемой информации. 5.Методы и средства защиты компьютерных систем ∙Возможные способы утери, искажения, изменения компьютерной информации или получения к ней несанкционированного доступа. ∙Вирусная угроза компьютерной информации. ∙Возможность защиты информации при работе в сети Internet. Межсетевое экранирование. ∙Активный аудит. ∙Основы криптографической защиты информации. Классификация методов криптографического закрытия информации. Шифрование (симметричные криптосистемы и криптосистемы с открытым ключом). Кодирование и сжатие информации. Стеганография. ∙VPN (виртуальная частная сеть). Преимущества организации виртуальных частных сетей на основе Internet. ∙Электронная цифровая подпись. Электронная цифровая подпись как базовый механизм обеспечения юридической силы документа при электронном документообороте. ∙Практические примеры применения криптографических методов защиты информации. 6.Аудит информационной безопасности компании. Политика информационной безопасности ∙Анализ внутренних и внешних угроз информационной безопасности компании. Общие подходы ∙Методика разработки политики информационной безопасности в компании ∙Международные и российские стандарты безопасности информационных систем (ISO 17799, ГОСТ Р ИСО/МЭК 17799-2005) ∙Американская концепция системного подхода к обеспечению защиты конфиденциальной информации (OPSEC Operation Security) 7.Организация работы Службы информационной безопасности (СИБ) предприятия. Практический опыт ∙Процедура создания СИБ на предприятии. Разделение функций между СИБ и IT-подразделением. Место СИБ в структуре предприятия ∙Организация взаимодействия с Руководством и руководителями структурных IT-подразделений компании. Стоимость участия 9853 рублей Вся информация по тел: (Ч95) Ч45.3266 и 7Ч2_9I98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8289 bytes Desc: not available URL: From kellie_zr at jwp.com Thu Nov 25 07:19:12 2010 From: kellie_zr at jwp.com (Dale Kellie) Date: Thu, 25 Nov 2010 08:19:12 -0700 Subject: Amazing increase in thickness of yourPenis, up to 30% with our miracle pills q4b4 In-Reply-To: <105801cb887f$bb757d0e$c04539d9@dal1w43> Message-ID: <4CEE7E70.90910347@jwp.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://galacticlarge.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 853 bytes Desc: not available URL: From 0-y3dlnson at sony.com.vn Wed Nov 24 23:51:42 2010 From: 0-y3dlnson at sony.com.vn (Holiday Luxury_Sale) Date: Thu, 25 Nov 2010 09:51:42 +0200 Subject: Rolex, Breitling, Cartier at Great Prices for the Holidays! Message-ID: <1538334647.JN75QF1D293555@kuxmtgkrla.ohvcvibzsqdlj.info> Click Here to View http://www.judgecountry.com -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 249 bytes Desc: not available URL: From eugen at leitl.org Thu Nov 25 02:46:36 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 25 Nov 2010 11:46:36 +0100 Subject: Active Attacks - Already in Progress? Message-ID: <20101125104636.GG9434@leitl.org> ----- Forwarded message from Theodore Bagwell ----- From eugen at leitl.org Thu Nov 25 02:48:27 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 25 Nov 2010 11:48:27 +0100 Subject: Active Attacks - Already in Progress? Message-ID: <20101125104827.GJ9434@leitl.org> ----- Forwarded message from Damian Johnson ----- From eugen at leitl.org Thu Nov 25 08:49:39 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 25 Nov 2010 17:49:39 +0100 Subject: when Jimmy meets Jimmy Message-ID: <20101125164939.GL9434@leitl.org> http://i.imgur.com/kOB1u.gif -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From j.adrienyx at mycingular.com Thu Nov 25 18:43:01 2010 From: j.adrienyx at mycingular.com (Joannie Adrien) Date: Thu, 25 Nov 2010 19:43:01 -0700 Subject: 80% Discount WatchStore. Save on Watchesfor Men & Women at Great Prices. Brand Name Styles xz8 Message-ID: <4CEF1EB5.E21E3407@mycingular.com> Replica watches On Sale - Best Replica Watches Online Shop We offer a wide selection of cheap replica watches including Rolex, Gucci, Chanel and more. Nobody will even know you are wearing a fake ... Buy Best Quality Replica on our site http://jailpaint.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 599 bytes Desc: not available URL: From briannaserena_qi at lofcom.com Thu Nov 25 20:20:53 2010 From: briannaserena_qi at lofcom.com (Brianna Serena) Date: Thu, 25 Nov 2010 21:20:53 -0700 Subject: Vicodin ES/Brand Watson, Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 g9 In-Reply-To: <1e5101cb8784$753e33a0$41aa4796@uzhhti3> Message-ID: <4CEF35A5.35C449C3@lofcom.com> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://jfudhf.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 787 bytes Desc: not available URL: From 0-ielar at emsenhuber.com.br Thu Nov 25 13:14:37 2010 From: 0-ielar at emsenhuber.com.br (Ultimate-Replica) Date: Thu, 25 Nov 2010 23:14:37 +0200 Subject: Cheap gifts for all family members! Message-ID: <4840094569.YLTMWO65093324@phgonvxlz.wwovzqmtpfztefe.info> Visit Website Here http://su.ly/46e -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 252 bytes Desc: not available URL: From theymos at mm.st Thu Nov 25 21:36:05 2010 From: theymos at mm.st (theymos) Date: Thu, 25 Nov 2010 23:36:05 -0600 Subject: [bitcoin-list] Bitcoin 0.3.17 is released Message-ID: Fixes not mentioned below: - Due to a problem in GetMyExternalIP, it was taking 5-10 extra minutes to connect to the network. - Efficiency in transaction processing while generating has been improved, which will reduce wasted CPU usage, especially for generators using several GPUs/CPUs. Some heavy GPU miners might have found themselves bound by CPU power. 0.3.16 (SVN revision 189) was never officially released. http://www.bitcoin.org/smf/index.php?topic=1946.0 Version 0.3.17 is now available. Changes: - new getwork, thanks m0mchil - added transaction fee setting in UI options menu - free transaction limits - sendtoaddress returns transaction id instead of "sent" - getaccountaddress The UI transaction fee setting was easy since it was still there from 0.1.5 and all I had to do was re-enable it. The accounts-based commands: move, sendfrom and getbalance will be in the next release. We still have some more changes to make first. Downloads: http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.3.17/ ------------------------------------------------------------------------------ Increase Visibility of Your 3D Game App & Earn a Chance To Win $500! Tap into the largest installed PC base & get more eyes on your game by optimizing for Intel(R) Graphics Technology. Get started today with the Intel(R) Software Partner Program. Five $500 cash prizes are up for grabs. http://p.sf.net/sfu/intelisp-dev2dev _______________________________________________ bitcoin-list mailing list bitcoin-list at lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-list ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jerlene.tenamd at jencoprod.com Thu Nov 25 23:03:28 2010 From: jerlene.tenamd at jencoprod.com (Jerlene Tena) Date: Fri, 26 Nov 2010 00:03:28 -0700 Subject: 100% herbal, 100% Natural, 100% Safe, The proven NaturalPenisEnhancement that works! vfx2 In-Reply-To: <4b3101cb8a94$cca31270$d9c27a06@5ds3ul2> Message-ID: <4CEF5BC0.50B7289D@jencoprod.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://enormoustype.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 834 bytes Desc: not available URL: From leen at consolejunkie.net Thu Nov 25 16:00:24 2010 From: leen at consolejunkie.net (Leen Besselink) Date: Fri, 26 Nov 2010 01:00:24 +0100 Subject: Blocking International DNS Message-ID: >> And once you get these things in place you never know where it will end... > That, OTOH, is true. > Actually, we do. Every time a country creates a list, even though you wouldn't expect it from these respectable countries, politicians and policemen with their good intentions, somehow things end up on these lists which should not be every single time. Obviously, these lists are secret because otherwise the bad people can use them as a pointer where to go. So there is no oversight. They do however end up on Wikileaks and then you see that their are lots of other things on these lists. To start with the websites of the people who oppose such lists and political movements (even though the countries are democracies). Or websites like the Pirate Bay, Wikileaks or even Wikipedia. As we all know, these lists don't work anyway. So it does not prevent the people who are looking for this content to get to this content and the people who are performing these acts with these children are not stopped by this. One of the most heard arguments the politicians (or more likely from the lobbyists) is that is it hard to get websites removed or deleted when they are in other countries. Which may sound plausible until you look at what Paypal and the banks can a chief, they get websites removed in a day or 2, mostly hours. Most of the time by just sending an e-mail or picking up the phone. I know people can have really heated discussions about these subjects "think of the kinds", but that does not mean we should not make clear headed decisions in the end. An other often heard argument is, but we should prevent all the other people and especially children from running in to this filth on the Internet. Which is also an interesting argument, because people who share this kind of content do not do this openly, they don't want to be discovered. They don't use misleading advertisement where people might click on to lure them in. As I understand it, they password protect their content or use VPN's and share links by word of mouth. Doesn't matter how you look at it, it is much more effective to go after the people that do this then to argue about or set up these blacklists. Have a nice day, Leen. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From l.reathags at albaad.com Fri Nov 26 02:00:27 2010 From: l.reathags at albaad.com (Luisa Reatha) Date: Fri, 26 Nov 2010 03:00:27 -0700 Subject: WHY buy original? we sell at 8-10% of ORIGINAL PRICE: BvlgariRolexRado, Dior, IWC, Longines & LV + Gucci Bags l840 In-Reply-To: Message-ID: <4CEF853B.4B756D8D@albaad.com> Replica watches On Sale - Best Replica Watches Online Shop We offer a wide selection of cheap replica watches including Rolex, Gucci, Chanel and more. Nobody will even know you are wearing a fake ... Buy Best Quality Replica on our site http://jailpaint.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 601 bytes Desc: not available URL: From arma at mit.edu Fri Nov 26 00:27:40 2010 From: arma at mit.edu (Roger Dingledine) Date: Fri, 26 Nov 2010 03:27:40 -0500 Subject: Tor 0.2.1.27 is released Message-ID: Tor 0.2.1.27 makes relays work with OpenSSL 0.9.8p and 1.0.0.b -- yet another OpenSSL security patch broke its compatibility with Tor. We also took this opportunity to fix several crash bugs, integrate a new directory authority, and update the bundled GeoIP database. If you operate a relay, please upgrade. https://www.torproject.org/download/download Changes in version 0.2.1.27 - 2010-11-23 o Major bugfixes: - Resolve an incompatibility with OpenSSL 0.9.8p and OpenSSL 1.0.0b: No longer set the tlsext_host_name extension on server SSL objects; but continue to set it on client SSL objects. Our goal in setting it was to imitate a browser, not a vhosting server. Fixes bug 2204; bugfix on 0.2.1.1-alpha. - Do not log messages to the controller while shrinking buffer freelists. Doing so would sometimes make the controller connection try to allocate a buffer chunk, which would mess up the internals of the freelist and cause an assertion failure. Fixes bug 1125; fixed by Robert Ransom. Bugfix on 0.2.0.16-alpha. - Learn our external IP address when we're a relay or bridge, even if we set PublishServerDescriptor to 0. Bugfix on 0.2.0.3-alpha, where we introduced bridge relays that don't need to publish to be useful. Fixes bug 2050. - Do even more to reject (and not just ignore) annotations on router descriptors received anywhere but from the cache. Previously we would ignore such annotations at first, but cache them to disk anyway. Bugfix on 0.2.0.8-alpha. Found by piebeer. - When you're using bridges and your network goes away and your bridges get marked as down, recover when you attempt a new socks connection (if the network is back), rather than waiting up to an hour to try fetching new descriptors for your bridges. Bugfix on 0.2.0.3-alpha; fixes bug 1981. o Major features: - Move to the November 2010 Maxmind GeoLite country db (rather than the June 2009 ip-to-country GeoIP db) for our statistics that count how many users relays are seeing from each country. Now we'll have more accurate data, especially for many African countries. o New directory authorities: - Set up maatuska (run by Linus Nordberg) as the eighth v3 directory authority. o Minor bugfixes: - Fix an assertion failure that could occur in directory caches or bridge users when using a very short voting interval on a testing network. Diagnosed by Robert Hogan. Fixes bug 1141; bugfix on 0.2.0.8-alpha. - Enforce multiplicity rules when parsing annotations. Bugfix on 0.2.0.8-alpha. Found by piebeer. - Allow handshaking OR connections to take a full KeepalivePeriod seconds to handshake. Previously, we would close them after IDLE_OR_CONN_TIMEOUT (180) seconds, the same timeout as if they were open. Bugfix on 0.2.1.26; fixes bug 1840. Thanks to mingw-san for analysis help. - When building with --enable-gcc-warnings on OpenBSD, disable warnings in system headers. This makes --enable-gcc-warnings pass on OpenBSD 4.8. o Minor features: - Exit nodes didn't recognize EHOSTUNREACH as a plausible error code, and so sent back END_STREAM_REASON_MISC. Clients now recognize a new stream ending reason for this case: END_STREAM_REASON_NOROUTE. Servers can start sending this code when enough clients recognize it. Bugfix on 0.1.0.1-rc; fixes part of bug 1793. - Build correctly on mingw with more recent versions of OpenSSL 0.9.8. Patch from mingw-san. o Removed files: - Remove the old debian/ directory from the main Tor distribution. The official Tor-for-debian git repository lives at the URL https://git.torproject.org/debian/tor.git - Stop shipping the old doc/website/ directory in the tarball. We changed the website format in late 2010, and what we shipped in 0.2.1.26 really wasn't that useful anyway. ------------------------------------------------------------------------ This is the Tor announcements list. If you want to unsubscribe, send mail to majordomo at seul.org with "unsubscribe or-announce" as your message. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From infonn at zheldor-city.ru Thu Nov 25 19:29:44 2010 From: infonn at zheldor-city.ru (=?koi8-r?B?7s/SzcHUydfOzy3Q0sHXz9fZxSDBy9TZ?=) Date: Fri, 26 Nov 2010 03:29:44 +0000 Subject: =?koi8-r?B?88XL0sXUwdLTy8/FIMTFzM8=?= Message-ID: <000d01cb8d1a$2afe0df0$6400a8c0@infonn> ОРГАНИЗАЦИЯ ДОКУМЕНТООБОРОТА ПРЕДПРИЯТИЯ. ПРАКТИЧЕСКИЕ РЕКОМЕНДАЦИИ По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (495) ЧЧ5/32.66 \\\/// ЧЧ5*3266 29 ноября 2010г. Программа мероприятия 1-й день: Нормативно-правовые акты по делопроизводству. Основные категории документов. Создание Табеля унифицированных форм документов предприятия. Правила оформления документов. Виды бланков. Наиболее распространенные погрешности при разработке фирменных бланков организации. Распорядительные документы Признаки юридической силы документа. Особенности оформления и хранения документов по личному составу. Справочно-информационные документы. Деловое письмо. Рекомендации, которыми не следует пренебрегать. Правила заверения копий документов в организации. Совершенствование делопроизводственных процессов. Контроль исполнения. Составление номенклатуры дел. Формирование и оформление дел. Что должен знать и уметь секретарь при подготовке и передаче дел на архивное хранение Практическая работа с документами. СЕКРЕТАРЬ, ОФИС-МЕНЕДЖЕР, ПОМОЩНИК РУКОВОДИТЕЛЯ: КУЛЬТУРА, ИМИДЖ, ДЕЛОВОЕ ОБЩЕНИЕ И ФУНКЦИИ Тридцатое ноября Программа мероприятия 2-й день: Корпоративная культура: фирменный стиль организации. Имидж секретаря. Международный стандарт. Функциональные обязанности секретаря. Личные и профессиональные качества. Деловое общение: правила этикета при приветствии и представлении. Виды визитных карточек и правила использования. Характерные ошибки в оформлении и использовании. Функции секретаря по организации приема посетителей. "Традиционные" ошибки при приеме деловых партнеров и посетителей. Международные правила дарения и принятия подарков и сувениров. Взаимоотношения с сотрудниками и руководством. Использование психологических дистанций и жестов в деловой обстановке. Культура деловой речи. Правильно ли мы ставим ударения? Телефонные переговоры: забытые истины. Виды приемов. Гастрономический этикет. Стоимость участия 1 дня: 6 200 рублей Стоимость участия за 2 дня: 10 540 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) 4Ч5/З266 **** ЧЧ5-4О*95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3944 bytes Desc: not available URL: From eugen at leitl.org Fri Nov 26 01:31:26 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 26 Nov 2010 10:31:26 +0100 Subject: Blocking International DNS Message-ID: <20101126093126.GQ9434@leitl.org> ----- Forwarded message from Leen Besselink ----- From eugen at leitl.org Fri Nov 26 02:18:24 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 26 Nov 2010 11:18:24 +0100 Subject: [bitcoin-list] Bitcoin 0.3.17 is released Message-ID: <20101126101824.GS9434@leitl.org> ----- Forwarded message from theymos ----- From eugen at leitl.org Fri Nov 26 02:24:23 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 26 Nov 2010 11:24:23 +0100 Subject: Tor 0.2.1.27 is released Message-ID: <20101126102423.GT9434@leitl.org> ----- Forwarded message from Roger Dingledine ----- From ksaunders_xh at hanafos.net Fri Nov 26 03:30:56 2010 From: ksaunders_xh at hanafos.net (Kara Saunders) Date: Fri, 26 Nov 2010 11:30:56 +0000 Subject: DYNV.ob Do You Need Value??? xv In-Reply-To: <7e8201cb8c84$b2652d46$4293b424@hn78yf2> Message-ID: <4CEF9A70.23BA9839@hanafos.net> From: DYNV dotnet Do You Need Value??? DYNV.ob has the Value. DYNV.ob is moving mountains with the grain of a software application and doing it by adding real value to the world every day. Call Your Broker and tell him to get you in DYNV.ob (Dynamic Ventures Corporation) at the best value this stock may ever have.. because it’s going up just like the buildings they design and erect with ecological preservative technology and at record pace, meeting all safety and standard codes. The bonus here is that the banks and old lenders want to hand over foreclosed properties to DYNV at disgusting prices that we would never be able to get. We probably will not hear about it on the news either because it’s too embarrassing for the banks. DYNV may already have a franchise or office in your city, which means look out! DYNV is going up in places every day. One quick look at their profile and you would understand. They are a real business who is here to stay and GROW! Go to the DYNV.net website set up by powerplay2day to learn more and see the power of their technology yourself at http://dynv.net/ Then call your broker while there are still 100’s of percentage points to be made before Christmas!!! In fact... Call your broker and ask him "Do you Need Value too?” You know he'll say ‘YES’ (otherwise it would be him calling you about DYNV) then tell him to get you in before he buys for himself or his firm, because he will want a piece for himself! Remember to go to the website for more info if the press releases don’t convince you it’s worth a few hundred or thousand shares. We'll see you at the top... of the Building! Reference: DYNV listed on the Nasdaq OTC BB Have a great holiday season. Let’s make some big Christmas Money and then let the rest ride, baby! Do You Need Value???? DYNV has the value >From Powerplay2day reference DYNV.ob Be sure to sign up for special reports about this company and future opportunities we find. To be removed from the PowerPlay2Day newsletter list, got to dynv.net and click remove me. Full Disclaimer may also be found at dynv.net website, brought to you by PowerPlay2Day. From v.fernvk at adolfo-toledo.com Fri Nov 26 13:17:57 2010 From: v.fernvk at adolfo-toledo.com (Velma Fern) Date: Fri, 26 Nov 2010 14:17:57 -0700 Subject: Viagra50/100mg - $1.85 |BUY NOW| Visa, MasterCard, eCheck accepted tp7 In-Reply-To: Message-ID: <4CF02405.D113FF9D@adolfo-toledo.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://bargaincapsulesdiscount.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 567 bytes Desc: not available URL: From 0-ares at harrismoran.com Fri Nov 26 04:03:08 2010 From: 0-ares at harrismoran.com (Replica-Rolex) Date: Fri, 26 Nov 2010 15:03:08 +0300 Subject: Tiffany & Co. Jewelry, Rolex, Louis Vuitton, etc ALL HERE! Message-ID: <8585692189.GD6ZSC0J156179@slteiropnvixbtv.wmpghqkxzyeljsl.net> Wouldnt you rather SAVE $$? http://tuaurl.com/775c495 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 260 bytes Desc: not available URL: From terrykerenpb at agrinova.org Fri Nov 26 17:37:14 2010 From: terrykerenpb at agrinova.org (Terry Keren) Date: Fri, 26 Nov 2010 18:37:14 -0700 Subject: 80% Discount WatchStore. Save on Watchesfor Men & Women at Great Prices. Brand Name Styles eqp9 In-Reply-To: <5e1801cb8906$3a1cb90d$0a31416f@fkz78r1> Message-ID: <4CF060CA.CAA022F4@agrinova.org> Replica watches On Sale - Best Replica Watches Online Shop We offer a wide selection of cheap replica watches including Rolex, Gucci, Chanel and more. Nobody will even know you are wearing a fake ... Buy Best Quality Replica on our site http://tipclose.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 606 bytes Desc: not available URL: From buhg at vidoz.ru Fri Nov 26 14:12:16 2010 From: buhg at vidoz.ru (=?koi8-r?B?8M/E0NLB18nNIMLAxNbF1A==?=) Date: Fri, 26 Nov 2010 19:12:16 -0300 Subject: =?koi8-r?B?8M8g98Hbxc3VINrB0NLP09Ug19nT2czBwCDJzsbP0s3Bw8nA?= Message-ID: Тема: Финансовая неопределенность для бюджета предприятия. Способы решений. Практика в компьютерном классе. -------------------------------------------------------------------- Компьютерный класс 3 дня, настоящей практики! С профессионалами своего дела в области бюджетного управления предприятием. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (Ч95) 7.Ч2_9l-98 <<<>>> ЧЧ5*З*9-6.8 Каждому обучающемуся предоставляется компьютер для практической работы на семинаре. В результате обучения Вы увезете с собой лицензионную, полнофункциональную программу, для профессиональной работы в области оптимизации структуры бюджета предприятия. Для получения результатов Вам нужно будет по возвращению на предприятие инсталлировать данную программу на свой компьютер и приступить к работе. Дата проведения занятий: 13-15 Декабря Информация об учебном курсе: * В последствии решений для предприятий! это самое главное распознать и просчитать в условиях плановых задач факторы, которые, дестабилизируют деятельность предприятия, не только в условиях кризиса но и финансовой неопределенности. * Вы не поверите, но за 3 дня занятий Вы получите все ответы на вопросы, которые возникли у Вас и Вашего предприятия. Данной серией семинаров мы занимаемся с 2000г. и обучили уже более 4000 специалистов. * В условиях неопределенности рынка возникает необходимость поиска решений. Мы знаем, как помочь Вам, так как, начиная еще с прошлого века девяносто седьмого года, наша компания разрабатывает пакет программ (интегрирует их с методическими материалами и подготавливает обучающие курсы) для планирования бюджета, анализа текущего, сравнения плана и факта, поиска и принятия решений, отслеживания выполнения намеченных программ. * В итоге обучения на семинаре Вы сможете определить и найти решения по вопросам, которые в условиях кризиса возникают у компаний, а именно: Оборачиваемость капитала его недостаток, как обеспечить покрытие; как распорядиться текущими поступлениями (куда надо тратить, а куда нет); стоит ли привлекать процентные и иные дорогостоящие средства? если да, то минимизировать период использования за счет выделения собственных, то есть оптимизировать оборотные ср-ва. Рассмотрение возможных периодов с повышенными рисками используя многопараметральный экономический анализ для поиска решений; выявление нестабильности денежных средств, определение их дефицита, разработка сценария для ожидаемых трудностей, принятие сценария что следует сокращать а что увеличивать. Обучение методу от обратного для рассмотрения постатейного анализа бюджета, использование метода точки «0» для стабилизации не только затрат но и управление доходами предприятия и ценообразованием; как разработать плановый бюджет максимально приближенный к фактическому проанализировать его и принять за основу в ближайшем периоде. И еще множество других вопросов, на которые Вы услышите ответы. Около 4ОО их будет рассмотрено на семинаре. * В результате обучения, Вы, как профессионал сможете управлять любой формой финансовых отношений. Быть подготовленным к любым неожиданностям. 1 день * Создание первого тестового проекта, используя полученное задание. Знакомство программным комплексом. Изучение и рассмотрение на практике фин. методов, выбор для создаваемого проекта. Использование программ для выполнения полученного задания. Первые шаги в отборе полученных результатов используя фин. контрольные точки. Поэтапное построение проекта и анализ его при помощи выбранного метода. 2 день * Получение отчетов по проекту, знакомство, изучение. Изучение финансового анализа (показатели) практическое применение, рассмотрение в текущей ситуации. Финансовый контролинг для изучения и исправления ошибок в созданном проекте. Поиск ошибок рассмотрение и исправление. Последовательность применение метода. Для фиксирования темы и ее лучшего понимания создание II го проекта при помощи ПО. Созданный проект начинаем анализировать. 3 день * При помощи новых технологий анализа и программы, реструктурируем проекты с новыми параметрами, проводим отбор и проверяет на устойчивость. Описываем все риски, отклонения для проекта, помещаем в виртуальную реальность, получаем результаты, ищем оптимальное решение. Отбор планового проекта, загрузка фактических данных и сравнение проектов. Эмулирование риск-факторов влияющих на бюджет пр. Создание модели управления потоками. Поиск оборотных средств за счет перераспределения потоков. Постатейные отклонения в проекте, оптимизация конечных результатов. Выявления дефицита ден. ср-в и поиск средств на покрытие, создание оптимальной схемы. Решения в управлении с использованием новых полученных результатов. Каждому участнику курсов: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: 1. Специализированная программа-профессиональная разработка фин. проектов! Программный продукт способен не только разрабатывать финансовую документацию на профессиональном уровне, в новой версии реализованы значительные возможности для планирования текущего бюджета предприятий. 2. Программа для построения, развития и управления экономической моделью предприятия. Управления инвестиционными проектами, сравнение план/факт, мониторинг бюджета предприятия в реальном времени. Возможность написания собственных формул, сценария диагностики проекта, перепрограммирование и настройка программы. 3. Программа экспресс подготовки экономического проекта. Позволяет всего за пару часов создать очень приличный проект для принятия решений по глобальным разработкам. 4. Материал методический: печатный для самостоятельной разработки и подготовки экономической документации, бизнес планов, ТЭО, инвестиционных проектов. 5. Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него обучающийся специалист может эффективно разрабатывать свои сценарии финансовых проектов. ------------------------------------------------------------------------- По вопpоcам pегucтаpацuu обpащайтеcь по тел: код: (четыре девять пять) Ч4_5*ЧО_*95 <<>> Ч45_4О95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7913 bytes Desc: not available URL: From margurite.j_neta_cb at kelleroffice.com Fri Nov 26 20:14:38 2010 From: margurite.j_neta_cb at kelleroffice.com (Margurite Neta) Date: Fri, 26 Nov 2010 21:14:38 -0700 Subject: Need The CheapestViagra? Here's the Right Place. OrderViagra For the Best Price u3 In-Reply-To: Message-ID: <4CF085AE.79A33937@kelleroffice.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://tgfj.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 517 bytes Desc: not available URL: From e-post at e-post.ee Fri Nov 26 12:37:14 2010 From: e-post at e-post.ee (=?koi8-r?B?5MzRIMLVyMfBzNTF0sE=?=) Date: Fri, 26 Nov 2010 21:37:14 +0100 Subject: =?koi8-r?B?+sHLz87O2cUg09DP08/C2SDTzsnWxc7JxSDOwczPx8/Xz8ogzsHH0tXa?= =?koi8-r?B?y8k=?= Message-ID: <092761492.39545753068085@e-post.ee> I5 Декабря 2010г. +7 (код Москвы) 792-2l_22 : 7922l.22 Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей За более подробной информацuей обpащайтеcь по тел: \Моск. код/ ЧЧ5ЧО95 или 7922I-22 From 0-0-robert.fedida at omnis.edu Fri Nov 26 17:19:13 2010 From: 0-0-robert.fedida at omnis.edu (Rolex@HALF-OFF) Date: Sat, 27 Nov 2010 04:19:13 +0300 Subject: Own a Rolex without spending more than $100! Message-ID: <0208959646.E6CG56TG526489@brwbokacolndz.wxzrkphrq.ua> Click link to view our selection http://www.itchname.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 259 bytes Desc: not available URL: From 0-ka at 702com.net Sat Nov 27 12:32:11 2010 From: 0-ka at 702com.net (Watches_Jewelry_and_Accessories) Date: Sat, 27 Nov 2010 17:32:11 -0300 Subject: High Class Luxury & Watches starting at $99 Message-ID: <7720401270.T95SQT8U844975@uelkift.vprjv.info> Buy Rolex, Gucci, Etc Here http://holidaysale.judgecountry.com -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 260 bytes Desc: not available URL: From buhgalter at avtoteach.ru Sat Nov 27 04:33:48 2010 From: buhgalter at avtoteach.ru (=?koi8-r?B?IMvByyDOwdDJ08HU2CDCydrOxdMg0MzBzg==?=) Date: Sat, 27 Nov 2010 18:03:48 +0530 Subject: =?koi8-r?B?6M/UydTFINfLzMHE2dfB1NjT0Swgzs8gzsUg0M/Oyc3BxdTFLCDP1MvV?= =?koi8-r?B?xMEg19rR1Ngg09LFxNPU18E/?= Message-ID: <1ABD2C7273BC4682AA7800598C1164B5@INCSATA> Вам нужно обратиться в банк для получения кредита? Получить в Сбербанке микро-кредит? У вас план расходится с фактом? Вам нужно просчитать новый вид деятельности? Хотите вкладываться, но не понимаете, откуда взять средства? Вы Инвестор и нужно понять, как правильно распорядиться Инвестициями? У Вас есть идеи, но нет финансового сценария? Вам просто нужен бизнес-план? ТОГДА ПРЕДЛАГАЕМ ПОСЕТИТЬ ОБУЧАЮЩИЙ КУРС МЕТОДЫ РАЗРАБОТКИ И АНАЛИЗА БИЗНЕС ПЛАНА, ТЭО, ИНВЕСТИЦИОННЫХ ПРОЕКТОВ. Дата проведения: О2-03 Декабря. Информацию можно получить по телефонам: +7 (код Москвы) 44.5*.З2-66 \\// 7922l-22 *Мы Вам преподадим практику, поможем разобраться со сложными вопросами, оснастим специализированной литературой, предоставим методический материал не только в печатном, но и в электронном виде. ---Методический печатный материал (разработанный нашей компанией) Представлен в виде справочного пособия с формулами и финансовыми методами, которые рассматриваются на семинаре. ---Электронная версия (на CD) Включена методика для сбора фактических данных на предприятии (таблицы Ms . Excel ), версия справочного пособия для самостоятельной печати, дополнительные материалы для оформления фин. отчетов. *И еще самое главное! предоставим программу, на которой все это можно осуществить (программа является лицензионной и включена в стоимость семинара). Стоимость 14 999 руб., торопитесь, в следующем сезоне будет дороже. По вопpоcам pегucтаpацuu обpащайтеcь по тел: Московский код; 4Ч-5З.96.8 : 7Ч2-9*1/9*8 From bear at sonic.net Sat Nov 27 18:42:03 2010 From: bear at sonic.net (Ray Dillinger) Date: Sat, 27 Nov 2010 18:42:03 -0800 Subject: [p2p-hackers] p2p-hackers Digest, Vol 51, Issue 8 Message-ID: On Sun, 2010-11-28 at 01:38 +0700, Jirtme Prudent wrote: > Hi! > > Sorry for the off topic (and the stupidity of the question), but could > you briefly explain me what's wrong with the use of UDP? > > Thanks! HTTP is not specified as a UDP protocol and extant browsers don't generally speak UDP. Aside from that, most of the things transmitted by HTTP (coded webpages, client-side programs, and compressed graphics) are prone to catastrophic failure from small errors, and UDP is prone to small errors. UDP does not contain any provision for correction of transmission errors. When a packet is transmitted over the internet, there is a chance that it will be corrupted en route. Electrical noise at a switch, a radio station too near a cable, cosmic rays, etc... these are all things which can cause a bit or byte or word to be different at the recieving end than it was at the transmitting end. TCP/IP is an error-correcting protocol that uses incremental checksums to detect transmission errors, so that the recieving end can say, "wait a minute, could you resend packet number 12?" or something when it realizes that it missed something or got a bad copy of something. This is a good thing because it reduces or eliminates errors, but it introduces roundtrip delays as the sender and receiver negotiate to make sure all the checksums and so on are correct. HTTP is a TCP/IP protocol that introduces several other mechanisms to try to deal with its intensive usage of bandwidth, and one of these was (is) "slow-start." "slow-start" says you don't transmit more than 4 packets before the receiver notifies you about whether the first one was received intact. After the receiver has acknolwedged the first 4 packets, you can assume that it's okay to have 5 packets "in flight" out there. After the receiver has acknowledged the next 5 packets, you can assume that it's okay to have 6 packets "in flight" out there. And so on. This whole thing was an effort not to overrun buffers along the way, not to transmit faster than the receiver could buffer and process the data, and so on. Slow-start was a good thing when it was developed, because at the time network latency was usually a small fraction of transmission time. Waiting for the acknowledgement to arrive usually didn't noticeably delay the transmission of additional packets. But things have changed. The bandwidth of our pipes, the size of our buffers, and the speed of our transmission has gone way up, switching speeds have gone up but have not kept pace, the number of hops on the trip from transmitter to receiver is now one or two jumps longer which eats the gains from faster switching times, and the speed of light has remained obnoxiously constant. So at this point the servers are sending four packets, then twiddling their thumbs for a *LONG* time (relative to the time it takes to transmit them) before the acknowledgement packet gets back and they can send the next packets. Google wants to change slow-start by increasing the initial number of packets to compensate for the increases in buffering capability and pipe length relative to transmission speed. I think this is probably a good idea. Bear _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From renayconcettaay at kai-research.com Sat Nov 27 23:58:40 2010 From: renayconcettaay at kai-research.com (Renay Concetta) Date: Sun, 28 Nov 2010 00:58:40 -0700 Subject: You Have Everything To Gain! 3-4 inches more to yourPenis, 100% MoneyBack Guaranteeed hb In-Reply-To: Message-ID: <4CF20BB0.82BA9A90@kai-research.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://deepsides.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 831 bytes Desc: not available URL: From iang at iang.org Sat Nov 27 15:44:50 2010 From: iang at iang.org (Ian G) Date: Sun, 28 Nov 2010 10:44:50 +1100 Subject: [p2p-hackers] Google cheating on TCP slow start Message-ID: On 27/11/10 9:59 AM, David Barrett wrote: > Interesting article: > > http://blog.benstrong.com/2010/11/google-and-microsoft-cheat-on-slow.html > > I know a lot of people on this list are interested in this topic. But > I'm curious: if all sites were to start adopting *ahem* "alternative" > congestion strategies like this, would would the real-world > ramifications be? Indeed, it seems reasonable to assume that before > long it'll be a standard Apache option to do what Google does. > > Is this the end of the gentleman's internet? Should ISPs detect and > block/throttle this behavior -- essentially punishing (or overriding) > this type of behavior to re-establish normalcy? One could say that, as an emerging force eating away at the web. The problem is a layering one. TCP/IP was a fabulously successful product but is now showing the end-of-life blues. As p2p apps have discovered, the proper software engineering is to bypass the TCP/IP + TLS + HTTP bloat completely and develop a custom UDP security protocol. This is relatively easy to do, and I would argue this results in better performance (at all levels including human coding costs) than trying to improve TCP/IP/S. At some stage, those with browser and server access [0] trying to improve the HTTPS experience are going to realise that what is needed is a complete bypass. They'll hack up a secure datagram mode in the server, and get Chrome or IE to flip across to it by means of some trick in DNS or HTTP headers. Hopefully they'll do it correctly, and eliminate all the pointless negotiation about security policy in TLS. It's all on, all the time. There is only one mode, and it is secure :P One True Cipher Suite! From what I've seen when I've done this, resiliance goes up an order of magnitude, and speed for ordinary stuff doubles [1]. iang [0] yeah, same two players. [1] it wouldn't solve the congestion issue, but nor should it. _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mlisa_op at jmfarms.com Sun Nov 28 10:41:14 2010 From: mlisa_op at jmfarms.com (Madaline Lisa) Date: Sun, 28 Nov 2010 11:41:14 -0700 Subject: |BUY NOW| Viagra50/100mg - $1.85, High Qua1ityMedications + Discount On All Reorders = Best Deal Ever! 6i In-Reply-To: <37b101cb8e1c$417a4228$1d23358e@j0m09z2> Message-ID: <4CF2A24A.BEE82591@jmfarms.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://jgfh.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 555 bytes Desc: not available URL: From eugen at leitl.org Sun Nov 28 04:03:36 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 28 Nov 2010 13:03:36 +0100 Subject: [p2p-hackers] Google cheating on TCP slow start Message-ID: <20101128120336.GE9434@leitl.org> ----- Forwarded message from Ian G ----- From eugen at leitl.org Sun Nov 28 04:03:54 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 28 Nov 2010 13:03:54 +0100 Subject: [p2p-hackers] p2p-hackers Digest, Vol 51, Issue 8 Message-ID: <20101128120354.GF9434@leitl.org> ----- Forwarded message from Ray Dillinger ----- From buhgalter at bongo.rbc.ru Sat Nov 27 20:03:15 2010 From: buhgalter at bongo.rbc.ru (=?koi8-r?B?8M/Ex8/Uz9fLwSDLwcTSz9c=?=) Date: Sun, 28 Nov 2010 14:03:15 +1000 Subject: =?koi8-r?B?8NLPxcvUINrBy8/OwSDPIOvBxNLP18/NIMTFzM/Q0s/J2tfPxNPU18U=?= Message-ID: <000d01cb8eb1$2ebaa2d0$6400a8c0@buhgalter> 6 Декабря 2О1Ог. Тема: Кадровое делопроизводство 2010 г. Проект закона о Кадровом делопроизводстве (495) 7.Ч2_9l_98 ; 742_9I98 Андреева Валентина - консультант-преподаватель, один из лучших специалистов России в области кадрового делопроизводства. Профессор кафедры Трудового права Академии Правосудия при Верховном Суде РФ (Москва), кандидат наук, документовед. Программа мероприятия: 1.Правовые основы документирования деятельности кадровых служб 1.1.Требования к кадровому делопроизводству, предусмотренные ТК РФ, в связи с обязательно-стью документирования работы с персоналом. 1.2.Государственный надзор и контроль за соблюдением законодательства в области докумен-тирования работы с кадрами. Штрафные санкции за нарушение порядка работы с кадровой документацией. 2.Система кадровой документации 2.1.Состав документов кадровой службы. 2.2.Нормативно-методические основы оформления кадровых документов. Унифицированные системы документации, применяемые в процессе документирования работы с персоналом. 2.3.Делегирование полномочий при издании документов. 2.4.Порядок придания документам юридической силы. Типичные ошибки в оформлении докумен-тов, судебная практика. 3.Документирование процедур подбора и отбора персонала 3.1.Проверка документов, предъявляемых при приеме на работу. Определение подлинности до-кументов. 3.2.Письменный отказ в приеме на работу: обязательность составления, правильность оформ-ления, обжалование в суде. 4.Документирование процедур, предшествующих заключению трудового договора. 4.1.Ознакомление с локальными нормативными актами работодателя. 4.2.Документирование процедуры фактического допущения к работе. 5.Документирование трудовых отношений. Виды документов и правила их оформления. 5.1.Оформление приема на работу, обязательные и рекомендательные документы. 5.2.Документы, создаваемые при изменении трудового договора. 5.3.Документирование прекращения трудового договора. Документы-основания для увольнения работников. 6.Ответы на вопросы слушателей и практические рекомендации. Стоимость участия 6 990 руб. За более подробной информацuей обpащайтеcь по тел: (Ч95) 792*2I-2*2 <> 792/2I-2.2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4117 bytes Desc: not available URL: From camera_lumina at hotmail.com Sun Nov 28 14:48:50 2010 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sun, 28 Nov 2010 17:48:50 -0500 Subject: Hooray for Wikileaks, son of Cryptome Message-ID: Hooray. Not sure it'll matter, though. But having the Feds beg Wikileaks not to release the diplomatic cables was a nice touch. John Young mourned the death of crypto and cypherpunks, but here we are precisely in a situation in which a government couldn't bomb or assassinate or otherwise throw some jackbooted tantrum or threat in order to get its' way. It's cute too that, just like "rendition", Assange and Wikileaks operate in a nebulous amalgam of jurisdictions. Is it illegal for them to do what they did? In which country? OK, what about another country and its' mirror sites? And could they shut down the TOR networks and other means by which the info-dumps are received and transmitted? No, this cat is out of the bag. Hopefully Assange is smart enough to have established dead-man protocols, also. What's good for the goose, etc... I'm lovin' it. Tickled pink. Glad to see, however, even the US-ians were smart enough not to get pulled into a Sunni-Shia thing. Iraq was problem enough, but the Iranians wouldn't eaten their lunch. -TD From buhgalter at bestblogers.ru Sun Nov 28 08:31:48 2010 From: buhgalter at bestblogers.ru (=?koi8-r?B?xsnSzcEtz8TOz8TOxdfLwQ==?=) Date: Sun, 28 Nov 2010 19:31:48 +0300 Subject: =?koi8-r?B?4sXaIM/CzsHMyd7LySDJIM/Ezs/EzsXXz8s=?= Message-ID: <1AE103936ADB48A48DE3B54F4963ACCB@microsof5b88c8> Пятнадцатое декабря 2010г. 8 (Ч95) 445-Ч095 \\\/// 7Ч2*9.l-9*8 Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности…); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) – как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (Ч95) 4Ч5.З266 **** 445Ч095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3976 bytes Desc: not available URL: From dorotheamarjoriebj at meridianmt.com Sun Nov 28 18:47:20 2010 From: dorotheamarjoriebj at meridianmt.com (Dorothea Marjorie) Date: Sun, 28 Nov 2010 19:47:20 -0700 Subject: TOP SELLING WATCHES! Rep1icaBrand Watches Promotion! 95% Off retail price, Best quality swiss and japanese Rep1icaWatches iym In-Reply-To: Message-ID: <4CF31438.9E5CE633@meridianmt.com> SwissRep1ica Luxury Watches from $150 Each ** 85% OFF RETAIL SELLING PRICE! ** RolexDaytona RolexExplorer II RolexGMT master II RolexSpecial Collection RolexSubmariner RolexYachtmaster RolexCellini RolexDatejust RolexDaydate Buy Best Quality Rep1icaWatches here http://articulatetime.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 677 bytes Desc: not available URL: From david-sarah at jacaranda.org Sun Nov 28 14:09:36 2010 From: david-sarah at jacaranda.org (David-Sarah Hopwood) Date: Sun, 28 Nov 2010 22:09:36 +0000 Subject: [tahoe-announce] Announcing Tahoe, the Least-Authority File System, v1.8.1 Message-ID: ANNOUNCING Tahoe, the Least-Authority File System, v1.8.1 The Tahoe-LAFS team is pleased to announce the immediate availability of version 1.8.1 of Tahoe-LAFS, an extremely reliable distributed storage system. Get it here: http://tahoe-lafs.org/source/tahoe/trunk/docs/quickstart.html Tahoe-LAFS is the first distributed storage system to offer "provider-independent security" b meaning that not even the operators of your storage servers can read or alter your data without your consent. Here is the one-page explanation of its unique security and fault-tolerance properties: http://tahoe-lafs.org/source/tahoe/trunk/docs/about.html The previous stable release of Tahoe-LAFS was v1.8.0, which was released September 23, 2010 [1]. v1.8.1 is a stable bugfix release correcting a number of minor issues. It also includes a modest performance improvement in downloading, and a fix for a security issue involving HTTP proxies. See the NEWS file [2] for details. WHAT IS IT GOOD FOR? With Tahoe-LAFS, you distribute your filesystem across multiple servers, and even if some of the servers fail or are taken over by an attacker, the entire filesystem continues to work correctly, and continues to preserve your privacy and security. You can easily share specific files and directories with other people. In addition to the core storage system itself, volunteers have built other projects on top of Tahoe-LAFS and have integrated Tahoe-LAFS with existing systems, including Windows, JavaScript, iPhone, Android, Hadoop, Flume, Django, Puppet, bzr, mercurial, perforce, duplicity, TiddlyWiki, and more. See the Related Projects page on the wiki [3]. We believe that strong cryptography, Free and Open Source Software, erasure coding, and principled engineering practices make Tahoe-LAFS safer than RAID, removable drive, tape, on-line backup or cloud storage. This software is developed under test-driven development, and there are no known bugs or security flaws which would compromise confidentiality or data integrity under recommended use. (For all important issues that we are currently aware of please see the known_issues.txt file [4].) COMPATIBILITY This release is compatible with the version 1 series of Tahoe-LAFS. Clients from this release can write files and directories in the format used by clients of all versions back to v1.0 (which was released March 25, 2008). Clients from this release can read files and directories produced by clients of all versions since v1.0. Servers from this release can serve clients of all versions back to v1.0 and clients from this release can use servers of all versions back to v1.0. This is the eleventh release in the version 1 series. This series of Tahoe-LAFS will be actively supported and maintained for the forseeable future, and future versions of Tahoe-LAFS will retain the ability to read and write files compatible with this series. LICENCE You may use this package under the GNU General Public License, version 2 or, at your option, any later version. See the file "COPYING.GPL" [5] for the terms of the GNU General Public License, version 2. You may use this package under the Transitive Grace Period Public Licence, version 1 or, at your option, any later version. (The Transitive Grace Period Public Licence has requirements similar to the GPL except that it allows you to delay for up to twelve months after you redistribute a derived work before releasing the source code of your derived work.) See the file "COPYING.TGPPL.html" [6] for the terms of the Transitive Grace Period Public Licence, version 1. (You may choose to use this package under the terms of either licence, at your option.) INSTALLATION Tahoe-LAFS works on Linux, Mac OS X, Windows, Cygwin, Solaris, *BSD, and probably most other systems. Start with "docs/quickstart.html" [7]. HACKING AND COMMUNITY Please join us on the mailing list [8]. Patches are gratefully accepted -- the RoadMap page [9] shows the next improvements that we plan to make and CREDITS [10] lists the names of people who've contributed to the project. The Dev page [11] contains resources for hackers. SPONSORSHIP Tahoe-LAFS was originally developed by Allmydata, Inc., a provider of commercial backup services. After discontinuing funding of Tahoe-LAFS R&D in early 2009, they continued to provide servers, bandwidth, small personal gifts as tokens of appreciation, and bug reports. Google, Inc. sponsored Tahoe-LAFS development as part of the Google Summer of Code 2010. They awarded four sponsorships to students from around the world to hack on Tahoe-LAFS that summer. Thank you to Allmydata and Google for their generous and public-spirited support. HACK TAHOE-LAFS! If you can find a security flaw in Tahoe-LAFS which is serious enough that we feel compelled to warn our users and issue a fix, then we will award you with a customized t-shirts with your exploit printed on it and add you to the "Hack Tahoe-LAFS Hall Of Fame" [12]. ACKNOWLEDGEMENTS This is the fifth release of Tahoe-LAFS to be created solely as a labor of love by volunteers. Thank you very much to the team of "hackers in the public interest" who make Tahoe-LAFS possible. David-Sarah Hopwood and Zooko Wilcox-O'Hearn on behalf of the Tahoe-LAFS team November 28, 2010 Rainhill, Merseyside, UK and Boulder, Colorado, USA [1] http://tahoe-lafs.org/trac/tahoe/browser/relnotes.txt?rev=4747 [2] http://tahoe-lafs.org/trac/tahoe/browser/NEWS?rev=4854 [3] http://tahoe-lafs.org/trac/tahoe/wiki/RelatedProjects [4] http://tahoe-lafs.org/trac/tahoe/browser/docs/known_issues.txt [5] http://tahoe-lafs.org/trac/tahoe/browser/COPYING.GPL [6] http://tahoe-lafs.org/source/tahoe/trunk/COPYING.TGPPL.html [7] http://tahoe-lafs.org/source/tahoe/trunk/docs/quickstart.html [8] http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev [9] http://tahoe-lafs.org/trac/tahoe/roadmap [10] http://tahoe-lafs.org/trac/tahoe/browser/CREDITS?rev=4797 [11] http://tahoe-lafs.org/trac/tahoe/wiki/Dev [12] http://tahoe-lafs.org/hacktahoelafs/ -- David-Sarah Hopwood b% http://davidsarah.livejournal.com _______________________________________________ tahoe-announce mailing list tahoe-announce at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-announce ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From measl at mfn.org Sun Nov 28 22:07:26 2010 From: measl at mfn.org (J.A. Terranson) Date: Mon, 29 Nov 2010 00:07:26 -0600 (CST) Subject: Starting the bloodless revolutions: run the banks. Message-ID: "We don't pick up weapons to kill people to start the revolution. A revolution is really easy to do these days. What is the system? The system is built on the power of the banks. So it must be destroyed through the banks," he said. http://www.bankrun2010.com/ And http://www.rawstory.com/rs/2010/11/bank-run-corrupt-financial-system/?utm_source=Raw+Story+Daily+Update&utm_campaign=0a2e64fa87-November28Newsletter11_28_2010&utm_medium=email While the idea should be sound, the fact is that the banks *own* the governments now, so they'll just get new bailouts and big bonuses for the executive. If were were actually playing by the rules, the banks that impoded would be dead, and their corpses would be scavenged by others (leaving the burned consumers to either sit there awaiting an endless string of re-runs, or to work hard for appropriate legislation designed to prevent recurrences). But the "rules" went out the window in 1984 (Reagan)... Still, watching this should be amusing. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From jonnie_aracelymr at hershey.com Sun Nov 28 23:15:49 2010 From: jonnie_aracelymr at hershey.com (Jonnie Aracely) Date: Mon, 29 Nov 2010 00:15:49 -0700 Subject: Ambien$2.70, Vicodin ES $4.40, Hydrocodone $4.40, Prescription is NOT Required, Safe, Free Shipping in the USA and Canada tdq In-Reply-To: <922801cb8d54$ff1cf13f$9985e0b3@450vh5w> Message-ID: <4CF35325.66D6A4AD@hershey.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://healthcare-med.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 695 bytes Desc: not available URL: From 0-pedreira at mmso.com.br Sun Nov 28 08:27:16 2010 From: 0-pedreira at mmso.com.br (30% OFF_ROLEX) Date: Mon, 29 Nov 2010 00:27:16 +0800 Subject: Buy Him or Her that Luxury Watch, Handbag, or Jewelry for a Fantastic Price! Message-ID: <4924714218.ZJ62AWSS027173@uzgolryifyfd.obwiroiat.ua> Click Here to View as Webpage http://www.visitpress.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 262 bytes Desc: not available URL: From eugen at leitl.org Sun Nov 28 23:51:38 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 29 Nov 2010 08:51:38 +0100 Subject: [tahoe-announce] Announcing Tahoe, the Least-Authority File System, v1.8.1 Message-ID: <20101129075138.GK9434@leitl.org> ----- Forwarded message from David-Sarah Hopwood ----- From 0-d_to_find_tools at mail.vresp.com Mon Nov 29 01:18:37 2010 From: 0-d_to_find_tools at mail.vresp.com (Must SellAll_Luxury) Date: Mon, 29 Nov 2010 12:18:37 +0300 Subject: Celebrate 2010 with a new Rolex or Cartier Product Message-ID: <0383565794.SIH5GEP0343831@bubskfavplmqhb.gyjstxyr.va> View our webpage Here http://1u.ro/rXZ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 255 bytes Desc: not available URL: From mewmd at dede.ru Mon Nov 29 16:27:56 2010 From: mewmd at dede.ru (=?koi8-r?B?5MzRIN7Fx88gztXWzsEgz8bG28/SzsHRIMvPzdDBzsnR?=) Date: Mon, 29 Nov 2010 12:27:56 -1200 Subject: =?koi8-r?B?89DP08/C2SDNyc7JzcnawcPJySDOwczPx8/PwszP1sXOydEg0yDJ09DP?= =?koi8-r?B?zNjaz9fBzsnFzSDPxsbbz9LO2cggy8/N0MHOyco=?= Message-ID: <000d01cb9025$6f3fe840$6400a8c0@mewmd> Девятого декабря Использование нерезидентных (оффшорных) структур. Максимум возможностей код: (четыре девять пять) 4Ч5*3266 \\// Ч45ЧО95 Цель обучения: Описание способов минимизации налогообложения во ВЭД и защиты активов с использованием международных оффшорных и низконалоговых компаний; рассказать о новых подходах в налоговом планировании, проанализировать возможности использования юрисдикций, которые обычно применяются в России. Краткая программа мероприятия: 1.Что представляет собой нерезидентная (оффшорная и оншорная) компания. Особенности оффшорных компаний. 2.Для чего нужна оффшорная компания: * минимизация налогообложения (как привило, в подобных юрисдикция налогообложение ниже обычного или отсутствует вообще. Разделение: безналоговые и "низконалоговые" юрисдикции); * обеспечение конфиденциальности бенефициара (в большинстве юрисдикций раскрытие информации о выгодо приобретателе предусматривает крайне сложную и длительную процедуру); * "технические" цели (special purpose vehicle): (Подобные компании используются для проектного финансирования и минимизации рисков для холдинга в целом). 3.Основные способы использования (общая характеристика). 4.Выбор юрисдикции. Краткая характеристика часто используемых юрисдикции. Основные критерии, определяющий выбор юрисдикции: (Для чего? В каком регионе?) * безналоговые юрисдикции. * низконалоговые оншорные юрисдикции. * "Пенсионные" оффшоры. 5.Управление и контроль в оффшорной компании. 6.Открытие счетов в банковских организациях. 7.Формы деятельности на территории РФ. 8.Традиционные ошибки в использовании нерезидентных компаний. 9.Ответы на вопросы слушателей и практические рекомендации. Стоимость участия в семинаре 7 080 руб. За более подробной информацuей обpащайтеcь по тел: (код Москвы)*7Ч.291_98 и 4454О53 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3156 bytes Desc: not available URL: From norma_joycelyn_bp at northstate.net Mon Nov 29 12:48:07 2010 From: norma_joycelyn_bp at northstate.net (Norma Joycelyn) Date: Mon, 29 Nov 2010 13:48:07 -0700 Subject: Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- [20101017] 7udc In-Reply-To: Message-ID: <4CF41187.4A298775@northstate.net> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://drugsdelmore34k.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 650 bytes Desc: not available URL: From justin.bull at sohipitmhz.com Mon Nov 29 12:36:39 2010 From: justin.bull at sohipitmhz.com (Justin Bull) Date: Mon, 29 Nov 2010 15:36:39 -0500 Subject: any moment now ... In-Reply-To: References: Message-ID: On Mon, Nov 29, 2010 at 3:01 PM, John Case wrote: > ... and wikileaks will be officially classified as a terrorist > organization. > > I am curious as to how Tor operators will be viewed in all of this ... as > ISPs or as material accomplices ? > I wouldn't be surprised if it didn't take too long before Wikileaks became a very interesting target to the US gov't and her allies. I don't think Tor operators will get too much flak in terms of personality or MO, but this exposure may cause disruptions to the project. From esperanzabelkisys at charitytunes.com Mon Nov 29 15:33:31 2010 From: esperanzabelkisys at charitytunes.com (Esperanza Belkis) Date: Mon, 29 Nov 2010 16:33:31 -0700 Subject: Cheap ViagraPills start fr $1.85, *25mg: 40 pills-$78, *50mg:30 pills-$99, 270 pills-$499, *100mg: 30 pills-$105 yxl In-Reply-To: <8f3201cb8b44$3d61af95$11689851@mw45vt6> Message-ID: <4CF4384B.9860E57A@charitytunes.com> Cheap ViagraPills start fr $1.85 30 pills - $ 78 270 pills - $499 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://bargaincapswellness.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 628 bytes Desc: not available URL: From measl at mfn.org Mon Nov 29 14:48:19 2010 From: measl at mfn.org (J.A. Terranson) Date: Mon, 29 Nov 2010 16:48:19 -0600 (CST) Subject: any moment now ... In-Reply-To: References: Message-ID: On Mon, 29 Nov 2010, John Case wrote: > ... and wikileaks will be officially classified as a terrorist organization. > > I am curious as to how Tor operators will be viewed in all of this ... as ISPs > or as material accomplices ? Likely as a co-conspirator. This way, grand juries (who have zero clue to start with, and even less after the dog and pony show by the prosecutor) its easier to get warrants to go fishing on any domestic Tor participant. Thousands of potential "terrorists" for the price of a single subpoena :-( //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From case at sdf.lonestar.org Mon Nov 29 08:49:37 2010 From: case at sdf.lonestar.org (John Case) Date: Mon, 29 Nov 2010 16:49:37 +0000 (UTC) Subject: Hooray for Wikileaks, boo for Assange In-Reply-To: References: Message-ID: On Sun, 28 Nov 2010, Tyler Durden wrote: > John Young mourned the death of crypto and cypherpunks, but here we are > precisely in a situation in which a government couldn't bomb or assassinate or > otherwise throw some jackbooted tantrum or threat in order to get its' way. > > It's cute too that, just like "rendition", Assange and Wikileaks operate in a > nebulous amalgam of jurisdictions. Is it illegal for them to do what they did? > In which country? OK, what about another country and its' mirror sites? And > could they shut down the TOR networks and other means by which the info-dumps > are received and transmitted? No, this cat is out of the bag. Hopefully > Assange is smart enough to have established dead-man protocols, also. Everything that wikileaks has accomplished could have been done completely anonymously, with the public never having heard the name Assange. If you are optimizing for leaks, you don't put yourself out there. The fact that we know his name shows that he is optimizing for something else. If the government really wanted to shut Assange up, they would give him a record deal or a starring role in a hollywood film. From measl at mfn.org Mon Nov 29 14:56:52 2010 From: measl at mfn.org (J.A. Terranson) Date: Mon, 29 Nov 2010 16:56:52 -0600 (CST) Subject: any moment now ... In-Reply-To: References: Message-ID: On Mon, 29 Nov 2010, Justin Bull wrote: > On Mon, Nov 29, 2010 at 3:01 PM, John Case wrote: > > > ... and wikileaks will be officially classified as a terrorist > > organization. > > > > I am curious as to how Tor operators will be viewed in all of this ... as > > ISPs or as material accomplices ? > > > > I wouldn't be surprised if it didn't take too long before Wikileaks became a > very interesting target to the US gov't and her allies. I don't think Tor > operators will get too much flak in terms of personality or MO, but this > exposure may cause disruptions to the project. Tor has been in LEA (FBI++) sights for a long time now - just as the remailer system was under heavy scrutiny before it. I have zero doubt that the fedz run many nodes. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From measl at mfn.org Mon Nov 29 15:30:46 2010 From: measl at mfn.org (J.A. Terranson) Date: Mon, 29 Nov 2010 17:30:46 -0600 (CST) Subject: any moment now ... In-Reply-To: References: Message-ID: On Mon, 29 Nov 2010, John Case wrote: > On Mon, 29 Nov 2010, J.A. Terranson wrote: > > > > I am curious as to how Tor operators will be viewed in all of this ... as > > > ISPs > > > or as material accomplices ? > > > > Likely as a co-conspirator. This way, grand juries (who have zero clue to > > start with, and even less after the dog and pony show by the prosecutor) > > its easier to get warrants to go fishing on any domestic Tor participant. > > Thousands of potential "terrorists" for the price of a single subpoena :-( > > > Running a Tor node that is easily traceable back to your own real world > identity is, I think, very foolish. > > Unfortunately, the Tor mailing list is full of people running them from their > residential Internet connection or their college dorm room. Agreed. I also know of at least two rather large exit nodes (>3mbps) being run under actual identities. Foolish, but common. It is very unfortunate that many people don't really understand what it is they are undertaking in providing anonymity services. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From measl at mfn.org Mon Nov 29 16:20:20 2010 From: measl at mfn.org (J.A. Terranson) Date: Mon, 29 Nov 2010 18:20:20 -0600 (CST) Subject: any moment now ... In-Reply-To: References: Message-ID: On Mon, 29 Nov 2010, Justin Bull wrote: > On Mon, Nov 29, 2010 at 5:56 PM, J.A. Terranson wrote: > > > Tor has been in LEA (FBI++) sights for a long time now - just as the > > remailer system was under heavy scrutiny before it. I have zero doubt > > that the fedz run many nodes. > > As a beginner in the crypto field, I thought Tor was actually quite secure. > Seeing that is not the case, what is regarded as a safe, anonymous browsing > practise? And, as far as I know, monitoring an exit node only reveals the > destination address, not the sender... Is that really a security issue? Certainly, however, that's not something Tor is really designed to mask - Tor is designed to mask the people requesting services via Tor. While Tor is likely quite secure in most respects, good intelligence does not necessarily require that the content of any request be known: there are many facets to any communication, and things like the existence of a particular target is certainly usable intel. Tor is designed to inhibit a number of attacks, including traffic analysis, but there is *no* absolute guarantee that every possible attack is known, or even just coded for. If your life relies on anonymity services, you will likely be a whole lot more careful than if it's seen as something you "merely provide to others on extra bandwidth". //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From justin.bull at sohipitmhz.com Mon Nov 29 15:45:07 2010 From: justin.bull at sohipitmhz.com (Justin Bull) Date: Mon, 29 Nov 2010 18:45:07 -0500 Subject: any moment now ... In-Reply-To: References: Message-ID: On Mon, Nov 29, 2010 at 5:56 PM, J.A. Terranson wrote: > Tor has been in LEA (FBI++) sights for a long time now - just as the > remailer system was under heavy scrutiny before it. I have zero doubt > that the fedz run many nodes. As a beginner in the crypto field, I thought Tor was actually quite secure. Seeing that is not the case, what is regarded as a safe, anonymous browsing practise? And, as far as I know, monitoring an exit node only reveals the destination address, not the sender... Is that really a security issue? From case at sdf.lonestar.org Mon Nov 29 12:01:50 2010 From: case at sdf.lonestar.org (John Case) Date: Mon, 29 Nov 2010 20:01:50 +0000 (UTC) Subject: any moment now ... Message-ID: ... and wikileaks will be officially classified as a terrorist organization. I am curious as to how Tor operators will be viewed in all of this ... as ISPs or as material accomplices ? From pradit at infonet.com Mon Nov 29 16:53:32 2010 From: pradit at infonet.com (Dzhulija) Date: Mon, 29 Nov 2010 20:53:32 -0400 Subject: Waiting for reply Message-ID: <97cc1c.87c6@adpr.co.uk A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3007 bytes Desc: not available URL: From eugen at leitl.org Mon Nov 29 12:27:27 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 29 Nov 2010 21:27:27 +0100 Subject: any moment now ... In-Reply-To: References: Message-ID: <20101129202727.GR9434@leitl.org> On Mon, Nov 29, 2010 at 08:01:50PM +0000, John Case wrote: > ... and wikileaks will be officially classified as a terrorist > organization. Don't forget these torrent terrorists. Most dangerous people. > I am curious as to how Tor operators will be viewed in all of this ... as > ISPs or as material accomplices ? Someone to harass. Which has been the usual mode of operation, in Southern Germany in regards to exits at least. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From alex at west-tv.ru Mon Nov 29 11:03:28 2010 From: alex at west-tv.ru (=?koi8-r?B?9MXIzsnLwSDCwMTWxdTJ0s/Xwc7J0Q==?=) Date: Mon, 29 Nov 2010 22:03:28 +0300 Subject: =?koi8-r?B?UmU6IO7BINrB0NLP0zog8NLPxsXT08nPzsHM2M7PxV/Gyc7BztPP18/F?= =?koi8-r?B?LiDQzMHOydLP18HOycU=?= Message-ID: <1F6EBA4003C2488792F7AF80232EB814@dell515834d6bb> Все высшие награды собрал данный курс. Спецподготовка за 5 дней чистой практики 1З-17 Декабря 2О1Ог. ТЕМА: От начальных элементов бизнес планирования и инвестиционного проектирования до построения экономической модели предприятия и создания профессиональной документации * Впервые и только участники данной группы получают дополнительный бесплатный квалификационный день занятий, который будет согласован с группой и назначен во время занятий. * Все участники получают купон на бесплатное обновление следующей версии программного комплекса. * И еще сюрприз! Подготовка участников практического семинара будет основана на программном Комплексе с использованием новых технологий плановой деятельности, подробное изложение и понимания различных методов которые необходимо применять и внедрять на предприятии. При помощи телефонного запроса - можно получить более расширенную информацию о мероприятии и заказать дополнительные файлы: * Описание учебного курса (подробное); * Заявку участника. Семинар проходит в компьютерном классе. Каждому участнику – свое рабочее место. Учебный курс ориентирован на: Руководителей компаний, руководящий состав связанный или занимающийся планово-экономической деятельностью, специалистов ориентированных на управление финансами, частных предпринимателей, собственников, инвесторов, руководителей и менеджеров кредитных организаций, специалистов органов государственного управления. Специалистов и ТОП менеджеров, осуществляющих принятие решений, по краткосрочному долгосрочному кредитованию предприятий, инвестированию, поиском партнеров, сотрудников которые занимаются подготовкой внутренней и внешней финансовой документации, руководителей и сотрудников которые занимаются ежедневным планированием деятельности собственного предприятия. Каждому слушателю семинара: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и ПО: 1. Программа для профессиональной разработки документации! Программный продукт способен не только разрабатывать финансовую документацию на профессиональном уровне, в новой версии реализованы значительные возможности для планирования текущего бюджета предприятий. 2. Программный продукт для слияния, сравнения проектов, холдинг, консолидированная отчетность. 3. Программа для построения, развития и управления экономической моделью предприятия. Управления инвестиционными проектами, сравнение план/факт, мониторинг бюджета предприятия в реальном времени. Возможность написания собственных формул, сценария диагностики проекта, перепрограммирование и настройка программы. 4. Программа для построения собственных отчетов, позволяет простыми визуальными средствами решить одну из трудоемких и важных задач - составление отчетности по финансовым проектам. Блок позволяет перенаправить данные, введенные в программном комплексе, в собственный шаблон, подготовленный средствами MS Excel. 5. Программный продукт для разработки текстовой части деловой документации (бизнес планов, ТЭО, инвестиционных проектов и прочих финансовых проектов.) в профессиональном виде. 6. Программа для быстрого динамического построения бизнес планов. (Назначение программы - профессиональная, быстрая, качественная, подготовка финансовых проектов и документации для представления в различные структуры.). 7. Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. 8. На CD диске электронную версию метод. материала для разработки финансовых проектов. 9. Технологии воспроизводства документации и формирования отчетов и презентаций в виде исполнительных программных модулей. Стоимость программ входит в стоимость семинара. Для слушателей будет организован дополнительный бесплатный день обучения не входящий в состав расписания. Каждому участнику семинара Выдается квалификационный с е р т и ф и к а т Компании о прохождении курса обучения по методике "Бюджетирование" и классу семинаров "Бюджетное управление инвестиционными проектами". Список сертифицированных специалистов публикуются на сайте Компании и будут подтверждаться по любому запросу в течение квалификационного периода. Информацию можно получить по телефонам: код: (четыре девять пять) 7Ч2.9l98 <<<>>> 4Ч5-З2/66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5819 bytes Desc: not available URL: From case at sdf.lonestar.org Mon Nov 29 15:18:00 2010 From: case at sdf.lonestar.org (John Case) Date: Mon, 29 Nov 2010 23:18:00 +0000 (UTC) Subject: any moment now ... In-Reply-To: References: Message-ID: On Mon, 29 Nov 2010, J.A. Terranson wrote: >> I am curious as to how Tor operators will be viewed in all of this ... as ISPs >> or as material accomplices ? > > Likely as a co-conspirator. This way, grand juries (who have zero clue to > start with, and even less after the dog and pony show by the prosecutor) > its easier to get warrants to go fishing on any domestic Tor participant. > Thousands of potential "terrorists" for the price of a single subpoena :-( Running a Tor node that is easily traceable back to your own real world identity is, I think, very foolish. Unfortunately, the Tor mailing list is full of people running them from their residential Internet connection or their college dorm room. From gil_hamilton at hotmail.com Mon Nov 29 19:04:43 2010 From: gil_hamilton at hotmail.com (Gil Hamilton) Date: Tue, 30 Nov 2010 03:04:43 +0000 Subject: No subject Message-ID: http://puqubevu.t35.com/FloresPhillips/ Myove ahead with yiour eimt From StealthMonger at nym.mixmin.net Mon Nov 29 19:28:27 2010 From: StealthMonger at nym.mixmin.net (StealthMonger) Date: Tue, 30 Nov 2010 03:28:27 +0000 (GMT) Subject: any moment now ... References: Message-ID: <20101130032827.6382E814C0@fleegle.mixmin.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Justin Bull writes: > As a beginner in the crypto field, I thought Tor was actually quite > secure. Seeing that is not the case, what is regarded as a safe, > anonymous browsing practise? And, as far as I know, monitoring an > exit node only reveals the destination address, not the sender... > Is that really a security issue? If by "secure" you mean that the individual doing the browsing cannot be traced, note that in any low-latency Internet access, packet timing correlations between the parties can easily confirm any suspected linkage. As the Tor documentation itself states, ... for low-latency systems like Tor, end-to-end traffic correlation attacks [8, 21, 31] allow an attacker who can observe both ends of a communication to correlate packet timing and volume, quickly linking the initiator to her destination. http://tor.eff.org/cvs/tor/doc/design-paper/challenges.pdf More difficult to trace is Internet access by email via the remailer network. See my "uinmyn", URL below. -- StealthMonger Long, random latency is part of the price of Internet anonymity. uinmyn: Is this anonymous surfing, or what? http://groups.google.com/group/alt.privacy.anon-server/browse_thread/thread/089c8f2f251c207e?fwc=1 stealthmail: Hide whether you're doing email, or when, or with whom. mailto:stealthsuite at nym.mixmin.net?subject=send%20index.html Key: mailto:stealthsuite at nym.mixmin.net?subject=send%20stealthmonger-key -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.8+ iEYEARECAAYFAkz0SW0ACgkQDkU5rhlDCl5brgCgv4m4G4Z0NhXE76YkwhmrfJYL CKYAniic1yodWVjzAkCL5e4oWoIPzyV1 =Rye4 -----END PGP SIGNATURE----- From sharenkathryne_ha at input.com Tue Nov 30 05:37:57 2010 From: sharenkathryne_ha at input.com (Sharen Kathryne) Date: Tue, 30 Nov 2010 06:37:57 -0700 Subject: Cheap ViagraPills start fr $1.85, *25mg: 40 pills-$78, *50mg:30 pills-$99, 270 pills-$499, *100mg: 30 pills-$105 p0c In-Reply-To: Message-ID: <4CF4FE35.0C14E977@input.com> Cheap ViagraPills start fr $1.85 30 pills - $ 78 270 pills - $499 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://bargaincheappills.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 638 bytes Desc: not available URL: From olympia_revaar at agora.bungi.com Tue Nov 30 08:15:41 2010 From: olympia_revaar at agora.bungi.com (Olympia Reva) Date: Tue, 30 Nov 2010 09:15:41 -0700 Subject: Free Shipping Options - Viagra50/100mg - $1.85 - Free Pills With Every Order = Best Deal Ever! kd In-Reply-To: <9b0e01cb8f49$f08864ae$a68dc077@7shc261> Message-ID: <4CF5232D.C080FD2A@agora.bungi.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://ogfj.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 542 bytes Desc: not available URL: From 0-ye at carnival.com Mon Nov 29 17:00:19 2010 From: 0-ye at carnival.com (Ultimate Replica) Date: Tue, 30 Nov 2010 10:00:19 +0900 Subject: Rolex, Breitling, Louis Vuitton, TIFFANY & Co. Jewlery CLEARANCE SALE! Message-ID: <8712238215.K999A951348251@vnbpj.kojzazkozhid.info> Buy Him or Her a nice new Watch or Jewelry http://judgecountry.com -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 275 bytes Desc: not available URL: From buhg at psk-izh.ru Tue Nov 30 01:16:01 2010 From: buhg at psk-izh.ru (Raquel Ramey) Date: Tue, 30 Nov 2010 12:16:01 +0300 Subject: =?koi8-r?B?7MnL18nEwcPJ0SDGydLN?= Message-ID: ЛИКВИДАЦИЯ ПРЕДПРИЯТИЙ без проверок (Все регионы России) Вариант ликвидации компании, который предлагаем мы - перевод предприятия на наших учредителей с заменой генерального директора на иностранную управляющую компанию, либо на иностранного директора. Перерегистрация ООО - 2 900 рублей Подготовка документов в течение 1 рабочего дня Возможна сдача документов в ГНИ-46 без директора +7(495) 211-17-11 - круглосуточно / без выходных Полный комплекс услуг по регистрации и перерегистрации предприятий Юридический адрес - от 10 000 рублей 1. Регистрация ООО – от 2 900 рублей 2. Регистрация Индивидуального предпринимателя - 1 500 рублей 3. Регистрация ОАО, ЗАО - 15 000 рублей 4. Аккредитация представительств – от 6 000 рублей 5. Регистрация изменений (без внесения изменений в УД) – от 2 900 рублей Регистрация оффшоров Ликвидация ООО и ЗАО Юридические услуги, АРБИТРАЖ +7(495) 211-17-11 - круглосуточно / без выходных ПЕРЕЧЕНЬ ДОКУМЕНТОВ И ИНФОРМАЦИЯ НЕОБХОДИМАЯ ДЛЯ ПЕРЕРЕГИСТРАЦИИ ООО: Предоставить простые (не заверенные) ксерокопии (можно выслать по факсу или электронной почте) - устав + все изменения к ним (если были); - свидетельство о постановке на налоговый учет (ИНН); - справка о присвоении статистических кодов (ОКВЭД); - протоколы (решения) о создании и назначении исполнительных органов (Директора); - паспортные данные участников и директора; -выписка из ЕГРЮЛ (для подготовки документов нам можно предоставить старую, но актуальную выписку, а для заверения Заявления у нотариуса, необходимо предоставить выписку сроком не более месяца v можете получить сами или заказать получение у нас (получение выписки за сутки 1500 рублей) From eugen at leitl.org Tue Nov 30 03:23:07 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 30 Nov 2010 12:23:07 +0100 Subject: any moment now ... In-Reply-To: References: Message-ID: <20101130112307.GU9434@leitl.org> On Mon, Nov 29, 2010 at 11:18:00PM +0000, John Case wrote: > Running a Tor node that is easily traceable back to your own real world > identity is, I think, very foolish. In saner places it's ok. > Unfortunately, the Tor mailing list is full of people running them from > their residential Internet connection or their college dorm room. Shouldn't be a problem, in saner places. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Nov 30 03:24:47 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 30 Nov 2010 12:24:47 +0100 Subject: any moment now ... In-Reply-To: References: Message-ID: <20101130112447.GV9434@leitl.org> On Mon, Nov 29, 2010 at 05:30:46PM -0600, J.A. Terranson wrote: > Agreed. I also know of at least two rather large exit nodes (>3mbps) being Rather large fill up a 100 MBit/s line or a GBit/s line. > run under actual identities. Foolish, but common. It is very unfortunate > that many people don't really understand what it is they are undertaking > in providing anonymity services. I don't get it. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From buhgalter at agricultural-technology.ru Tue Nov 30 11:51:30 2010 From: buhgalter at agricultural-technology.ru (=?koi8-r?B?4c7BzMnaIMbBy9TB?=) Date: Tue, 30 Nov 2010 16:51:30 -0300 Subject: =?koi8-r?B?8NLBy9TJ3sXTy8nKIMvV0tM6IPDF0sXT1NLPxc7JxSDExc7F1s7ZyCDQ?= =?koi8-r?B?z9TPy8/XIMTM0SDQz8nTy8Eg3MbGxcvUydfOz9PUyS4=?= Message-ID: <349DFC22E72A4C3F837DA3BCB84CE1CC@MOF04> ТЕМА: Профессиональное финансовое моделирование бюджета в различных условиях не стабильности рынка, оптимизация Cash Flow, поиск и распределение свободных денежных средств. -------------------------------------------------------------------- Компьютерный класс 3 дня, настоящей практики! С профессионалами своего дела в области бюджетного управления предприятием. Вся информация по тел: +7 Московский код:*4-4.5.З.2--6_6 \\// 4Ч53266 Каждому обучающемуся предоставляется компьютер для практической работы на семинаре. В результате обучения Вы увезете с собой лицензионную, полнофункциональную программу, для профессиональной работы в области оптимизации структуры бюджета предприятия. Для получения результатов Вам нужно будет по возвращению на предприятие инсталлировать данную программу на свой компьютер и приступить к работе. Дата проведения: 13-15 Декабря Краткая информация о семинаре: * В последствии решений для предприятий! это самое главное распознать и просчитать в условиях плановых задач факторы, которые, дестабилизируют деятельность предприятия, не только в условиях кризиса но и финансовой неопределенности. * Вы не поверите, но за 3 дня занятий Вы получите все ответы на вопросы, которые возникли у Вас и Вашего предприятия. Данной серией семинаров мы занимаемся с 2000г. и обучили уже более 4000 специалистов. * В условиях неопределенности рынка возникает необходимость поиска решений. Мы знаем, как помочь Вам, так как, начиная еще с прошлого века девяносто седьмого года, наша компания разрабатывает пакет программ (интегрирует их с методическими материалами и подготавливает обучающие курсы) для планирования бюджета, анализа текущего, сравнения плана и факта, поиска и принятия решений, отслеживания выполнения намеченных программ. * В итоге обучения на семинаре Вы сможете определить и найти решения по вопросам, которые в условиях кризиса возникают у компаний, а именно: Оборачиваемость капитала его недостаток, как обеспечить покрытие; как распорядиться текущими поступлениями (куда надо тратить, а куда нет); стоит ли привлекать процентные и иные дорогостоящие средства? если да, то минимизировать период использования за счет выделения собственных, то есть оптимизировать оборотные ср-ва. Рассмотрение возможных периодов с повышенными рисками используя многопараметральный экономический анализ для поиска решений; выявление нестабильности денежных средств, определение их дефицита, разработка сценария для ожидаемых трудностей, принятие сценария что следует сокращать а что увеличивать. Обучение методу от обратного для рассмотрения постатейного анализа бюджета, использование метода точки «0» для стабилизации не только затрат но и управление доходами предприятия и ценообразованием; как разработать плановый бюджет максимально приближенный к фактическому проанализировать его и принять за основу в ближайшем периоде. И еще множество других вопросов, на которые Вы услышите ответы. Около 4ОО их будет рассмотрено на семинаре. * В результате обучения, Вы, как профессионал сможете управлять любой формой финансовых отношений. Быть подготовленным к любым неожиданностям. 1 день * Создание первого тестового проекта, используя полученное задание. Знакомство программным комплексом. Изучение и рассмотрение на практике фин. методов, выбор для создаваемого проекта. Использование программ для выполнения полученного задания. Первые шаги в отборе полученных результатов используя фин. контрольные точки. Поэтапное построение проекта и анализ его при помощи выбранного метода. 2 день * Получение отчетов по проекту, знакомство, изучение. Изучение финансового анализа (показатели) практическое применение, рассмотрение в текущей ситуации. Финансовый контролинг для изучения и исправления ошибок в созданном проекте. Поиск ошибок рассмотрение и исправление. Последовательность применение метода. Для фиксирования темы и ее лучшего понимания создание II го проекта при помощи ПО. Созданный проект начинаем анализировать. 3 день * При помощи новых технологий анализа и программы, реструктурируем проекты с новыми параметрами, проводим отбор и проверяет на устойчивость. Описываем все риски, отклонения для проекта, помещаем в виртуальную реальность, получаем результаты, ищем оптимальное решение. Отбор планового проекта, загрузка фактических данных и сравнение проектов. Эмулирование риск-факторов влияющих на бюджет пр. Создание модели управления потоками. Поиск оборотных средств за счет перераспределения потоков. Постатейные отклонения в проекте, оптимизация конечных результатов. Выявления дефицита ден. ср-в и поиск средств на покрытие, создание оптимальной схемы. Решения в управлении с использованием новых полученных результатов. Каждому участнику курсов: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: 1. Специализированная программа-профессиональная разработка фин. проектов! Программный продукт способен не только разрабатывать финансовую документацию на профессиональном уровне, в новой версии реализованы значительные возможности для планирования текущего бюджета предприятий. 2. Программа для построения, развития и управления экономической моделью предприятия. Управления инвестиционными проектами, сравнение план/факт, мониторинг бюджета предприятия в реальном времени. Возможность написания собственных формул, сценария диагностики проекта, перепрограммирование и настройка программы. 3. Программа экспресс подготовки экономического проекта. Позволяет всего за пару часов создать очень приличный проект для принятия решений по глобальным разработкам. 4. Материал методический: печатный для самостоятельной разработки и подготовки экономической документации, бизнес планов, ТЭО, инвестиционных проектов. 5. Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него обучающийся специалист может эффективно разрабатывать свои сценарии финансовых проектов. ------------------------------------------------------------------------- Информацию можно получить по телефонам: код: (четыре девять пять) 4Ч5*З9.68 <<>> Ч45*39.68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10245 bytes Desc: not available URL: From 0-jw at cancer.org Tue Nov 30 04:15:40 2010 From: 0-jw at cancer.org (Affordable Holiday-Items) Date: Tue, 30 Nov 2010 17:45:40 +0530 Subject: ~Rolex, Breitling, Cartier~ Luxury Products@50% Off 1-Week Only! Message-ID: <3844022191.2GSY9D9L157081@zlnxncatpqtfe.gjswgauusnfud.com> http://www.itchname.ru http://tuaurl.com/282c2c6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 218 bytes Desc: not available URL: From 0-ls at prymfashion.co.uk Tue Nov 30 19:27:10 2010 From: 0-ls at prymfashion.co.uk (Luxury BLOWOUTSALE) Date: Tue, 30 Nov 2010 19:27:10 -0800 Subject: Holiday Solutions for the entire Family! Message-ID: <5261375384.QH9EL7NP225143@xgjwiinoehtn.fetaecodpuko.info> http://www.judgecountry.com http://www.alertbury.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 221 bytes Desc: not available URL: From case at sdf.lonestar.org Tue Nov 30 12:28:21 2010 From: case at sdf.lonestar.org (John Case) Date: Tue, 30 Nov 2010 20:28:21 +0000 (UTC) Subject: any moment now ... In-Reply-To: <20101130112447.GV9434@leitl.org> References: <20101130112447.GV9434@leitl.org> Message-ID: On Tue, 30 Nov 2010, Eugen Leitl wrote: >> run under actual identities. Foolish, but common. It is very unfortunate >> that many people don't really understand what it is they are undertaking >> in providing anonymity services. > > I don't get it. What they are undertaking is an unpredictable, unlimited future liability. Even without anything interesting, like packet inspection, or state inspection, it's easy to assume that all Internet traffic is logged somewhere - just connection logs and so on - a trivial amount of data to save, and gets more trivial every six months when bigger drives come out. So _today_ your actions might be benign, and tomorrow they might also be benign, but what about next year or next decade or ... When you have a permanent record of all of your transactions in Internet-space, it's just a matter of time before that is mined for something that you never intended, and much like selling stocks short, your risk here is unlimited. Unlike selling stocks short, your risk never expires. Remember - the bolsheviks went back to old storerooms of 30 year old slips of paper, long forgotten, even by the Tsars themselves, and picked through them, page by page, decades later, to find out who to murder. Don't run a Tor node under your own name, or traceable back to yourself with simple traffic analysis, even in "sane" countries. From case at sdf.lonestar.org Tue Nov 30 12:57:31 2010 From: case at sdf.lonestar.org (John Case) Date: Tue, 30 Nov 2010 20:57:31 +0000 (UTC) Subject: any moment now ... In-Reply-To: <20101130204625.GX9434@leitl.org> References: <20101130112447.GV9434@leitl.org> <20101130204625.GX9434@leitl.org> Message-ID: On Tue, 30 Nov 2010, Eugen Leitl wrote: >> Even without anything interesting, like packet inspection, or state >> inspection, it's easy to assume that all Internet traffic is logged >> somewhere - just connection logs and so on - a trivial amount of data to >> save, and gets more trivial every six months when bigger drives come out. >> >> So _today_ your actions might be benign, and tomorrow they might also be >> benign, but what about next year or next decade or ... > > In a society that far gone this only raises the stakes of armed > resistance. Fight or flight are both perfectly preferable to > playing sitting duck, waiting for black vans to pick you up. Look, if running a Tor node anonymously was difficult, this conversation would be interesting. But unning a Tor node anonymously is trivial, so the cost/benefit analysis is pretty parabolic. No cost, all benefit. Unless you're actually part of the project, or a public supporter, etc., there is no reason to have your identity attached to Tor in any way. From eugen at leitl.org Tue Nov 30 12:46:25 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 30 Nov 2010 21:46:25 +0100 Subject: any moment now ... In-Reply-To: References: <20101130112447.GV9434@leitl.org> Message-ID: <20101130204625.GX9434@leitl.org> On Tue, Nov 30, 2010 at 08:28:21PM +0000, John Case wrote: > What they are undertaking is an unpredictable, unlimited future liability. Sure. > Even without anything interesting, like packet inspection, or state > inspection, it's easy to assume that all Internet traffic is logged > somewhere - just connection logs and so on - a trivial amount of data to > save, and gets more trivial every six months when bigger drives come out. > > So _today_ your actions might be benign, and tomorrow they might also be > benign, but what about next year or next decade or ... In a society that far gone this only raises the stakes of armed resistance. Fight or flight are both perfectly preferable to playing sitting duck, waiting for black vans to pick you up. > When you have a permanent record of all of your transactions in > Internet-space, it's just a matter of time before that is mined for > something that you never intended, and much like selling stocks short, > your risk here is unlimited. Unlike selling stocks short, your risk > never expires. > > Remember - the bolsheviks went back to old storerooms of 30 year old > slips of paper, long forgotten, even by the Tsars themselves, and picked > through them, page by page, decades later, to find out who to murder. As some day it may happen that a victim must be found, I've got a little list--I've got a little list Of society offenders who might well be underground, And who never would be missed--who never would be missed! > Don't run a Tor node under your own name, or traceable back to yourself > with simple traffic analysis, even in "sane" countries. We shouldn't be afraid. They should. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From buhg at russiadns.ru Tue Nov 30 10:51:12 2010 From: buhg at russiadns.ru (=?koi8-r?B?8NLB18/X2cUgz9POz9fZIM7BzM/Hz9fZyCDQz9fF0s/L?=) Date: Tue, 30 Nov 2010 21:51:12 +0300 Subject: =?koi8-r?B?8M/S0cTPyyDQ0s/XxcTFzsnRIM7BzM/Hz9fZyCDQ0s/XxdLPyw==?= Message-ID: <1190F78063B4440DAF133BC16907BD96@dell> Налоговые проверки: как их проводят и способы защиты Дата: 9 Декабря 2О1Ог. (код Москвы) 4Ч5-З*9*6/8 **** ЧЧ/53-96_8 Цель обучения: Налоговые проверки: как их проводят и способы защиты. Программа мероприятия: 1.Назначение проверки *-Концепция системы планирования выездных налоговых проверок (Приказ ФНС России от 14.10.2008 № ММ-3-2/467@, приказ ФНС России от 30.05.2007 № ММ-3-06/333@), структура отбора налогоплательщиков для выездной проверки. *-Критерии недобросовестности как условие проведение проверки --автоматический отбор налогоплательщиков, база ЮЛ-КПО; --признаки, выявляемые при регистрации, постановке на учет, деятельности компаний (убыточность, большая доля вычетов, данные росгосстата как основание для назначения проверки и т.п.). *-ДСП критерии планирования проверок (крупнейший налогоплательщик, анализ финансовых показателей, наличие заявление и т.п.). *-Сроки проверки, решение о назначении. 2.Проведение контрольных мероприятий *-Регламент проведения налоговых проверок (анализ нового приказа и Приказ Министерства РФ по налогам и сборам от 18 августа 2003 года № БГ-4-06/23дсп) *-Разъяснения налоговиков по особенностям проверок основных налогов (НДС, НП, ЕСН). *-Основные известные налоговому органу способы минимизации налогов. (Письмо МНС "Способы ведения финансово-хозяйственной деятельности с высоким налоговым риском"). *-Анализ основных действий МВД при проверках (Приказ МВД РФ от 16 марта 2004 г. N 177 "Об утверждении Инструкции о порядке проведения проверок организаций и физических лиц при наличии достаточных данных, указывающих на признаки преступления, связанного с нарушением законодательства Российской Федерации о налогах и сборах"). *-Налоговая тайна, коммерческая тайна и порядок получения допуска к ним. *-Создание филиалов как способ противодействия при проверках. *-Основные элементы проведения контрольных мероприятий (запросы о предоставлении документов, опросы и т.п.). *-Оценка налоговым органов результатов проверки (низкорезультативные проверки и т.п.) 3.Обжалование результатов *-Порядок и перспективы обжалования действий налоговых органов в судебном и внесудебном порядке. *-Значение и перспективы обжалования разъяснений гос. органов. *-Обжалование действий конкретных должностных лиц налогового органа как способ защиты от злоупотреблений со стороны контролирующий органов. *- Анализ наличия "прецедентного" права в РФ и его практическое использование. Обратная сила "прецедентов". *-Анализ сроков проверки/обжалования. Наличие/отсутствие срока давности взыскания недоимки. *-Наличие презумпции "недобросовестности". 4.Универсальные способы защиты от налоговых претензий *-Защита при не проявлении "разумной осмотрительности". Доказывание реальности контрагента, защита от "результатов встречных проверок". Неуплата НДС контрагентом и т.п. *-Обоснование рыночной цены, защита от обвинения в сговоре с контрагентом, применении ст. 40 НК РФ и т.п. *-Основные способы управления рисками (документального подтверждения, метод налоговой "подушки безопасности", метод судебного прецедента и др.). За более подробной информацuей обpащайтеcь по тел: (Ч95) Ч4-539_68 \\\/// 4.Ч*5/3*2..6_6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6937 bytes Desc: not available URL: From atagar1 at gmail.com Tue Nov 30 22:31:21 2010 From: atagar1 at gmail.com (Damian Johnson) Date: Tue, 30 Nov 2010 22:31:21 -0800 Subject: Arm Release 1.4.0 Message-ID: Hi. After over a year it's about time that I announced an arm release so here it is! What's new since August of 2009 [1], you ask? Lots. The project has been under very active development, continuing to add usability improvements to make relay operation nicer and less error prone. If you're really curious what I've been up to this last year then it's all available in the change log [2]. For those unfamiliar, arm is a terminal monitor for Tor relays and, to a growing extent, end users. It provides: * resource usage (bandwidth, cpu, and memory usage) * general relaying information (nickname, fingerprint, flags, or/dir/controlports) * event log with optional regex filtering and deduplication * connections correlated against tor's consensus data (ip, connection types, relay details, etc) * an editor to quickly alter Tor's configuration * torrc configuration file with syntax highlighting and validation and quite a bit more via a curses interface. For screenshots and downloads visit: http://www.atagar.com/arm/ Peter and I are currently working on getting its debs in shape so hopefully this'll soon be available via repositories for Debian and Ubuntu too. RPM builds are available, though I don't have a test system so beware: there be dragons (possibly). If there's any python hackers out there interested in dabbling in a bit of Tor UI development, then I'd love to have some company. Suggestions, bug reports and feedback are also be very welcome. Cheers! -Damian [1] http://archives.seul.org/or/talk/Aug-2009/msg00040.html [2] http://www.atagar.com/arm/log.php *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Nov 30 14:34:58 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 30 Nov 2010 23:34:58 +0100 Subject: any moment now ... In-Reply-To: References: <20101130112447.GV9434@leitl.org> <20101130204625.GX9434@leitl.org> Message-ID: <20101130223458.GY9434@leitl.org> On Tue, Nov 30, 2010 at 08:57:31PM +0000, John Case wrote: > Look, if running a Tor node anonymously was difficult, this conversation > would be interesting. > > But unning a Tor node anonymously is trivial, so the cost/benefit > analysis is pretty parabolic. No cost, all benefit. This is interesting to me personally. How would you run a Tor node anonymously, without breaking the bank? Apart from offshore incorporation or finding a host that takes cash or anonymous prepaid cards it appears not obvious. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From case at sdf.lonestar.org Tue Nov 30 22:27:42 2010 From: case at sdf.lonestar.org (John Case) Date: Wed, 1 Dec 2010 06:27:42 +0000 (UTC) Subject: any moment now ... In-Reply-To: <20101130223458.GY9434@leitl.org> References: <20101130112447.GV9434@leitl.org> <20101130204625.GX9434@leitl.org> <20101130223458.GY9434@leitl.org> Message-ID: Hi Eugen, On Tue, 30 Nov 2010, Eugen Leitl wrote: > On Tue, Nov 30, 2010 at 08:57:31PM +0000, John Case wrote: > >> Look, if running a Tor node anonymously was difficult, this conversation >> would be interesting. >> >> But unning a Tor node anonymously is trivial, so the cost/benefit >> analysis is pretty parabolic. No cost, all benefit. > > This is interesting to me personally. How would you run > a Tor node anonymously, without breaking the bank? > > Apart from offshore incorporation or finding a host that > takes cash or anonymous prepaid cards it appears not obvious. There's a few ways to approach this. First, there are a LOT of co-location/vps/webhost resellers operating in the US, and almost no regulation of them as "ISPs". The big famous ones that do shell hosting and irc and all of that will not work - they are very vigilant about customer validation because they get so much CC fraud. But if you can find a joe-blow VPS reseller or datacenter reseller and call them up like any other vendor, they will bend over backwards to take your money. They're not going to ask for your drivers license or a credit check or anything like that. You can just mail them a postal money order or two and be done with it. Most give you a discount for paying a year in advance, so that's convenient. The other way to approach it is much more convenient, but potentially more risky, and that is to use an assumed name with your own credit card. You will find that most CC auths are done based on the numbers, and not on your actual name. Try it - you can set up a working amazon account with your own CC and a totally bogus name. Since most (all ?) merchants are required by their banks to dispose of the CC information, or never hold it in the first place after authorization, after your transaction they are left with your bogus information (but correct address) and either a hash or the last four of your CC. This is worth considering, since we aren't guarding against "being raided right now", but rather against future data mining ... and if future data mining traces an IP back to an account that had (possibly) the same address as you ... it gets a bit hazy there. The hunt is for a name, and that name is not there. So that's some food for thought - I have it on good authority that all of the above works very well ... and we haven't even gotten to prepaid visa cards, which aren't exactly rocket science to procure and use... From buhg at videodon.ru Tue Nov 30 21:03:47 2010 From: buhg at videodon.ru (Teddy Nieves) Date: Wed, 1 Dec 2010 08:03:47 +0300 Subject: =?koi8-r?B?68HMxc7EwdLO2cUg08XUy8kgzsEg7s/X2cogx8/E?= Message-ID: Типографиям, рекламными агентствам! Готовые календарные сетки для квартальных календарей уже на складе. Большой ассортимент цветов и размеров. Цены от 16 рублей за блок. Доставка по всей России. Телефон: плюс семь 919-932 6077. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 863 bytes Desc: not available URL: