<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7142808</id><updated>2024-10-17T06:12:53.996-03:00</updated><category term="YSTS"/><category term="fun"/><category term="Geek"/><category term="hardware"/><category term="issa"/><category term="evento"/><category term="fotografia"/><category term="seguranca"/><category term="anúncios"/><category term="games"/><category term="tools"/><category term="hack"/><category term="pci"/><category term="windows"/><category term="SciFi"/><category term="StawWars"/><category term="apresentações"/><category term="astronomia"/><category term="ccc"/><category term="criptografia"/><category term="cyberwarfare"/><category term="defcon"/><category term="dieta"/><category term="dns"/><category term="flash"/><category term="free"/><category term="friends"/><category term="gatos"/><category term="hackers"/><category term="hosting"/><category term="humor"/><category term="iphone"/><category term="malware"/><category term="microsoft"/><category term="nerd"/><category term="owasp"/><category term="playstation"/><category term="produtividade"/><category term="programação"/><category term="rubik"/><category term="saúde"/><category term="security lounge"/><category term="software"/><category term="sts"/><category term="tetris"/><category term="tutorial"/><category term="tv"/><category term="twitter"/><category term="videos"/><category term="virtualização"/><category term="web"/><category term="wii"/><category term="xbox"/><title type='text'>Além da Imaginação</title><subtitle type='html'>Ideias, Insights, Links, Viagens e Pensamentos diversos sobre Segurança da Informação e otras cositas mais...</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>216</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7142808.post-8631829733846942668</id><published>2011-01-15T21:42:00.003-02:00</published><updated>2011-01-15T22:08:59.036-02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="security lounge"/><category scheme="http://www.blogger.com/atom/ns#" term="sts"/><title type='text'>Security Lounge</title><content type='html'>Não é novidade que desde 2006, eu, o Luiz Eduardo e o Nelson Murilo fazemos um podcast de segurança da informação chamado&lt;a href=&quot;http://www.naopod.com.br/&quot;&gt; I sh0t the Sheriff&lt;/a&gt;. Graças a esta primeira iniciativa, partimos para a criação de um evento inovador que em maio de 2011 terá a sua quinta edição, o &lt;a href=&quot;http://www.ysts.org/&quot;&gt;You sh0t the Sheriff.&lt;/a&gt; De nossa amizade, surgiu a &lt;a href=&quot;http://www.stsproducoes.com.br/&quot;&gt;STS Produções&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;No meio de 2010 em um bate papo casual entre uma cerveja e outra com meu primo Mario Jun, da produtora de TV &lt;a href=&quot;http://www.imagensdojapao.com.br/&quot;&gt;Imagens do Japão&lt;/a&gt;, começamos a pensar em um programa de televisão para ser transmitido via Internet. O tal do &quot;videocast&quot;.&lt;br /&gt;&lt;br /&gt;Após muitos e-mails e conversas com o Luiz e Nelson, além do Mario Jun, fomos aos poucos chegando a um formato que nos pareceu ideal. Convidamos o amigo e sempre parceiro em nossas iniciativas, André Trindade para participar desta primeira edição. Dois parceiros acreditaram na iniciativa e investiram: A &lt;a href=&quot;http://www.conviso.com.br/&quot;&gt;Conviso IT security&lt;/a&gt; e a &lt;a href=&quot;http://www.tabacarianacional.com.br/&quot;&gt;Tabacaria Nacional&lt;/a&gt;. E contamos é claro, com a produção, edição e direção do Mario Jun e sua equipe do Imagens do Japão, que desde o começo acreditaram e investiram nesta iniciativa.&lt;br /&gt;&lt;br /&gt;Temos um piloto do videocast Security Lounge. Espero que gostem. :)&lt;br /&gt;&lt;br /&gt;&lt;object height=&quot;385&quot; width=&quot;480&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/vLQjxwnyPhI?fs=1&amp;amp;hl=pt_BR&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/vLQjxwnyPhI?fs=1&amp;amp;hl=pt_BR&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;385&quot; width=&quot;480&quot;&gt;&lt;/embed&gt;&lt;/object&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/8631829733846942668/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2011/01/security-lounge.html#comment-form' title='1 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8631829733846942668'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8631829733846942668'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2011/01/security-lounge.html' title='Security Lounge'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-7806719889038832595</id><published>2010-11-02T20:13:00.003-02:00</published><updated>2010-11-02T20:17:52.506-02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="YSTS"/><title type='text'>YSTS V Call for Papers</title><content type='html'>&lt;a style=&quot;&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ2s5vapg7E96KaTAtHMKgLXq2yTKs8e4M840YZNU0-XIINke1g8KxfoZ8HKez5buxve74SEZZywwTqVG169adRgfRyij8HuYj83503brQupwcu5PB_o0zif-Pv3cm5w3ud3HGtg/s1600/stack-of-papers.jpg&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 400px; height: 747px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ2s5vapg7E96KaTAtHMKgLXq2yTKs8e4M840YZNU0-XIINke1g8KxfoZ8HKez5buxve74SEZZywwTqVG169adRgfRyij8HuYj83503brQupwcu5PB_o0zif-Pv3cm5w3ud3HGtg/s1600/stack-of-papers.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;YSTS 5a. Edicao&lt;br /&gt;&lt;br /&gt;Sao Paulo, Brasil&lt;br /&gt;&lt;br /&gt;16 de Maio de 2011&lt;br /&gt;&lt;br /&gt;&lt;/p&gt; &lt;p&gt;INTRODUCAO&lt;br /&gt;&lt;br /&gt;Com o grande sucesso das edicoes anteiores, a 5a. edicao do you Sh0t the Sheriff    ocorrera em 16 de maio de 2011 em Sao Paulo, Brasil.&lt;br /&gt;Esta pode ser uma excelente oportunidade para falar sobre alguma pesquisa   ou projeto interessante que voce esteja trabalhando.&lt;/p&gt; &lt;p&gt;&lt;br /&gt;&lt;br /&gt;SOBRE A CONFERENCIA&lt;br /&gt;&lt;br /&gt;you Sh0t the Sheriff e uma conferencia unica, com duracao de um dia apenas,   focada em palestras sobre temas recentes e interessantes, com os principais   profissionais da comunidade de seguranca no Brasil.&lt;br /&gt;&lt;br /&gt;O foco da conferencia e trazer o que ha de mais atual sobre seguranca   da informacao, combinando profissionais e topicos das mais variadas   areas existentes dentro deste mercado&lt;br /&gt;&lt;br /&gt;yStS e um evento exclusivo, composto em sua maior parte por um publico   convidado. Uma vez que uma palestra seja aceita, o palestrante nao   somente participa do evento, mas apos ter apresentado, recebe tambem&lt;br /&gt;uma moeda exclusiva que sera seu passaporte para entrar em qualquer   outra edicao do evento, enquanto ele existir.&lt;br /&gt;&lt;br /&gt;Tendo em vista o avassalador sucesso das edicoes dos anos anteriores, sim,   nos mantivemos o mesmo e consagrado formato:&lt;br /&gt;&lt;br /&gt;* yStS 5 acontecera em um local secreto, somente revelado semanas antes   da realizacao do evento.&lt;br /&gt;&lt;br /&gt;* O local sera um bar ou algo similar.&lt;br /&gt;&lt;br /&gt;* Ambiente descontraido apropriado para aumentar a rede de relacionamentos   com pessoas ligadas a seguranca da informacao no brasil e no fora.&lt;br /&gt;&lt;br /&gt;* Sendo uma conferencia de apenas um dia, com varias palestras  excelentes, teremos cafe, almoco e open-bar no periodo da tarde.&lt;br /&gt;&lt;/p&gt; &lt;p&gt;&lt;br /&gt;FORMATO DA CONFERENCIA&lt;br /&gt;&lt;br /&gt;Qualquer tema relacionado com seguranca da informacao e&#39; relevante   para a conferencia, porem nao serao aceitas palestras comerciais ou   de produtos.&lt;br /&gt;&lt;br /&gt;Alguns temas relacionados com seguranca da informacao que certamente   temos interesse sao:&lt;br /&gt;&lt;br /&gt;* Sistemas operacionais&lt;br /&gt;* Topicos sobre Gerencia/Gestao e Carreira&lt;br /&gt;* Dispositivos moveis e sistemas embarcados&lt;br /&gt;* Auditoria e controle&lt;br /&gt;* Topicos sobre Redes sociais e mecanismos de busca&lt;br /&gt;* Politicas de seguranca da informacao&lt;br /&gt;* Privacidade&lt;br /&gt;* Problemas com protocolos de rede&lt;br /&gt;* Seguranca do nivel 1 ao 7&lt;br /&gt;* Temas relacionado com redes 802.11 e e Radio Frequencia&lt;br /&gt;* Autenticacao&lt;br /&gt;* Criptografia&lt;br /&gt;* Reposta a incidentes e temas relacionados&lt;br /&gt;* Guerra cibernetica&lt;br /&gt;* Malware&lt;br /&gt;* Botnets&lt;br /&gt;* Programacao segura&lt;br /&gt;* Hacker spaces&lt;br /&gt;* Fuzzing em protocolos ou aplicacoes&lt;br /&gt;* Seguranca fisica&lt;br /&gt;* Virtualizacao&lt;br /&gt;* Seguranca em aplicacoes WEB&lt;br /&gt;* Seguranca em bancos de dados&lt;br /&gt;* Computacao nas nuvens&lt;br /&gt;* Fragilidades em sistemas&lt;br /&gt;* Sistemas criticos e de infrastrutura&lt;br /&gt;* Engenharia social&lt;br /&gt;* Engenharia reversa&lt;br /&gt;* E qualquer outra coisa relacionada com seguranca da informacao que   possa interessar aos participantes do evento.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Nos gostamos de palestras curtas, entao, por favor ao submeter tenha   em mente que tera 30 minutos e nao mais que isso para passar sua mensagem.   Ou se deseja falar rapidamente sobre um projeto recem iniciado ou algo&lt;br /&gt;semelhante pode optar por fazer uma apresentacao de 15 minutos.&lt;br /&gt;&lt;br /&gt;you Sh0t the Sheriff e a conferencia perfeita para lancar seus novos   projetos, acredite, muitas pessoas ja mostraram grandes novidades aqui   antes de apresentar em outras grandes conferencias.&lt;br /&gt;&lt;br /&gt;E sim, nos preferimos topicos novos e interessantes e certamente   palestrantes iniciantes sao mais que bem-vindos.&lt;br /&gt;&lt;br /&gt;Se voce tem um excelente tema para falar, e&#39; tudo que precisa.&lt;br /&gt;&lt;/p&gt; &lt;p&gt;&lt;br /&gt;PRIVILEGIOS AOS PALESTRANTES&lt;br /&gt;(somente para palestras de 30 minutos)&lt;br /&gt;&lt;br /&gt;* RS$ 700,00 para ajuda na cobertura de despesas de viagens a partir do   territorio nacional e fora da grande Sao Paulo.&lt;br /&gt;&lt;br /&gt;* Cafe da manha, almoco e jantar durante a conferencia&lt;br /&gt;&lt;br /&gt;* Festas oficiais de Pre-e-pos-conferencia (e outras nao-oficiais tambem)&lt;br /&gt;&lt;br /&gt;* Auditoria de produtos em tradicionais churrascarias.&lt;br /&gt;&lt;br /&gt;* Acesso a todas as futuras edicoes da conferencia yStS (sim, se voce foi   palestrante em alguma edicao anterior, sua entrada gratuita esta garantida,   so nos pague uma cerveja por isso... esqueca, a bebida no evento e&#39;&lt;br /&gt;de graca.)&lt;br /&gt;&lt;/p&gt; &lt;p&gt;&lt;br /&gt;INFORMACOES SOBRE SUBMISSAO DE ARTIGOS&lt;br /&gt;&lt;br /&gt;Cada submissao devera incluir as seguintes informacoes&lt;br /&gt;&lt;br /&gt;* Nome, titulo, endereco, email e telefone de contato&lt;br /&gt;* Resumo biografico e qualificacoes&lt;br /&gt;* Experiencia como palestrante&lt;br /&gt;* Sumario e abstrato da apresentacao&lt;br /&gt;* Palestra de 30 ou 15 minutos?&lt;br /&gt;* Outros recursos alem de um projetor&lt;br /&gt;* Outras publicacoes ou conferencias onde esse material foi ou sera   publicado/apresentado/submetido.&lt;br /&gt;&lt;/p&gt; &lt;p&gt;&lt;br /&gt;DATAS IMPORTANTES&lt;br /&gt;&lt;br /&gt;Final para submissao - 28 de fevereiro de 2011&lt;br /&gt;Notificacao aos autores - 20 de marco de 2011&lt;br /&gt;Envio do material a ser apresentado - 5 maio de 2011&lt;br /&gt;&lt;br /&gt;Todas as submissoes devem ser envidadas, em formato txt para:&lt;br /&gt;cfp/at/&lt;a href=&quot;http://ysts.org/&quot; target=&quot;_blank&quot;&gt;ysts.org&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;INFORMACOES PARA CONTATO&lt;br /&gt;&lt;br /&gt;Submissao de artigos:        cfp/at/&lt;a href=&quot;http://ysts.org/&quot; target=&quot;_blank&quot;&gt;ysts.org&lt;/a&gt;&lt;br /&gt;informaoes gerais:             b0ard/at/&lt;a href=&quot;http://ysts.org/&quot; target=&quot;_blank&quot;&gt;ysts.org&lt;/a&gt;&lt;br /&gt;informacoes sobre patrocinio:  sponsors/at/&lt;a href=&quot;http://ysts.org/&quot; target=&quot;_blank&quot;&gt;ysts.org&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;INFORMACOES ADICIONAIS&lt;br /&gt;&lt;br /&gt;website &lt;a href=&quot;http://www.ysts.org/&quot; target=&quot;_blank&quot;&gt;www.ysts.org&lt;/a&gt;&lt;br /&gt;canal de video &lt;a href=&quot;http://ysts.blip.tv/&quot; target=&quot;_blank&quot;&gt;http://ysts.blip.tv/&lt;/a&gt;&lt;br /&gt;twitter @ystscon&lt;br /&gt;twitter hashtag oficial #ysts&lt;br /&gt;&lt;br /&gt;Nos vemos por la! &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/7806719889038832595/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2010/11/ysts-v-call-for-papers.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/7806719889038832595'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/7806719889038832595'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2010/11/ysts-v-call-for-papers.html' title='YSTS V Call for Papers'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ2s5vapg7E96KaTAtHMKgLXq2yTKs8e4M840YZNU0-XIINke1g8KxfoZ8HKez5buxve74SEZZywwTqVG169adRgfRyij8HuYj83503brQupwcu5PB_o0zif-Pv3cm5w3ud3HGtg/s72-c/stack-of-papers.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-8512136453815993240</id><published>2010-04-12T21:21:00.003-03:00</published><updated>2010-04-12T21:28:27.497-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="evento"/><category scheme="http://www.blogger.com/atom/ns#" term="YSTS"/><title type='text'>YSTS 4 - Ta chegando</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.ysts.org/images_pc2/Estrela_transp.png&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 206px; height: 208px;&quot; src=&quot;http://www.ysts.org/images_pc2/Estrela_transp.png&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Ok, blog meio morto. Mas de vez em quando, estamos ai...&lt;br /&gt;&lt;br /&gt;Vem ai o YSTS 4. Confira a grade:&lt;br /&gt;&lt;br /&gt;Cloudifornication: Indiscriminate Information Intercourse Involving Internet Infrastructure&lt;br /&gt;&lt;br /&gt;Where and how our data is created, processed, accessed, stored, backed up and destroyed in what are sure to become massively overlaid cloud-based services - and by whom and using whose infrastructure - yields significant concerns related to security, privacy, compliance, and survivability. This presentation discusses how staggering interdependencies and the reliance on both aging technology approaches as well as cloud-on-cloud infrastructure and services exposes flawed assumptions and untested theories as they relate to security, privacy, and confidentiality in the cloud.&lt;br /&gt;Most importantly we will discuss what we should do to prepare for moving to Cloud-based services securely.&lt;br /&gt;&lt;br /&gt;Christofer Hoff, CISSP, CISM, CISA, Director, Cloud &amp;amp; Virtualization Solutions, Cisco Systems&lt;br /&gt;&lt;br /&gt;Chris is Director of Cloud &amp;amp; Virtualization Solutions at Cisco Systems where he focuses on virtualization and cloud computing security spending most of his time interacting with global enterprises and service providers, governments, and the defense and intelligence communities. Previously, he was Unisys Corporation’s Chief Security Architect, served as Crossbeam Systems&#39; chief security strategist, was the CISO and director of enterprise security at WesCorp, a $25 billion financial services company and was founder/CTO of a national security consultancy. Chris specializes in emerging and disruptive innovation and what it means to security, and is technical advisor to the Cloud Security Alliance. Chris blogs at http://www.rationalsurvivability.com/blog&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;----------------------------------------&lt;br /&gt;&lt;br /&gt;Virtualização e Computação Forense&lt;br /&gt;&lt;br /&gt;Virtualização chegou para ficar. Ao passo que cada vez mais empresas aderem à tecnologia, novas perguntas surgem em como seria a relação dos ambientes virtuais e a Computação Forense. Estaríamos criando o ambiente ideal para o crime perfeito ?&lt;br /&gt;&lt;br /&gt;Tony Rodrigues é um profissional certificado CISSP, CFCP e Security+, com 20 anos de experiência em TI e 7 anos em Gestão de Segurança de Informações, tendo liderado várias investigações e perícias. Tony é consultor independente em Segurança de Informações e autor/criador do blog forcomp.blogspot.com, sobre Resposta a Incidentes e Forense Computacional.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;----------------------------------------&lt;br /&gt;&lt;br /&gt;Traceability &lt; Ability to trace&lt;br /&gt;&lt;br /&gt;The vision of this presentation is to show best-practices for traceability, crisis management, streamlined incident handling process, procedures and reporting the vulnerable assets.&lt;br /&gt;The attacks perpetrated nowadays are targeted and sophisticated attacks carried out by organized groups against specific information assets over long periods of time. This kind of environment calls for effective traceability to better detect intrusions, and for detailed logging of information that will be relevant in the case of an information technology security breach.&lt;br /&gt;&lt;br /&gt;Luiz Firmino, 22 years of information technology and information security experience. 10 years at &quot;Serpro - Serviço Federal de Processamento de Dados&quot; Federal Data Processing Service), the largest public information technology service provider in Brazil. The agency works for the Brazilian federal government maintaining computer systems that manage its budget, help it integrate states accounting, track Brazilian imports and exports, and process electronic income tax returns. 7 years at Roche as the Chief of Telecommunication for Brazil and Security Head for Latin America. Roche is an international leading healthcare company. 2 years at Sara Lee as the Chief of Information Security Officer for Sara Lee Brazil and Regional Security Coordinator for Americas. Sara Lee is a global manufacturer and marketer of high-quality, brand-name products for consumers throughout the world. Currently I am working as the Information Security Manager for HSBC Brazil. HSBC is one of the largest banking and financial services organisations in the world.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;----------------------------------------&lt;br /&gt;&lt;br /&gt;Top 5 physical ways into a data center&lt;br /&gt;This speech would go over the top 5 most common ways to breach the physical security of a data center. This information has been gathered by the speaker over the course of his career as a physical penetration tester/red teamer. Topics covered will include social engineering, lock picking, and common construction flaws. Example of how these vulnerabilities were and can be used to attack a data center physically as well as solutions to these issues will also be covered.&lt;br /&gt;&lt;br /&gt;Ryan Jones, Sr. Security Consultant. Ryan has worked in the information security field for over 14 years. His main focus has been on network, application, and physical security assessments and he has worked in these capacities with over 1000+ clients for a variety of business sectors with the primary the emphasis being on the government, banking, and medical industries. His work included testing web applications, network penetration testing, physical penetration testing, physical security assessments and planning, social engineering testing as well as designing information security remediation programs for these clients. He has spoken at at various events and conferences, including the Defcon Skybox talks. He was a cast member and technical producer of the 2007 TV show &quot;Tiger Team&quot; and is also currently the co-host of the security podcast &quot;Exotic Liability.&quot; He is currently a Senior Security Consultant on the Application Security Team of Trustwave&#39;s Spiderlabs.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;----------------------------------------&lt;br /&gt;&lt;br /&gt;SAP and Caipirinha with Pitú&lt;br /&gt;&lt;br /&gt;Falar de SAP dispensa introduções, nesta apresentação abordarei as fases de realização de um Pen Test em ambiente SAP em produção utilizando um framework publico e OpenSource: Sapyto.&lt;br /&gt;Hoje em dia se tem pouco conhecimento da realização de Pen Tests em Business Applications. Testes de segurança em ambiente SAP são necessários tendo em vista que implementações do SAP estão contempladas em projetos longos e complexos onde se tem muito capital da empresa envolvido. Dados de 2008 do FBI afirmam que fraudes financeira causadas por incidentes de segurança resultaram em um prejuízo de aproximadamente U$ 470.000 para empresas americanas e para agravar a situação dados da empresa de consultoria em segurança da informação ONAPSIS, mais de 95% dos ambientes SAP avaliados pela empresas estavam propensos a fraudes financeiras causadas por vulnerabilidades técnicas de segurança da informação e que muitas dessas implementações foram qualificadas com SOX/PCI DSS/ISO por quatro grandes empresas de auditoria.&lt;br /&gt;&lt;br /&gt;A partir de agora fazendo a saborosa caipirinha Sergipana com Pitú conheceremos as fases de um Pen Test em SAP. O Pen Test aqui abordado segue como “metodologia” fases do Sapyto, framework opensource Free) de realização de Pen Test em ambientes SAP. Temos então 4 fases, sendo elas:&lt;br /&gt;&lt;br /&gt;1 – Discovery&lt;br /&gt;2 – Exploration&lt;br /&gt;3 – Vulnerability Assessment&lt;br /&gt;4 – Exploitation&lt;br /&gt;&lt;br /&gt;Joaquim Espinhara, Pesquisador Independente de segurança da informação atua como consultor da SecureInfo Security Solutions. Palestrante em alguns eventos internacionais e em diversos regionais. Palestrante na ultima H2HC 6th Edition) com a apresentação de Sniffing de redes remotas.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;----------------------------------------&lt;br /&gt;&lt;br /&gt;Client-Side Detection Advances&lt;br /&gt;File format and JavaScript-based attacks have become the primary focus of the security landscape over the last several years. These attacks can be sophisticated and difficult to detect at wire speeds by an IPS or IDS. Exploit frameworks, such as Metasploit, Immunity&#39;s CANVAS and Core Impact provide simple mechanisms to achieve this complexity. Complicating this already difficult detection is the desire for many IPS users to have low-latency analysis at wire speed. The processing necessary to address ASCII hex encoding, JavaScript obfuscation, PDF object compression and the myriad of other techniques available to attackers means that normalizing a document to the point where it can be analyzed for malicious data is simply unfeasible in an inline deployment for Snort or any other system.&lt;br /&gt;&lt;br /&gt;The Snort engine is the most flexible and powerful Network Intrusion Detection System available today. By leveraging the extensibility of the engine, end users can build advanced, customized detection that precisely targets the needs of their environment. Alex Kirk will demonstrate the power and flexibility of the engine by unveiling a new multi-faceted, scalable detection methodology targeted at addressing the most difficult detection problems facing security professionals today.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Alex Kirk, AEGIS (Awareness, Education, Guidance, and Intelligence Sharing) Program Lead. Alex Kirk is a senior researcher with the Sourcefire Vulnerability Research Team (VRT), and the head of that group&#39;s Awareness, Education, Guidance, and Intelligence Sharing (AEGIS) program, which is designed to increase direct collaboration between Sourcefire customers, the Snort user community, and the VRT in the interests of improved detection and coverage. In his 6 years with the VRT, Alex has become one of the world&#39;s leading experts on Snort rules, and has honed skills in reverse engineering, network traffic analysis, and systems security. He recently contributed a pair of Snort-related chapters to &quot;Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century,&quot; and is a regular contributor to the widely-read VRT blog (http://vrt-sourcefire.blogspot.com/). Outside of Sourcefire, Alex has contributed to the open source community through efforts such as scrubbing entries for OSVDB and writing documentation for running the NetBSD operating system on the Sega Dreamcast.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;----------------------------------------&lt;br /&gt;&lt;br /&gt;Global Security Report 2010&lt;br /&gt;&lt;br /&gt;From January 1, 2009 to December 31, 2009, we performed approximately 2000* penetration tests (network, application, wireless, and physical) for organizations ranging from the largest companies on the planet to nimble start-ups. In addition, we also performed around 200* security incident and compromise investigations for organizations located in nearly 20 different countries around the world.&lt;br /&gt;&lt;br /&gt;The data we have gathered from these engagements is substantial and comprehensive. This presentation will be the first viewing of the results of the analysis of the data gathered during 2009. The results will be presented both technical and business impact analysis with an emphasis on technical for the Black Hat audience.&lt;br /&gt;&lt;br /&gt;This presentation will coincide with the release of the paper with the same title. The paper will be released after the conclusion of the talk.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Nicholas J. Percoco is Senior Vice President of SpiderLabs at Trustwave. He has more than 14 years of information security experience. In his role at Trustwave, he leads SpiderLabs, the team that has performed more than 500 computer incident response and forensic investigations globally, as well as thousands of penetration and application security tests for clients. Nicholas acts as the lead security adviser to many of Trustwave’s premier clients by assisting them in making strategic decisions around various security compliance regimes. As a speaker, he has provided unique insight around security breaches and trends to public (YSTS, DEFCON, SecTor, etc.) and private audiences throughout North America, South America, Europe, and Asia. Prior to Trustwave, Nicholas ran security consulting practices at both VeriSign and Internet Security Systems. Nicholas hold a Bachelor of Science in Computer Science from Illinois State University.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;----------------------------------------&lt;br /&gt;&lt;br /&gt;Exploits and Mitigations - EMET (enhanced mitigation evaluation toolkit)&lt;br /&gt;&lt;br /&gt;Andrew Cushman, Senior Director, TwC Security - Microsoft Corp. As Sr. Director of Strategy in the Trustworthy Computing Group at Microsoft Corp. Cushman&#39;s primary focus is on End to End Trust - Microsoft&#39;s initiative for a safer, more trusted Internet, which aims to bring the trustworthiness of the physical world to the cyber world. Cushman is responsible for End to End Trust Outreach and works with teams across Microsoft and the broader security ecosystem.&lt;br /&gt;Cushman previously managed the Microsoft Security Response Center (MSRC). The MSRC leads emergency response to security threats, defines and enforces response policies, and monitors monthly update quality and timeliness. Cushman expanded the MSRC&#39;s outreach programs to cover security researchers as well as mainstream security organizations, companies and computer emergency response teams.&lt;br /&gt;Cushman joined the TwC Security team in 2004 as a member of the Security Engineering Group executive leadership team that made security processes an integral part of Microsoft’s engineering culture. Since then he has been a driving force behind the company’s security researcher outreach strategy and execution efforts, formulating the Responsible Disclosure Initiative strategy and initiating the BlueHat security conference franchise.&lt;br /&gt;Since joining Microsoft in January 1990, Cushman has held positions on the Microsoft International Product Group, the Microsoft Money team and the Internet Information Services (IIS) team. He led the IIS product team during the development of IIS 6.0 in Windows Server® 2003. IIS 6.0 was one of the first Microsoft products to fully adopt the security engineering processes that are today embodied in the SDL and remains a “poster child” of Microsoft’s commitment to security engineering and Trustworthy Computing.&lt;br /&gt;Cushman earned a bachelor’s degree in international studies from the University of Washington and a master of international business degree from Seattle University. Away from work, he is an avid skier.&lt;br /&gt;&lt;br /&gt;----------------------------------------&lt;br /&gt;&lt;br /&gt;Infosec Arena&lt;br /&gt;&lt;br /&gt;Anchises Moraes Guimarães de Paula, CISSP, works as Global Threat Intelligence Analyst at iDefense, a VeriSign company. He has almost 15 years of strong experience in Computer Security, and he had been worked as Security Officer in Brazilian telecom companies (Americel and Vivo) and also Security Consultant on local resellers and consulting firms. He has a Computer Science Bachelor degree from Universidade de Sao Paulo (USP) and a master degree in Marketing from ESPM and is CISSP, GIAC (Cutting Edge Hacking Techniques) and ITIL Foundations certified.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;----------------------------------------</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/8512136453815993240/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2010/04/ysts-4-ta-chegando.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8512136453815993240'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8512136453815993240'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2010/04/ysts-4-ta-chegando.html' title='YSTS 4 - Ta chegando'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-5547671402186723961</id><published>2009-12-04T15:19:00.002-02:00</published><updated>2009-12-04T15:32:42.051-02:00</updated><title type='text'>Defcon para leigos</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi357GXuSMmCZke0oc_sHnF5YhvFQmpBla9dbKtYioy6gAZ3mHA9gGRCGOfvdZ9MbM69Xq8XhBQOq18suTygwD6folf9PF6KK-PmmfefjLlTX0MVhu-IU8xrBQqeB6aHlQC3KVn/s640/Imagem%20247.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 640px; height: 480px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi357GXuSMmCZke0oc_sHnF5YhvFQmpBla9dbKtYioy6gAZ3mHA9gGRCGOfvdZ9MbM69Xq8XhBQOq18suTygwD6folf9PF6KK-PmmfefjLlTX0MVhu-IU8xrBQqeB6aHlQC3KVn/s640/Imagem%20247.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Ok, você já sabe o que é a &lt;a href=&quot;http://www.defcon.org/&quot;&gt;Defcon&lt;/a&gt;, cansou de ler mensagens em listas e ouvir relatos de brasileiros que já foram para lá e voltaram falando que é uma experiência bacana. Chegou a sua vez. Este artigo irá ajudá-lo com dicas da conferência e da cidade que a hospeda, Las Vegas.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Planejando sua viagem.&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;A Defcon ocorre todos os anos em um fim de semana próximo ao final de julho e início de agosto.  Desde 2009, ela se inicia na quinta (anteriormente era na sexta) e termina no domingo. Procure chegar no dia anterior, para ter algum tempo para descansar da viagem e se aclimatar com a agradável temperatura de Las Vegas no verão. Algo entre 27 graus (de madrugada) a 45 graus (na maior parte do dia). Sim, é quente pacas. E seco. Traga seu rinossoro.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Existem várias opções de vôos do Brasil para Las Vegas. Partindo de São Paulo, há opções da American Airlines, United, Continental, Delta e outras. Os vôos sempre têm uma conexão, que é onde efetivamente você entra nos Estados Unidos, faz a imigração, pega suas bagagens que eventualmente são vistoriadas para em seguida despachá-las novamente ao destino (Vegas). Somente na entrada isso é necessário. Na volta as malas vão direto de Las Vegas ao seu destino final. Falando em malas, quando você compra um vôo internacional, tem direito a despachar duas malas com até 32 kg cada. Se passar disso, paga uma taxa adicional, por volta de US$ 100,00.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Há conexões em Miami, Chicago, Dallas, Nova York e outras. Em média, um vôo São Paulo – Miami dura cerca de 8 horas, e o vôo Miami-Las Vegas, cerca de 4 horas e meia. Compre um vôo em que você tenha um intervalo razoável entre chegar no seu ponto de entrada (nesse caso, Miami) e sair para o destino final. Como eu citei no parágrafo anterior, você terá que fazer a imigração, pegar sua mala, despachá-la. Há também o risco do vôo atrasar. Vale a pena ter um intervalo maior e passear um pouco em Miami (se não quiser ficar esperando no aeroporto) do que perder o voo de conexão.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Comprando suas passagens com antecedência, é possível encontrar valores próximos a US$ 650,00, ida e volta São Paulo – Las Vegas.  Consulte seu agente de viagens, ou sites como www.decolar.com.br para encontrar as melhores tarifas. Lembre-se: quanto antes comprar, mais barato fica e mais opções de escolha.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;A mesma regra vale para a reserva de hoteis. Consulte os sites &lt;a href=&quot;http://www.hotels.com/&quot;&gt;www.hotels.com&lt;/a&gt; e &lt;a href=&quot;http://www.vegas.com/&quot;&gt;www.vegas.com&lt;/a&gt; para encontrar as melhores tarifas para hoteis em Las Vegas.&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Ok, mas Las Vegas tem centenas de hoteis. Onde eu devo ficar ?&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Antes de responder, vamos conhecer brevemente Las Vegas em alguns parágrafos. Eu já disse que lá é quente ? Não se esqueça disso. É quente mesmo. E seco.&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Há uma rua lá chamada “Las Vegas Boulevard”, conhecida também como “The Strip”. É isso que você vê na maioria dos filmes que se passam em Las Vegas. Tem aquele monte de Cassinos gigantes, luzes e mais luzes. De fato, é a principal avenida de Las Vegas e você pode passar vários dias nela, assitindo shows, indo a parques de diversões dentro dos hoteis (todos os cassinos lá são hoteis) , vendo atrações, fazendo compras e é claro, jogando. Basta você ter muito dinheiro. Caso você seja pobre como eu, tem bastante coisa grátis, como as fontes do Bellagio, o vulcão do Treasure Island, os tigres brancos do Mirage, Leões do MGM, etc. Prepare sua máquina fotográfica, tem muita coisa legal para registrar.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Saindo da Strip,  há a região central, chamada Freemont, onde há cassinos mais antigos e um gigantesco painel luminoso que cobre a rua. Vale a visita.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Nas ruas paralelas ou transversais a Strip também há bastante comércio, cassinos e opções de hotéis.  Use o Google Earth ou maps para uma vista geral de Las Vegas.&lt;br /&gt;Mas voltando aos hoteis, sua decisão de onde ficar depende de sua decisão relacionada a locomoção.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Pessoalmente, recomendaria que você alugasse um carro. As tarifas de Las Vegas são em geral menores que outros lugares, como Miami, por exemplo. Um carro medio (que nos Estados Unidos equivale a algo grande por aqui) custa cerca de US$ 110,00 por dia, incluindo todos os seguros e GPS. Sim, faça o seguro total. Não é uma boa ideia não ter seguro se alguma coisa acontecer nos EUA. Ah, tem estacionamento em todos os lugares, sem custos. Lembre-se que voe pode estacionar e levar a chave ou deixar em um serviço de vallet. Basta dar um Tip ao manobrista depois. Consulte www.carrentals.com para descobrir qual locadora de veículos tem o melhor preço. Faça sua reserva com antecedência. Dica: A reserva não inclui os custos do seguro e outros opcionais como GPS. Considere uns US$ 60 a mais na sua diária para estes extras. Após reservar, verifique periodicamente se não há taxas melhores ou promoções para upgrade do veículo. Os preços variam diariamente.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Optando por ter um carro, suas opções de hotel não se limitam a proximidade do Riviera, onde a Defcon ocorre. E mesmo que você escolha um hotel próximo, como o Circus Circus, que fica em frente ao Riviera, não significa que você não terá que andar. Na prática, se você ficar no Circus Circus, que é o hotel mais próximo, terá que andar, do seu quarto até o Riviera, uns 300 a 500 metros. Lembra que é quente, né ? O Circus Circus custa cerca de US$ 40,00 por dia.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Já com o carro, é possível escolher hotéis um pouco mais afastados, com preços que variam de US$ 15,00 a US$ 40,00 por dia. Este é o preço do quarto, para até duas pessoas.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Com um pouco mais de dinheiro (e o carro), opções como o Stratosphere (US$ 45,00), Luxor (US$ 75,00), Hilton (US$ 82,00), são interessantes. Estes preços são aproximados, lembre-se de reservar com alguma antecedência para melhores taxas.  E é claro, você pode ficar no próprio Riviera, porém, lembre-se que ele lota rápido.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Vegas e proximidades&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Ok, você já tem sua passagem, seu carro e seu hotel. O que mais falta ? Bem, além da Defcon, há algumas coisas interessantes para se fazer em Vegas e pode ser uma boa ideia, se seu tempo e orçamento permitir, chegar alguns dias antes ou ir embora alguns dias depois. Como eu já citei, se é sua primeira vez, andar (a pé e a noite) pela Strip e visitar os cassinos é sempre interessante. Uma ou duas noites é suficiente para uma exploração do local. Uma noite na Freemont também é uma boa ideia.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Há diversos shows, como Cirque du Soleil, Blue Man Group, Mágicos, Comediantes, etc. Mais uma vez, procure adquirir seus ingressos com antecendencia. O site www.vegas.com pode lhe ajudar.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Nas proximidades de Vegas, a cerca de 30 milhas está o Hoover Dan, que é aquela represa e usina hidra-elétrica no rio Colorado. Dá para pagar por uma visita que inclui as instalações ou só passar por cima e tirar fotos de concreto e um lago. Sim, é legal, mas só um pouco. Seguindo por essa mesma estrada (93/95), mais umas 50 milhas e você chega em Kingman, de onde pode pegar a Route 66. Este é um passeio muito interessante, histórico e cheio de referências nostálgicas, como motéis, lojas e lanchonetes que parecem ter parado no tempo. A estrada é boa e feita para andar devagar (55 milhas por hora), curtindo a viagem. De Kingman, siga para Hackberry e pare em um antigo posto de gasolina, do lado esquerdo. Paraiso para fotografos. Continue em frente até Peach Springs e depois Seligman onde você pode  comer um hambuger na simpática lanchonete chamada “Cheeseburger with cheese”. Aproveite para visitar as lojinhas de souvenirs e tirar fotos dos carros e construções por lá. Converse com os locais, eles adoram os poucos turistas que ainda passam por lá.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Em Seligman você pode continuar na 66, continuar mais 100 milhas até o Grand Canyon, ou voltar, pela própria 66 ou pela I-40, até Kingman e de lá pela 95 até Las Vegas.  A paisagem de deserto desse trecho da 66 é difícil de descrever. Muito bonita e hipnotizante. Inicio da manhã e fim de tarde fazem contrastes mais acentuados com as montanhas ao fundo.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Tenha o cuidado de ver antes no Google Maps ou semelhante onde estão os postos de gasolina que ainda funcionam. Lembre-se, é deserto e passa pouca gente por ai. Celular não pega longe das cidades. Leve água e respeite o limite de velocidade se não quiser ser perseguido pela polícia local.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;De volta a Las Vegas, é hora daquela cervejinha. Custa por volta de US$ 5,00, em média. Tem dois bares que recomendo: O bar central do cassino Hard Rock, sempre cheio de gente jovem e bonita e um local chamado Carnival, que fica ao lado do Cassino Imperial, na Strip (quase em frente ao Caesar Palace). Se você for à próxima Defcon e estas dicas lhe foram úteis, aproveite para pagar uma cerveja pra mim em um desses locais.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Agora, se você quer economizar e dar uma calibrada antes de sair, passe em um Wal-Mart e compre um pack, já gelado de 30 Buds por cerca de US$ 15,00. Não beba dentro do carro, mesmo se voce for passageiro. A polícia de lá para e prende todo mundo. Alguns hoteis possuem frigobar.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Falando em Wal-Mart, como um velho amigo meu diz, é o local ideal para você comprar aquele pack de 2000 cotonetes que está em oferta.  Normalmente você entra para comprar algo que precisa (a cerveja, por exemplo) e acaba saindo de lá com um monte de coisa legal que aqui no Brasil custa caro. Coisas do American Way of life. Batatas Pringles (US$ 1,50), catchup Heinz (US$ 2,00) e outros cacarecos. Só não é mais divertido do que ir à Frys Electronics, o paraíso dos nerds, e na Best Buy.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Perto da Frys (que é perto do Aeroporto) tem também o Las Vegas Outlet, onde você encontra marcas famosas com preços de fato baratos. Tênis, roupas, relógios, perfumes e souvenirs a preços excelentes. Mais uma razão para alugar aquele carro...&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;E a Defcon ?&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Bom, depois de todo esse turismo e compras, vamos ao que te trouxe a Las Vegas.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;A primeira coisa é ir buscar seu crachá. O Crachá da Defcon sempre é bacana e faz alguma coisa especial (o desse ano, por exemplo, tinha um led que reagia a sons). Já é tradicional nos ultimos anos que os crachás cheguem e se esgotem rapidamente. Se isso ocorrer, você fica com um provisório e depois troca pelo definitivo, mas isso significa que você terá que enfrentar duas filas. Procure pegar o seu crachá na quinta o quanto antes. Além do crachá você ganha uns adesivos, um CD com os materiais e a programação do evento.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Aproveite e pegue outra fila para comprar seus souvenirs da Defcon, como a camiseta oficial, canecas, copinhos, etc. As coisas legais acabam cedo também.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;De uma lida na programação para saber dos diversos eventos que ocorrem na Defcon. As palestras são apenas uma parte do que rola lá. Por exemplo, há um concurso para ver quem gela a cerveja no menor tempo. Nitrogenio líquido e outras geringonças participam. Coffe Wars é um concurso para eleger o melhor café. Mistery Chalenge, como o nome diz, é um desafio misterioso. Capture the Flag é um torneio para equipes pré qualificadas, onde os participantes tentam atacar e defender diversos servidores disponibilizados pela organização. Cuidado, não circule perto da area do capture de flag com a câmera fotográfica ligada. Alias, cuidado ao tirar fotos na Defcon, algumas pessoas não gostam de ser fotografadas e um Goon poderá lhe pedir que apague alguma foto.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Goon ? Eles são as pessoas, voluntárias, que organizam as coisas durante o evento. Um misto de segurança com faz tudo. Os Goons têm autoridade na Defcon, siga suas instruções para não ter problemas. Alguns parecem normais e inofensivos, outros se parecem com sargentos do exército. Você irá reconhecê-los, não se preocupe.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Na área do hotel onde ocorre a Defcon há umas escadas que dão acesso aos Skyboxes. Lá você Irá encontrar  coisas interessantes como o Hardware Hacking Village, onde pessoas podem aprender e compartilhar técnicas de modificação de hardware. O seu crachá pode ser customizado aqui.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Outra sala nos Skyboxes é o Lockpicking Village, onde há palestras e hands-on sobre abertura de cadeados, fechaduras e tudo o mais que se possa imaginar. Há uma “lojinha” que vende as ferramentas também.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;De volta ao piso inferior, não deixe de visitar a Vendor Area, onde se pode adquirir livros, hardware novo ou usado (de placas WI-Fi até como estações Sun ou Silicon Graphics antigas, passando por roteadores, switches, notebooks, tablets, palms Macs antigos e por ai vai). Há também stands da EFF, Hackers for Charities, DJ’s, roupas, acessórios e algumas outras coisas bizarras difíceis de descrever. Leve dinheiro.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Finalmente, não deixe de ver algumas palestras. Há normalmente 4 ou 5 tracks e vale a pena dar uma lida no descritivo de cada palestra antes de escolher aonde vai, pois muitas delas tem títulos não muito óbvios. Veja qual é a sala que sua palestra será e posicione-se na fila do lado de fora, se houver.  Caso não haja, você pode entrar no fim da palestra anterior e esperar na sala, mas observe que quando a palestra seguinte é muito Hype, os Goons pedem que todos saiam da sala, priorizando quem está do lado de fora, aguardando na fila. Respeite essa organização, mesmo sendo meio chata. E não seja um espertoman. Nada de furar fila ou tentar entrar por alguma porta alternativa.&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Na Defcon não tem horário de almoço, coffe break, etc. Procure uma sala que vende comida. É um serviço oferecido pelo hotel e você poderá apreciar quitutes como finger tips, hamburgers e aquela salada americana. Pegue sua guloseima favorita, pague e encha de molhos. Sim, você sobrevive a alguns dias comendo assim. E é barato, menos de 10 dolares te alimentam. Sobra mais para a cerveja. Aliás, das 5PM a 7PM, a cerveja fica mais barata na Defcon. Aproveite !&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Finalmente, há diversas festas que rolam nos dias anteriores, posteriores e durante a Defcon. Algumas são fáceis de ir, como a Freakshow. Outras dependem de você ser convidado, normalmente com antecedência.  As festas normalmente são patrocinadas por algum fabricante de produtos de segurança. Ter algum deles em sua rede de relacionamento pode garantir um convite. A vantagem das festas é que aquela cerveja de US$ 5,00 é grátis, além de outras bebidas. Algumas festas ocorrem em casas noturnas bacanas de Las Vegas e também é  uma oportunidade para conhecê-las sem custo. Fique atento aos horários, as festas começam e terminam exatamente no horário do convite.&lt;br /&gt;Bem, essas foram as dicas básicas para quem nunca foi a Defcon. A cada ano, novos brasileiros passam a integrar a trupe que vai lá. E voltam no ano seguinte. Deve significar alguma coisa. Nos vemos em Vegas !&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;(*) Artigo escrito originalmente para a &lt;a href=&quot;http://www.issabrasil.org/antebellum/&quot;&gt;Antebellum&lt;/a&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/5547671402186723961/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/12/defcon-para-leigos.html#comment-form' title='1 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/5547671402186723961'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/5547671402186723961'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/12/defcon-para-leigos.html' title='Defcon para leigos'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi357GXuSMmCZke0oc_sHnF5YhvFQmpBla9dbKtYioy6gAZ3mHA9gGRCGOfvdZ9MbM69Xq8XhBQOq18suTygwD6folf9PF6KK-PmmfefjLlTX0MVhu-IU8xrBQqeB6aHlQC3KVn/s72-c/Imagem%20247.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-9058192215840684163</id><published>2009-12-03T11:48:00.004-02:00</published><updated>2009-12-03T15:18:44.937-02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="YSTS"/><title type='text'>YSTS 4 - CFP</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNDiqJAwUFQrAJ8TMly7Hio3U6k_ejOGAVwBH1CwjV05nmrekIsT0qvVYb2eaXA1Q96RZmc6Qk2LGp08N8mMy9v0deH-1PhJhkq_U65FUiuJhjEoODg7tnX2mvQxPEDPZMBtyh/s1600-h/Estrela_transp.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 206px; height: 208px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNDiqJAwUFQrAJ8TMly7Hio3U6k_ejOGAVwBH1CwjV05nmrekIsT0qvVYb2eaXA1Q96RZmc6Qk2LGp08N8mMy9v0deH-1PhJhkq_U65FUiuJhjEoODg7tnX2mvQxPEDPZMBtyh/s400/Estrela_transp.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5411007159049276402&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;A chamada de artigos para a conferencia yStS (you Sh0t the Sheriff) está aberta!&lt;br /&gt;&lt;br /&gt;A quarta edição irá acontecer novamente em São Paulo, Brasil, no dia&lt;br /&gt;17 de Maio de 2010.&lt;br /&gt;&lt;br /&gt;INTRODUCAO&lt;br /&gt;&lt;br /&gt;O you sh0t the Sheriff é um evento único, dedicado a mostrar os temas&lt;br /&gt;mais interessantes e atuais relacionados à segurança da informação,&lt;br /&gt;trazendo uma combinação de palestras de alta qualidade com&lt;br /&gt;palestrantes renomados de diversas partes do planeta e cobrindo&lt;br /&gt;diversos tópicos sobre o tema.&lt;br /&gt;&lt;br /&gt;Nosso objetivo principal é permitir que os participantes tenham uma&lt;br /&gt;visão do estado atual da segurança no mundo, combinando diferentes&lt;br /&gt;segmentos da área.&lt;br /&gt;O evento é basicamente para convidados, assim sendo, submeter uma&lt;br /&gt;apresentação é certamente uma boa maneira de tentar participar,&lt;br /&gt;principalmente se você reside no Brasil&lt;br /&gt;&lt;br /&gt;Em função do sucesso das edições passadas, nós mantivemos o evento no&lt;br /&gt;mesmo formato:&lt;br /&gt;&lt;br /&gt;- Ambiente descontraído&lt;br /&gt;- O YSTS 4 vai acontecer em um local secreto (anunciado somente aos&lt;br /&gt;participantes algumas semanas antes do dia da conferencia)&lt;br /&gt;- Novamente o este local secreto será em um aprazível bar ou pub&lt;br /&gt;- E sim, teremos (alguma) comida e (bastante) bebida&lt;br /&gt;&lt;br /&gt;TÓPICOS&lt;br /&gt;&lt;br /&gt;O foco do YSTS 4 são assuntos relacionados com segurança da&lt;br /&gt;informação, incluindo (mas não limitado a):&lt;br /&gt;&lt;br /&gt;* Sistemas operacionais&lt;br /&gt;* Tópicos sobre Gestão e Carreira&lt;br /&gt;* Dispositivos móveis/sistemas embarcados&lt;br /&gt;* Auditoria e controle&lt;br /&gt;* Redes sociais&lt;br /&gt;* Políticas de segurança&lt;br /&gt;* Problemas com protocolos&lt;br /&gt;* Redes/Telecomunicações&lt;br /&gt;* Redes sem fio e Radiofreqüência em geral&lt;br /&gt;* Resposta a incidentes&lt;br /&gt;* Information Warfare&lt;br /&gt;* Guerra de informação&lt;br /&gt;* Código malicioso / BotNets&lt;br /&gt;* Falhas dirigidas a usuários&lt;br /&gt;* Programação segura&lt;br /&gt;* Hacker Spaces / Comunidades hacker&lt;br /&gt;* Fuzzing&lt;br /&gt;* Segurança física&lt;br /&gt;* Virtualização&lt;br /&gt;* Segurança em aplicações WEB&lt;br /&gt;* Computação nas nuvens&lt;br /&gt;* Criptografia / Ofuscação&lt;br /&gt;* Infra-estrutura e sistemas críticos&lt;br /&gt;* Bafômetro hacks&lt;br /&gt;* E qualquer outra coisa relacionada com segurança que você imagine&lt;br /&gt;que seja interessante ser apresentada na conferência&lt;br /&gt;&lt;br /&gt;Nós gostamos de palestras curtas, então, por favor, lembre-se que sua&lt;br /&gt;palestra deve caber em no máximo 30 minutos.&lt;br /&gt;&lt;br /&gt;Como novidade, este ano nós também aceitaremos palestras de 15 minutos.&lt;br /&gt;&lt;br /&gt;Algumas pessoas não precisam de 30 minutos para passa sua mensagem ou&lt;br /&gt;gostariam de falar sobre um projeto recém iniciado. Para estes casos&lt;br /&gt;15 minutos será suficiente.&lt;br /&gt;&lt;br /&gt;You sh0t the Sheriff é certamente a conferencia perfeita para lançar&lt;br /&gt;seus projetos novos, confie em nós &lt;br /&gt;E sim, nós preferimos coisas novas e novos palestrantes são mais que&lt;br /&gt;bem-vindos. Se você tem uma algo bacana para falar, isso é o que&lt;br /&gt;importa.&lt;br /&gt;&lt;br /&gt;PRIVILÉGIOS PARA OS PALESTRANTES&lt;br /&gt;(Somente para palestras de 30 minutos)&lt;br /&gt;&lt;br /&gt;* R$ 700 para auxilio nas despesas de deslocamento para palestrastes&lt;br /&gt;que residam fora da cidade de São Paulo;&lt;br /&gt;* Café da manha, almoço e jantar durante a conferencia;&lt;br /&gt;* Festa oficial pós-conferencia (e não oficiais também);&lt;br /&gt;* Auditoria de produtos em churrascarias tradicionais;&lt;br /&gt;* Entrada vitalícia para todas as futuras edições da conferencia (Sim,&lt;br /&gt;se você já falou em alguma edição passada do yStS você tem entrada&lt;br /&gt;grátis garantida, pode nos pagar uma cerveja por isso... hmm esqueça,&lt;br /&gt;as bebidas no evento são grátis).&lt;br /&gt;&lt;br /&gt;SUBMISSÃO&lt;br /&gt;&lt;br /&gt;Cada submissão de palestra deve incluir as seguintes informações:&lt;br /&gt;* Nome, titulo, endereço, email e telefone para contato&lt;br /&gt;* Biografia resumida e qualificações&lt;br /&gt;* Experiência em apresentações&lt;br /&gt;* Sumario ou abstrato da apresentação&lt;br /&gt;* Esta e uma palestra de 15 ou 30 minutos?&lt;br /&gt;* Recursos necessários (Alem do projetor)&lt;br /&gt;* Outras publicações ou conferencias onde este material foi ou será&lt;br /&gt;publicado/submetido&lt;br /&gt;&lt;br /&gt;Nos aceitamos submissões em Ingles, Português ou Espanhol&lt;br /&gt;&lt;br /&gt;DATAS IMPORTANTES&lt;br /&gt;&lt;br /&gt;Data Final para submissão - 28 de Fevereiro 2010 (23:59 - Horário de Brasília)&lt;br /&gt;Notificação das palestras aceitas - 20 de Março 2010&lt;br /&gt;Data Final para envio do material aceito: 5 de Maio 2010&lt;br /&gt;&lt;br /&gt;Por favor, envie sua submissão para cfp/at/ysts.org&lt;br /&gt;&lt;br /&gt;CONTATOS&lt;br /&gt;&lt;br /&gt;Submissão de artigos: cfp/at/ysts.org&lt;br /&gt;Perguntas em gerais: b0ard/at/ysts.org&lt;br /&gt;Questões sobre patrocínio: sponsors/at/ysts.org&lt;br /&gt;&lt;br /&gt;COISAS RELACIONADAS&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ysts.org&quot;&gt;Arquivos de palestras anteriores, incluindo os vídeos&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Esperamos vê-lo(a) lá!&lt;br /&gt;&lt;br /&gt;OBS: Para quem não conhece, &lt;a href=&quot;http://www.vimeo.com/6887470&quot;&gt;veja como foi a edição 3&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Luiz Eduardo &amp;amp; Nelson Murilo &amp;amp; Willian Caprino&lt;br /&gt;http://ysts.org</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/9058192215840684163/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/12/ysts-4-cfp.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/9058192215840684163'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/9058192215840684163'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/12/ysts-4-cfp.html' title='YSTS 4 - CFP'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNDiqJAwUFQrAJ8TMly7Hio3U6k_ejOGAVwBH1CwjV05nmrekIsT0qvVYb2eaXA1Q96RZmc6Qk2LGp08N8mMy9v0deH-1PhJhkq_U65FUiuJhjEoODg7tnX2mvQxPEDPZMBtyh/s72-c/Estrela_transp.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-7065775108281650033</id><published>2009-11-19T11:46:00.002-02:00</published><updated>2009-11-19T11:48:53.273-02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="issa"/><category scheme="http://www.blogger.com/atom/ns#" term="tv"/><title type='text'>Globo News</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://especiais.globonews.globo.com/files/2015/theme/logogn.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 189px; height: 111px;&quot; src=&quot;http://especiais.globonews.globo.com/files/2015/theme/logogn.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Em um breve momento de fama, fui entrevistado no programa &lt;a href=&quot;http://especiais.globonews.globo.com/cienciaetecnologia/2009/11/18/hackers-x-crackers/&quot;&gt;Espaço Aberto - Ciência e Tecnologia, na Globo News&lt;/a&gt;. :)</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/7065775108281650033/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/11/globo-news.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/7065775108281650033'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/7065775108281650033'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/11/globo-news.html' title='Globo News'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-5181717392604557462</id><published>2009-10-16T23:24:00.002-03:00</published><updated>2009-10-16T23:26:14.873-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="YSTS"/><title type='text'>Videos do YSTS 3</title><content type='html'>Noticia meio velha, mas os &lt;a href=&quot;http://www.vimeo.com/tag:ysts3&quot;&gt;videos do YSTS 3&lt;/a&gt; já estão no ar. Abaixo, o clipe geral.&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;400&quot; height=&quot;270&quot;&gt;&lt;param name=&quot;allowfullscreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://vimeo.com/moogaloop.swf?clip_id=6887470&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1&quot;&gt;&lt;embed src=&quot;http://vimeo.com/moogaloop.swf?clip_id=6887470&amp;amp;server=vimeo.com&amp;amp;show_title=1&amp;amp;show_byline=1&amp;amp;show_portrait=0&amp;amp;color=&amp;amp;fullscreen=1&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; width=&quot;400&quot; height=&quot;270&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;p&gt;&lt;a href=&quot;http://vimeo.com/6887470&quot;&gt;ysts 3.0&lt;/a&gt; from &lt;a href=&quot;http://vimeo.com/user2225668&quot;&gt;leduardo&lt;/a&gt; on &lt;a href=&quot;http://vimeo.com/&quot;&gt;Vimeo&lt;/a&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/5181717392604557462/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/10/videos-do-ysts-3.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/5181717392604557462'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/5181717392604557462'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/10/videos-do-ysts-3.html' title='Videos do YSTS 3'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-8118799022011810090</id><published>2009-10-16T23:12:00.002-03:00</published><updated>2009-10-16T23:21:15.314-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fotografia"/><title type='text'>Behold</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.behold.cc/logolarge2.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 230px; height: 65px;&quot; src=&quot;http://www.behold.cc/logolarge2.png&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://www.behold.cc/&quot;&gt;Behold &lt;/a&gt;é um search engine para o Flickr, que permite encontrar imagens boas, com a tag que você indicar, livres para uso.&lt;br /&gt;A novidade é a opçao &quot;&lt;span style=&quot;font-family:Arial;font-size:100%;color:#484848;&quot;&gt;that &lt;b&gt;&lt;span style=&quot;color:#1874cd;&quot;&gt;look like&lt;/span&gt;&lt;/b&gt; a picture of (a)&quot;&lt;/span&gt;  que aparece após o primeiro search. Segundo o site, esta feature permite que o Behold identifique elementos visuais nas fotos e apresente os resultados baseados nesta escolha. Experimente para entender melhor :)</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/8118799022011810090/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/10/behold.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8118799022011810090'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8118799022011810090'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/10/behold.html' title='Behold'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-8166777751312396376</id><published>2009-10-05T14:17:00.000-03:00</published><updated>2009-10-05T14:18:13.984-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="evento"/><title type='text'>AppSec Brasil 2009</title><content type='html'>&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;&lt;span&gt;CHAMADA&lt;/span&gt; PARA &lt;span&gt;PARTICIPAÇÃO&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;b&gt;Conferência &lt;span&gt;I&lt;/span&gt;nternacional de Segurança de Aplicações&lt;/b&gt;,  organizada e promovida pela comunidade TI-controle e pelo Centro de Informática  da Câmara dos Deputados, em parceria com o OWASP, Capítulo Brasil, e com apoio  da Universidade de Brasília (UnB)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;O Centro de Informática da Câmara dos Deputados e a  Comunidade TI-Controle convidam a todos a participarem da Conferência  Internacional de Segurança de Aplicações (AppSec Brasil 2009), que ocorrerá na  Câmara dos Deputados (Brasília, DF) de 27 a 30 de outubro de 2009. &lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Haverão mini-cursos nos dias 27 e 28 de outubro,  seguidos de sessões plenárias de trilha única nos dias 29 e 30 de outubro de  2009. &lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Keynotes&lt;/span&gt;&lt;/b&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Dr. Gary McGraw, CTO da Cigital&lt;br /&gt;&lt;i&gt;O Modelo  de Maturidade Building Security In (BSIMM)&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Jason Li, Aspect Security&lt;br /&gt;&lt;i&gt;Ágil e Seguro:  É possível fazer os dois?&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Dinis Cruz, OWASP Board&lt;br /&gt;&lt;i&gt;Apresentação do Projeto  OWASP&lt;/i&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Kuai Hinojosa, NY University e  OWASP&lt;br /&gt;&lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Implementando Aplicações Web Seguras  Usando Recursos do OWASP&lt;/span&gt;&lt;/i&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Palestras&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;A Conferência contará com palestras técnicas que  tratarão diversos aspectos de Segurança de Aplicações. Os temas  incluem:&lt;/span&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Segurança de aplicações web&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Otimização de gastos com segurança&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;i&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;SQL Ownage&lt;/span&gt;&lt;/i&gt;  &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;ferramentas.&lt;/span&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Mini-cursos&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;A Conferência contará também com 5  mini-cursos:&lt;/span&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Gestão de Riscos de Segurança Aplicada a Web  Services&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Segurança Web: Técnicas para Programação Segura de  Aplicações&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Segurança Computacional no Desenvolvimento de Web  Services&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Tecnologias de Segurança em Web Services&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Hands on Web Application Testing using the OWASP  Testing Guide.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Local&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;A Conferência ocorrerá na Câmara dos Deputados, em  Brasília. As plenárias serão no auditório Nereu Ramos, no Anexo II e os  mini-cursos serão no Centro de Formação, Treinamento e  Aperfeiçoamento.&lt;/span&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Inscrições&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;A &lt;span&gt;participação&lt;/span&gt; na Conferência  será gratuita, mas, devido à limitação de lugares, será necessário inscrever-se  previamente.&lt;/span&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;As inscrições estarão abertas a partir do dia  29/10/2009 na URL: &lt;/span&gt;&lt;a title=&quot;blocked::http://www.camara.gov.br/appsecbrasil2009 http://www.camara.gov.br/appsecbrasil2009&quot; href=&quot;http://www.camara.gov.br/appsecbrasil2009&quot; target=&quot;_blank&quot;&gt;&lt;span title=&quot;blocked::http://www.camara.gov.br/appsecbrasil2009&quot;   style=&quot;font-family:Arial;font-size:85%;&quot;&gt;http://www.camara.gov.br/&lt;wbr&gt;appsecbrasil2009&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;   &lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt; &lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Informações&lt;/span&gt;&lt;/b&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Para maiores informações, favor consultar os sites  abaixo ou enviar email para &lt;/span&gt;&lt;a title=&quot;blocked::mailto:appsec.brasil@camara.gov.br&quot; href=&quot;mailto:appsec.brasil@camara.gov.br&quot; target=&quot;_blank&quot;&gt;&lt;span title=&quot;blocked::mailto:appsec.brasil@camara.gov.br&quot;   style=&quot;font-family:Arial;font-size:85%;&quot;&gt;appsec.brasil@camara.gov.br&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;   &lt;p&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Inscrições e informações sobre a conferência:  &lt;/span&gt;&lt;a title=&quot;blocked::http://www.camara.gov.br/appsecbrasil2009 http://www.camara.gov.br/appsecbrasil2009&quot; href=&quot;http://www.camara.gov.br/appsecbrasil2009&quot; target=&quot;_blank&quot;&gt;&lt;span title=&quot;blocked::http://www.camara.gov.br/appsecbrasil2009&quot;   style=&quot;font-family:Arial;font-size:85%;&quot;&gt;http://www.camara.gov.br/&lt;wbr&gt;appsecbrasil2009&lt;/span&gt;&lt;/a&gt;&lt;br /&gt; &lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt;Comunidade TI-Controle: &lt;/span&gt;&lt;a title=&quot;blocked::http://www.ticontrole.gov.br/ http://www.ticontrole.gov.br&quot; href=&quot;http://www.ticontrole.gov.br/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;span title=&quot;blocked::http://www.ticontrole.gov.br/&quot;   style=&quot;font-family:Arial;font-size:85%;&quot;&gt;http://www.ticontrole.gov.br&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Arial;font-size:85%;&quot;&gt; &lt;br /&gt;Câmara dos Deputados: &lt;/span&gt;&lt;a title=&quot;blocked::http://www.camara.gov.br/ http://www.camara.gov.br&quot; href=&quot;http://www.camara.gov.br/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;span title=&quot;blocked::http://www.camara.gov.br/&quot;   style=&quot;font-family:Arial;font-size:85%;&quot;&gt;http://www.camara.gov.br&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/8166777751312396376/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/10/appsec-brasil-2009.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8166777751312396376'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8166777751312396376'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/10/appsec-brasil-2009.html' title='AppSec Brasil 2009'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-2931057271453561689</id><published>2009-09-27T23:08:00.002-03:00</published><updated>2009-09-27T23:12:29.881-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hardware"/><title type='text'>Free Advanced Hard Drive Cloning Tool from Clonezilla</title><content type='html'>&lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0.5em;&quot;&gt;via &lt;a href=&quot;http://www.makeuseof.com/&quot; class=&quot;f&quot;&gt;MakeUseOf.com&lt;/a&gt; by Benjamin on 9/26/09&lt;/div&gt;  &lt;p&gt;&lt;img src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/clonezillaLogo.jpeg&quot; style=&quot;margin-right: 20px;&quot; align=&quot;left&quot; vspace=&quot;5&quot; /&gt;Imaging hard drives is the process of taking a hard drive and copying it bit by bit to create an exact replica, in a way an &quot;image&quot; just like a photograph of a person is a snapshot of them at any moment in time. The cloning part is the process of taking that &quot;image&quot; of a hard drive and placing copies of it on one or more other hard drives. &lt;/p&gt; &lt;p&gt;In a cloning project I worked on, my favorite freeware product from my googling journeys was &lt;a href=&quot;http://www.clonezilla.org/&quot;&gt;Clonezilla&lt;/a&gt;. Clonezilla is free! Clonezilla is a good tool for taking a snapshot of a system and reverting back to it later as a backup or to get things the way you once liked them. &lt;/p&gt; &lt;p&gt;When you have a new computer and begin installing software that you enjoy using, that would be a great time to image the hard drive in case something happens later. This can save time instead of having to reinstall your operating system if there is a virus or corruption in data. Creating a copy of a hard drive can also save you from ruining the state of a computer due to tinkering, installing software, etc. If you do PC repair for customers or as a hobbyist, you can also use this software before beginning work on some computers in case you would need a point of reference for any reason. Clonezilla, clones a 40 gigabyte hard drive in about 15 minutes.&lt;/p&gt; &lt;p&gt;Clonezilla has two forms, &lt;strong&gt;Clonezilla live&lt;/strong&gt; &lt;strong&gt;and Clonezilla ServerEdition (SE)&lt;/strong&gt;. Clonezilla live is used for cloning single machines while Clonezilla SE is for multiple machine deployments. This article is about Clonezilla live.&lt;br /&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;When using the Clonezilla live version, I burned it to a CD and then set the computer to boot from that CD. The first screens after Clonezilla begins, let you choose video resolution, language and keyboard layout.&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img title=&quot;screenresGimp&quot; src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/screenresGimp1.png&quot; alt=&quot;screenresGimp&quot; width=&quot;358&quot; height=&quot;175&quot; /&gt;&lt;/p&gt; &lt;p&gt;The following screen is where you will select to &quot;Start_Clonezilla&quot; or &quot;Enter_Shell&quot; which is to enter command line mode, to make things easier on myself I selected &quot;Start_Clonezilla&quot;.&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img title=&quot;start_clonezillaGimp&quot; src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/start_clonezillaGimp.png&quot; alt=&quot;start_clonezillaGimp&quot; width=&quot;407&quot; height=&quot;136&quot; /&gt;&lt;/p&gt; &lt;p&gt;At the next screen I selected &quot;device-image&quot;. The other option is to go direct from partition to partition or disk to disk or any combination in between, in case your choice is to only clone a single partition of a drive to another drive. I wanted to clone the whole enchilada so I selected &quot;device-image&quot;.&lt;/p&gt; &lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/device-imageGimp.png&quot; alt=&quot;device-imageGimp&quot; width=&quot;480&quot; height=&quot;166&quot; /&gt;&lt;/p&gt; &lt;p&gt;The next screen was selecting where to place the image that was going to be created. Because I was saving the image across our network, I did not choose the more popular option of &quot;local_dev&quot; to save on a local hard drive or USB drive. If using &quot;local_dev&quot; you will just need to ensure the storage device has sufficient space for the image being cloned. The option that worked for me was selecting &quot;samba_server&quot; which is, in this arena, equivalent to a shared folder on a Windows network. You must allow write permissions on the shared folder for the account that is chosen.&lt;/p&gt; &lt;p&gt;&lt;img title=&quot;samba_serverGimp&quot; src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/samba_serverGimp.png&quot; alt=&quot;samba_serverGimp&quot; width=&quot;469&quot; height=&quot;185&quot; /&gt;&lt;/p&gt; &lt;p&gt;After this step in the process, another thing that has to be decided is how to get an IP address, either statically assign one or send out a DHCP broadcast in search of one so the computer can begin talking on the network.&lt;/p&gt; &lt;p&gt;Then the next option is choosing the location where the Clonezilla image is going to be stored. You can either enter an IP address of the computer where the image will be stored or you can enter the Fully Qualified Domain Name of the computer, which might be something like &quot;cloneserver.internaldomainname.com&quot;. The next step is to choose which domain that computer resides on. Keeping with the previous example, I would enter &quot;internaldomainname.com&quot;.&lt;/p&gt; &lt;p&gt;Then you will be prompted to enter a username that has permissions to that save location. The name of the shared resource must also be provided, Clonezilla by default will elect to use a folder called &quot;/images&quot;. You must ensure that your shared resource and the response here match. We were placing our images in a folder named &quot;CLONEZILLA&quot;, so we would change &quot;/images&quot; to &quot;/CLONEZILLA&quot;. Make sure yours match also; if you get red letters in a message, there was a problem.&lt;/p&gt; &lt;p&gt;Now you will be prompted to hit Enter to put in the password associated with the account you chose. You will see a password prompt but when you type, no asterisk marks &quot;***&quot; will appear. Hit Enter after typing your password correctly. You must also select beginner or expert mode, since I had never used it before and I like doing things the easy way, I selected &lt;em&gt;beginner&lt;/em&gt; mode.&lt;/p&gt; &lt;p&gt;In our project, when I wanted to copy a hard drive and save it as an image for use on other computers, I selected the &quot;savedisk&quot; option. When you want to &lt;strong&gt;restore an image&lt;/strong&gt; to a hard drive, the process is very similar except at the option page where you originally selected &quot;savedisk&quot; you would select &quot;&lt;em&gt;restoredisk&lt;/em&gt;&quot; instead. Some of the options after choosing to restore are not there; like you won&#39;t be prompted to name the image but rather select it from a list of image files that are detected on the shared resource.&lt;/p&gt; &lt;p&gt;&lt;img title=&quot;restorediskGimp&quot; src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/restorediskGimp1.png&quot; alt=&quot;restorediskGimp&quot; width=&quot;479&quot; height=&quot;192&quot; /&gt;&lt;/p&gt; &lt;p&gt;Then you must give the image a name. Which hard drive you are making a replica of, or pulling an image to, must also be selected, if there is only one hard drive to clone or overwrite then it will already be selected for you.&lt;/p&gt; &lt;p&gt;&lt;img title=&quot;imagenameGimp&quot; src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/imagenameGimp.png&quot; alt=&quot;imagenameGimp&quot; width=&quot;426&quot; height=&quot;88&quot; /&gt;&lt;/p&gt; &lt;p&gt;Then you can begin the restoring process, by hitting Enter a couple of times, and confirming the actions. For other freeware cloning alternatives you could try &lt;a href=&quot;http://nliteos.com/index.html&quot;&gt;nLite&lt;/a&gt;, &lt;a href=&quot;http://www.pcinspector.de/Sites/clone_maxx/download.htm?language=1&quot;&gt;PC Inspector Clonemax&lt;/a&gt;,&lt;a href=&quot;http://download.cnet.com/Macrium-Reflect-Free-Edition/3000-2242_4-10845728.html&quot;&gt;Marcium Reflect Free Edition&lt;/a&gt;&lt;strong&gt;,&lt;strong&gt; &lt;/strong&gt;&lt;/strong&gt;or &lt;a href=&quot;http://odin-win.sourceforge.net/&quot;&gt;Odin&lt;/a&gt; and let us know what you think.&lt;/p&gt; &lt;p&gt;Check out the software and documentation from the &lt;a href=&quot;http://www.clonezilla.org/&quot;&gt;Clonezilla&lt;/a&gt; website.&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/2931057271453561689/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/09/free-advanced-hard-drive-cloning-tool.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/2931057271453561689'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/2931057271453561689'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/09/free-advanced-hard-drive-cloning-tool.html' title='Free Advanced Hard Drive Cloning Tool from Clonezilla'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-9194354792881631942</id><published>2009-09-10T23:50:00.002-03:00</published><updated>2009-09-10T23:58:29.076-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fun"/><category scheme="http://www.blogger.com/atom/ns#" term="games"/><title type='text'>Unlikely (We Hope!) Video Game Peripherals</title><content type='html'>&lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0.5em;&quot;&gt;via &lt;a href=&quot;http://www.neatorama.com/&quot; class=&quot;f&quot;&gt;Neatorama&lt;/a&gt; by John Farrier on 9/10/09&lt;/div&gt;  &lt;p&gt;&lt;/p&gt;&lt;center&gt;&lt;img alt=&quot;&quot; src=&quot;http://farm3.static.flickr.com/2478/3907165323_0c5fe6de11.jpg&quot; height=&quot;284&quot; width=&quot;500&quot; /&gt;&lt;br /&gt;Image:Kent Smith, Gizmodo&lt;/center&gt;&lt;p&gt;&lt;/p&gt; &lt;p&gt;Gizmodo held a photoshop contest for video game peripherals that will probably never be developed.  Above is the…uh, animal husbandry Nintendo Wii controller by Kent Smith, which took 3rd place.  There are 42 reader-submitted images at the link.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://gizmodo.com/5354866/42-gaming-peripherals-youll-never-play-with&quot;&gt;Link&lt;/a&gt; via &lt;a href=&quot;http://www.gearfuse.com/the-newest-wii-controller-a-horses-ass-and-your-arm/&quot;&gt;GearFuse&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/9194354792881631942/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/09/unlikely-we-hope-video-game-peripherals.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/9194354792881631942'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/9194354792881631942'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/09/unlikely-we-hope-video-game-peripherals.html' title='Unlikely (We Hope!) Video Game Peripherals'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://farm3.static.flickr.com/2478/3907165323_0c5fe6de11_t.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-4486908631808984932</id><published>2009-09-03T11:07:00.002-03:00</published><updated>2009-09-03T16:01:37.874-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hardware"/><title type='text'>How To Find Unknown Device Drivers By Their Vendor &amp; Device ID</title><content type='html'>&lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0.5em;&quot;&gt;via &lt;a href=&quot;http://www.makeuseof.com/&quot; class=&quot;f&quot;&gt;MakeUseOf.com&lt;/a&gt; by Saikat Basu on 9/2/09&lt;/div&gt;  &lt;p&gt;&lt;img style=&quot;margin-right: 20px;&quot; src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/Thumbnail.png&quot; alt=&quot;Thumbnail&quot; align=&quot;left&quot; vspace=&quot;5&quot; /&gt;Rule No.1: Never lose your device driver CDs.&lt;/p&gt; &lt;p&gt;Rule No.2: Be prudent and keep a &lt;a href=&quot;http://www.makeuseof.com/tag/3-useful-software-to-backup-your-hardware-drivers-in-windows/&quot;&gt;backup&lt;/a&gt; copy close by.&lt;/p&gt; &lt;p&gt;Rule No. 3: If you lose your driver files, know where to download it from again.&lt;/p&gt; &lt;p&gt;Congratulations! If you have flouted at least two of the above rules, then this post might serve as deliverance from the three cardinal sins. I am a fellow sinner. But, the third rule has often bailed me out and it&#39;s thanks to a little postscript to the third rule that has washed away my need for penance.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Device Manager&lt;/strong&gt; is the place where all drivers are displayed. An unknown device gets a yellow question mark against it in Device Manager. The causes could be one or a few – You could have installed the wrong device driver which the OS does not recognize. Or the hardware itself could be faulty. All such cases lead a device driver to be classified as an unknown device.&lt;/p&gt; &lt;p&gt;The easiest way to resolve an unknown status is to find and download device drivers from the manufacturer&#39;s website. The respective websites usually have drill down menus to take you to the right driver for your OS. But what if you can&#39;t recollect the make or brand of the device? To err is human; to fix it is divine duty. Thankfully, ways exist that makes correcting unknown device status as easy as a prayer.&lt;/p&gt; &lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt; &lt;h3&gt;&lt;strong&gt;The Manual Way from the Device Manager&lt;/strong&gt;&lt;/h3&gt; &lt;p&gt;Every device driver comes with two identity numbers – the &lt;em&gt;Vendor ID&lt;/em&gt; and the &lt;em&gt;Device ID&lt;/em&gt;. These two numbers can be used to track down the manufacturer and the specific device driver. The &lt;em&gt;Device ID&lt;/em&gt; is the most unique identifier for a device. Hardware ID&#39;s can be less specific. Device ID is what gets accessed first during setup.&lt;/p&gt; &lt;ol&gt; &lt;li&gt;Open Device Manager from… &lt;ul&gt; &lt;li&gt;&lt;em&gt;Control Panel – System – Hardware – Device Manager (In Windows XP).&lt;/em&gt;&lt;/li&gt; &lt;li&gt;&lt;em&gt;Control Panel – System and Maintenance – Administrative Tools – Computer Management – Device Manager (In Windows Vista).&lt;/em&gt;&lt;/li&gt; &lt;li&gt;Alternatively, in the &lt;em&gt;Run&lt;/em&gt; box type &lt;em&gt;devmgmt.msc&lt;/em&gt;.&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/li&gt; &lt;/ul&gt; &lt;/li&gt; &lt;li&gt;Unknown devices would be listed as such and marked out with a yellow question mark.&lt;/li&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/Device-Manager.png&quot; alt=&quot;Device-Manager&quot; height=&quot;476&quot; width=&quot;580&quot; /&gt;&lt;/p&gt; &lt;li&gt;Select the unknown device and right click to access &lt;em&gt;Properties&lt;/em&gt;.&lt;/li&gt; &lt;li&gt;In the &lt;em&gt;Properties&lt;/em&gt; window click on &lt;em&gt;Details&lt;/em&gt; tab and select &lt;em&gt;Device Instance Id&lt;/em&gt; from the drop down.&lt;/li&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/Device-ID.png&quot; alt=&quot;Device-ID&quot; height=&quot;455&quot; width=&quot;404&quot; /&gt;&lt;/p&gt; &lt;li&gt;An alphanumeric string like this &lt;em&gt;PCI\VEN_1217&amp;amp;DEV_7130&amp;amp;SUBSYS_012F1025&amp;amp;REV_01\4&amp;amp;6B16D5B&amp;amp;0&amp;amp;33F0&lt;/em&gt; is the identification marker for the device. We only need to isolate the &lt;em&gt;Vendor ID&lt;/em&gt; number (prefixed with VEN) and the &lt;em&gt;Device I&lt;/em&gt;D number (prefixed with DEV). In this case, Vendor ID is &lt;strong&gt;1217&lt;/strong&gt; and Device ID is &lt;strong&gt;7130&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;p&gt;With the numbers identified, a few resources can be tapped to get the vendors behind these numbers.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.pcidatabase.com/&quot;&gt;&lt;strong&gt;PCI Database&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;It is a reputedly the largest centralized database of PCI device IDs to find your device driver. Using the search box, you can search vendors and devices by IDs. Either one of the searches gives you the clue about the origins of this device. Further information can be obtained from the vendor&#39;s website or a Google search.&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img style=&quot;border: 1px solid black;&quot; src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/PCI-database-Search-results.png&quot; alt=&quot;PCI-database-Search-results&quot; height=&quot;345&quot; width=&quot;580&quot; /&gt;&lt;/p&gt; &lt;h3&gt;&lt;strong&gt;The Software Way Using Unknown Devices&lt;/strong&gt;&lt;/h3&gt; &lt;p&gt;A small free standalone software aptly named &lt;a href=&quot;http://www.halfdone.com/&quot;&gt;Unknown Devices&lt;/a&gt; offers a quick way to get to the anonymous device drivers. The 630 KB sized software (beta ver.1.4.20) runs directly without an installation. The database used by the software comes in 3 text files located in the same folder.&lt;/p&gt; &lt;ol&gt; &lt;li&gt;The program scans the devices installed and displays the name of the manufacturer and the devices discovered.&lt;/li&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img style=&quot;border: 1px solid black;&quot; src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/Unknown-devcie.png&quot; alt=&quot;Unknown-devcie&quot; height=&quot;277&quot; width=&quot;500&quot; /&gt;&lt;/p&gt; &lt;li&gt;The detailed info includes the vendor and device IDs along with the manufacturer names.&lt;/li&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img style=&quot;border: 1px solid black;&quot; src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/Unknown-devcie_Details.png&quot; alt=&quot;Unknown-devcie_Details&quot; height=&quot;406&quot; width=&quot;421&quot; /&gt;&lt;/p&gt; &lt;li&gt;A Google search is available for any of the details with a right-click.  For instance, a Google search using the hardware ID can be used to find device drivers.&lt;/li&gt; &lt;li&gt;The text based database can also be queried for any hardware ID using its integrated &lt;em&gt;Lookup Hardware ID&lt;/em&gt; search box.&lt;/li&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img style=&quot;border: 1px solid black;&quot; src=&quot;http://www.makeuseof.com/wp-content/uploads/2009/09/Unknown-devcie_Search.png&quot; alt=&quot;Unknown-devcie_Search&quot; height=&quot;119&quot; width=&quot;487&quot; /&gt;&lt;/p&gt; &lt;/ol&gt; &lt;p&gt;The beta version (1.4.20) extends support to Vista.&lt;/p&gt; &lt;p&gt;The info obtained using the above two methods, does not guarantee a solution. In some cases, the information will take us into a blind alley because the device driver itself is not available. But the two ways do help to unmask the unidentified devices and make them accessible with a few more details. With the devices identified, we are in a better position to query the manufacture or hunt around on the web for the right &lt;a href=&quot;http://www.makeuseof.com/tags/drivers/&quot;&gt;device driver&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Let me point you to some resources to find device drivers as a starter…&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.driverguide.com/&quot;&gt;DriverGuide.com&lt;/a&gt;&lt;/p&gt; &lt;p&gt;With 400,000 drivers, it is very nearly king of the heap. The free membership comes with a few limitations like access to all 100,000+ member uploaded drivers but limited access to the site&#39;s own 300,000+ uploaded drivers. But free entry into its huge company database list and community forum makes this site a great hub. As it allows user submitted drivers, you can put in a request for an obsolete driver.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.nodevice.com/&quot;&gt;NoDevice.com&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Nearly 30,000 drivers are indexed by company name and driver type. Read more about it here.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.driversplanet.com/&quot;&gt;DriversPlanet.com&lt;/a&gt;&lt;/p&gt; &lt;p&gt;It offers a downloadable driver scanner. The site is well laid out with a database of 120,000 drivers listed by manufacturer and device type.&lt;/p&gt; &lt;p&gt;Let us know how you deal with an unknown device driver and make it a bit more recognizable.&lt;/p&gt; &lt;p&gt;&lt;small&gt;Image credit: &lt;a rel=&quot;nofollow&quot; href=&quot;http://www.flickr.com/photos/15932083@N05/2356712801/&quot;&gt;viagallery&lt;/a&gt;&lt;/small&gt; &lt;/p&gt;&lt;p&gt;Did you like the post? Please do share your thoughts in the comments section!&lt;/p&gt; &lt;p&gt;&lt;em&gt;&lt;strong&gt;New on MakeUseOf ?&lt;/strong&gt; Get cheat sheets and cool PDF guides @ &lt;a href=&quot;http://www.makeuseof.com/makeuseof-downloads/&quot;&gt;www.makeuseof.com/makeuseof-downloads/&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;   &lt;em&gt;&lt;h4&gt;Related posts&lt;/h4&gt;&lt;/em&gt;  &lt;ul&gt;  &lt;li&gt;&lt;a href=&quot;http://www.makeuseof.com/tag/how-to-find-pc-drivers-and-set-up-your-printer/&quot; title=&quot;How To Find PC Drivers and Set Up Your Printer (November 2, 2007)&quot;&gt;How To Find PC Drivers and Set Up Your Printer&lt;/a&gt; (8)&lt;/li&gt;  &lt;li&gt;&lt;a href=&quot;http://www.makeuseof.com/tag/how-to-easily-remove-old-drivers-from-windows/&quot; title=&quot;How To Easily Remove Old Drivers from Windows (May 15, 2009)&quot;&gt;How To Easily Remove Old Drivers from Windows&lt;/a&gt; (17)&lt;/li&gt;  &lt;li&gt;&lt;a href=&quot;http://www.makeuseof.com/tag/manage-multiple-cameras-like-a-pro-mac/&quot; title=&quot;How To Easily Manage Photos from Multiple Cameras [Mac] (July 12, 2009)&quot;&gt;How To Easily Manage Photos from Multiple Cameras [Mac]&lt;/a&gt; (1)&lt;/li&gt;  &lt;li&gt;&lt;a href=&quot;http://www.makeuseof.com/tag/free-alternatives-to-10-popular-commercial-mac-applications-part-2/&quot; title=&quot;Free Alternatives to 10 Popular Commercial Mac Applications (Part2) (October 12, 2008)&quot;&gt;Free Alternatives to 10 Popular Commercial Mac Applications (Part2)&lt;/a&gt; (13)&lt;/li&gt;  &lt;li&gt;&lt;a href=&quot;http://www.makeuseof.com/tag/download-junkies-update-your-system-with-radarsync/&quot; title=&quot;Download Junkies, Update Your System With RadarSync (May 29, 2009)&quot;&gt;Download Junkies, Update Your System With RadarSync&lt;/a&gt; (17)&lt;/li&gt; &lt;/ul&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/4486908631808984932/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/09/how-to-find-unknown-device-drivers-by.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/4486908631808984932'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/4486908631808984932'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/09/how-to-find-unknown-device-drivers-by.html' title='How To Find Unknown Device Drivers By Their Vendor &amp; Device ID'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-4840823727877992529</id><published>2009-08-24T10:55:00.003-03:00</published><updated>2009-08-24T11:02:02.818-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="pci"/><category scheme="http://www.blogger.com/atom/ns#" term="seguranca"/><title type='text'>Entendendo o PCI DSS: Porque os padrões promovidos pelo Payment Card Industry Council são bem mais do que um simples Snake Oil</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.thetechherald.com/media/images/200911/CreditCard1_2.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 600px; height: 400px;&quot; src=&quot;http://www.thetechherald.com/media/images/200911/CreditCard1_2.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Este &lt;a href=&quot;http://camargoneves.com/2008/04/entendendo-o-pci-dss-porque-os-padroes-promovidos-pelo-payment-card-industry-council-sao-bem-mais-do-que-um-simples-snake-oil/&quot;&gt;artigo do Eduardo Neves&lt;/a&gt; explica muito sobre o PCI-DSS. Imperdível para quem está envolvido no assunto.</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/4840823727877992529/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/entendendo-o-pci-dss-porque-os-padroes.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/4840823727877992529'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/4840823727877992529'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/entendendo-o-pci-dss-porque-os-padroes.html' title='Entendendo o PCI DSS: Porque os padrões promovidos pelo Payment Card Industry Council são bem mais do que um simples Snake Oil'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-6983126635671296588</id><published>2009-08-24T10:05:00.002-03:00</published><updated>2009-08-24T10:24:52.972-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fun"/><title type='text'>Tech Support Cheat Sheet</title><content type='html'>&lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0.5em;&quot;&gt;via &lt;a href=&quot;http://xkcd.com/&quot; class=&quot;f&quot;&gt;xkcd.com&lt;/a&gt;  on 8/23/09&lt;/div&gt;  &lt;img src=&quot;http://imgs.xkcd.com/comics/tech_support_cheat_sheet.png&quot; title=&quot;&#39;Hey Megan, it&#39;s your father. How do I print out a flowchart?&#39;&quot; alt=&quot;&#39;Hey Megan, it&#39;s your father. How do I print out a flowchart?&#39;&quot; /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/6983126635671296588/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/tech-support-cheat-sheet.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/6983126635671296588'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/6983126635671296588'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/tech-support-cheat-sheet.html' title='Tech Support Cheat Sheet'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-8854124560279109744</id><published>2009-08-24T10:00:00.002-03:00</published><updated>2009-08-24T10:06:00.990-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hardware"/><title type='text'>Video: Inside Kingston’s USB Stick Factory</title><content type='html'>&lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0.5em;&quot;&gt;via &lt;a href=&quot;http://www.wired.com/gadgetlab&quot; class=&quot;f&quot;&gt;Wired: Gadget Lab&lt;/a&gt; by Charlie Sorrel on 8/24/09&lt;/div&gt;  &lt;p&gt;&lt;embed src=&quot;http://www.youtube.com/v/g_6mMFmes1s&amp;amp;color1=0xb1b1b1&amp;amp;color2=0xcfcfcf&amp;amp;hl=en&amp;amp;feature=player_embedded&amp;amp;fs=1&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;never&quot; wmode=&quot;transparent&quot; type=&quot;application/x-shockwave-flash&quot; height=&quot;344&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/p&gt; &lt;p&gt;Our good friend Sascha from Netbook News recently got to poke his nose around Kingston&#39;s production lines, specifically the factory where USB thumb drives are put together. Luckily for us, after Sascha had donned his natty cap and other dust-busting gear, he picked up his video camera and took it in with him.&lt;/p&gt; &lt;p&gt;The biggest surprise is how office-like this seems. If you expect the factory resemble those which churn out cars or wash returned milk bottles, you&#39;ll be disappointed. The machines which do the work here are small and quiet, more like photocopiers than giant, Transformer-like welding-bots. In fact, we&#39;re reminded of nothing so much as a high-street print bureau. Which is, given the nature of circuit production, not far from the truth. Bonus: Just over halfway in, the memory card in the video camera gets almost full — inside a memory-making factory!&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.netbooknews.com/789/hows-a-usb-is-made-trip-to-the-kingston-production-plant/&quot; title=&quot;How&#39;s a USB is Made? Trip to the Kingston Production Plant | Netbooknews - Netbooks, Netbook Reviews, Smartbooks and more&quot;&gt;How&#39;s a USB Is Made? Trip to the Kingston Production Plant&lt;/a&gt; [Netbook News. Thanks, Sascha!]&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/8854124560279109744/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/video-inside-kingstons-usb-stick.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8854124560279109744'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8854124560279109744'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/video-inside-kingstons-usb-stick.html' title='Video: Inside Kingston’s USB Stick Factory'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-7018474280361438572</id><published>2009-08-21T10:52:00.002-03:00</published><updated>2009-08-21T11:02:26.310-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fun"/><title type='text'>Stupid Table Manners</title><content type='html'>Muito divertido, vale a leitura....&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0.5em;&quot;&gt;via &lt;a href=&quot;http://www.neatorama.com/&quot; class=&quot;f&quot;&gt;Neatorama&lt;/a&gt; by Alex on 8/20/09&lt;/div&gt;  &lt;p&gt;&lt;img src=&quot;http://neatorama.cachefly.net/images/2009-08/table-setting.jpg&quot; height=&quot;107&quot; width=&quot;150&quot; /&gt;If you think about it, table manners are just one of the ways The Man has got us under his thumb. Separate forks for salad, fish, oyster and dinner? It&#39;s oppression, I tell you.&lt;/p&gt; &lt;p&gt;Our BFF BuzzFeed is revolting against some of the stupidest table manners today and have provided means for us regular Joes to resist being civilized: &lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;1. Multiple Forks&lt;/strong&gt;&lt;br /&gt;Oppressive rule: You sit down at a fancy restaurant and are immediately faced with a vast array of forks.&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;em&gt;Resistance solution: Side-step the utensils. God gave you hands for a reason.&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;em&gt;&lt;strong&gt;2. Eating Soup With A Spoon&lt;/strong&gt;&lt;br /&gt;Oppressive rule: Despite the fact that soup is a liquid, we&#39;re forced to ladle in out in painfully small increments, always with the threat of spillage.&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;em&gt; Resistance solution: Use a straw if it&#39;s thin broth; lift the bowl and DRINK DIRECTLY FROM THE BOWL if it&#39;s anything hearty.&lt;/em&gt;&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;Miss Manners is surely horrified: &lt;a href=&quot;http://www.buzzfeed.com/radicaleater/top-10-most-ridiculous-table-manners-ghl&quot;&gt;Link&lt;/a&gt; - Thanks Matt!&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/7018474280361438572/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/stupid-table-manners.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/7018474280361438572'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/7018474280361438572'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/stupid-table-manners.html' title='Stupid Table Manners'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-4183973634249208063</id><published>2009-08-20T14:22:00.002-03:00</published><updated>2009-08-20T14:31:35.151-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hack"/><category scheme="http://www.blogger.com/atom/ns#" term="hardware"/><title type='text'>Hardware Hackers Create a Modular Motherboard</title><content type='html'>&lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt;1&lt;br /&gt;&lt;/div&gt; &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt;  &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;h2 style=&quot;margin: 0.25em 0pt 0pt;&quot;&gt;&lt;div class=&quot;&quot;&gt;&lt;a href=&quot;http://feeds.wired.com/%7Er/GearFactor/%7E3/Lw9kIwG9ing/&quot;&gt;Hardware Hackers Create a Modular Motherboard&lt;/a&gt;&lt;/div&gt;&lt;/h2&gt; &lt;div style=&quot;margin-bottom: 0.5em;&quot;&gt;via &lt;a href=&quot;http://www.wired.com/gadgetlab&quot; class=&quot;f&quot;&gt;Wired: Gadget Lab&lt;/a&gt; by Priya Ganapati on 8/19/09&lt;/div&gt;  &lt;p&gt;&lt;img title=&quot;ixmachina&quot; src=&quot;http://www.wired.com/images_blogs/gadgetlab/2009/08/ixmachina.jpg&quot; alt=&quot;ixmachina&quot; height=&quot;427&quot; width=&quot;640&quot; /&gt;&lt;/p&gt; &lt;p&gt;An ambitious group of hardware hackers have taken the fundamental building blocks of computing and turned them inside out in an attempt to make PCs significantly more efficient.&lt;/p&gt; &lt;p&gt;The group has created a motherboard prototype that uses separate modules, each of which has its own processor, memory and storage. Each square cell in this design serves as a mini-motherboard and network node; the cells can allocate power and decide to accept or reject incoming transmissions and programs independently. Together, they form a networked cluster with significantly greater power than the individual modules.&lt;/p&gt; &lt;p&gt;The design, called the &lt;a href=&quot;http://www.illuminatolabs.com/&quot;&gt;Illuminato X Machina&lt;/a&gt;, is vastly different from the separate processor,memory and storage components that govern computers today.&lt;/p&gt; &lt;p&gt;&quot;We are taking everything that goes into motherboard now and chopping it up,&quot; says &lt;a href=&quot;http://www.livingcomputation.com/rpc&quot;&gt;David Ackley&lt;/a&gt;, associate professor of computer science at the University of New Mexico and one of the contributors to the project. &quot;We have a CPU, RAM, data storage and serial ports for connectivity on every two square inches.&quot;&lt;/p&gt; &lt;p&gt;A modular architecture designed for parallel and distributed processing could help take computing to the next level, say its designers. Instead of having an entire system crash if a component experiences a fatal error, failure of a single cell can still leave the rest of the system operational. It also has the potential to change computing by ushering in machines that draw very little power.&lt;/p&gt; &lt;p&gt;&quot;We are at a point where each computer processor maxes out at 3Ghz (clock speed) so you have to add more cores, but you are still sharing the resource within the system,&quot; says Justin Huynh, one of the key members of the project. &quot;Adding cores the way we are doing now will last about a decade.&quot;&lt;/p&gt; &lt;p&gt;Huynh and his team are no strangers to experimenting with new ideas. Earlier this year, Huynh and his partner Matt Stack created the &lt;a href=&quot;http://www.wired.com/gadgetlab/2009/03/open-source-har/&quot;&gt;Open Source Hardware Bank&lt;/a&gt;, a peer-to-peer borrowing and lending club that funds open source hardware projects. Stack first started working on the X Machina idea about 10 months ago.&lt;/p&gt; &lt;p&gt;Computing today is based on the von Neumann architecture: a central processor, and separate memory and data storage. But that design poses a significant problem known as the von Neumann bottleneck. Though processors can get faster, the connection between the memory and the processor can get overloaded.That limits the speed of the computer to the pace at which it can transfer data between the two.&lt;/p&gt; &lt;p&gt;&quot;A von Neumann machine is like the centrally planned economy, whereas the modular, bottom up, interconnected approach would be more capitalist,&quot; says Ackley.&quot;There are advantages to a centrally planned structure but eventually it will run into great inefficiencies.&quot;&lt;/p&gt; &lt;p&gt;&lt;img title=&quot;ixm2&quot; src=&quot;http://www.wired.com/images_blogs/gadgetlab/2009/08/ixm2-300x260.jpg&quot; alt=&quot;ixm2&quot; height=&quot;260&quot; width=&quot;300&quot; /&gt;By creating modules, Huynh and his group hope to bring a more parallel and distributed architecture. Cluster-based systems aren&#39;t new. They have been used in high end computing extensively. But with the Illuminato X Machina they hope to extend the idea to a larger community of general PC users.&lt;/p&gt; &lt;p&gt;&quot;The way to think of this is that it is a system with a series of bacteria working together instead of a complex single cell amoeba,&quot; says JP Norair, architect of Dash 7, a new wireless and data standard. An electrical and computer engineering graduate from Princeton University, Norair has studied modular architecture extensively.&lt;/p&gt; &lt;p&gt;Each X Machina module has a 72 MHz processor (currently an ARM chip), a solid state drive of 16KB and 128KB of storage in an EEPROM (electrically erasable programmable read-0nly memory) chip. There&#39;s also an LED for display output and a button for user interaction.&lt;/p&gt; &lt;p&gt;Every module has four edges, and each edge can connect to its neighbors. It doesn&#39;t have sockets, standardized interconnects or a proprietary bus. Instead, the system uses a reversible connector. It&#39;s smart enough to know if it is plugged into a neighbor and can establish the correct power and signal wires to exchange power and information, says Mike Gionfriddo, one of the designers on the project.&lt;/p&gt; &lt;p&gt;The X Machina has software-controlled switches to gate the power moving through the system on the fly and a &#39;jumping gene&#39; ability, which means executable code can flow directly from one module to another without always involving a PC-based program downloader.&lt;/p&gt; &lt;p&gt;Each Illuminato X Machina node also has a custom boot loader software that allows it to be programmed and reprogrammed by its neighbors, even as the overall system continues to run, explains Huynh. The X Machina creators hope to tie into the ardent Arduino community. Many simple Arduino sketches will run on the X Machina with no source code changes, they say.&lt;/p&gt; &lt;p&gt;Still there are many details that need to be worked out.  Huynh and his group haven&#39;t yet benchmarked the system against traditional PCs to establish exactly how the two compare in terms of power consumption and speeds.  The lack of benchmarking also means that they have no data yet on how the computing power of an X Machina array  compares to a PC with an Intel Core 2 Duo chip.&lt;/p&gt; &lt;p&gt;Programs and applications have also yet to be written for the X Machina to show whether it can be an effective computing system for the kind of tasks most users perform. To answer some of these questions, Ackley plans to introduce the Illuminato X Machina to his class at the University of New Mexico later this month. Ackley hopes students of computer science will help understand how traditional computer programming concepts can be adapted to this new structure.&lt;/p&gt; &lt;p&gt;So far, just the first few steps towards this idea have been taken, says Huynh.&lt;/p&gt; &lt;p&gt;Norair agrees. &quot;If they can successfully get half the power of an Intel chip with a cluster of microcontrollers, it will be a great success,&quot; he says, &quot;because the power consumption can be so low on these clusters and they have a level of robustness we haven&#39;t seen yet.&quot;&lt;/p&gt; &lt;p&gt;&lt;em&gt;See the video to hear David Ackley talk about programming the Illuminato X Machina&lt;/em&gt;.&lt;/p&gt; &lt;p&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://vimeo.com/6156696&quot;&gt;Programming the Illuminato X Machina&lt;/a&gt; from &lt;a href=&quot;http://vimeo.com/user2181283&quot;&gt;Chris Ladden&lt;/a&gt; on &lt;a href=&quot;http://vimeo.com/&quot;&gt;Vimeo&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;em&gt;Photo: Illuminato X Machina/Justin Huynh&lt;/em&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/4183973634249208063/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/hardware-hackers-create-modular.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/4183973634249208063'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/4183973634249208063'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/hardware-hackers-create-modular.html' title='Hardware Hackers Create a Modular Motherboard'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-1270129246853123093</id><published>2009-08-14T15:50:00.002-03:00</published><updated>2009-08-14T15:53:10.359-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="programação"/><title type='text'>8 Regular Expressions You Should Know</title><content type='html'>via &lt;a href=&quot;http://net.tutsplus.com/&quot; class=&quot;f&quot;&gt;Nettuts+&lt;/a&gt; by Vasili on 8/10/09&lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;  &lt;p&gt;Regular expressions are a language of their own. When you learn a new programming language, they&#39;re this little sub-language that makes no sense at first glance. Many times you have to read another tutorial, article, or book just to understand the &quot;simple&quot; pattern described. Today, we&#39;ll review eight regular expressions that you should know for your next coding project.&lt;span&gt;&lt;/span&gt; &lt;/p&gt; &lt;p&gt;&lt;/p&gt; &lt;h2&gt;Background Info on Regular Expressions&lt;/h2&gt; &lt;p&gt;This is what Wikipedia has to say about them:&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;In computing, regular expressions provide a concise and flexible means for identifying strings of text of interest, such as particular characters, words, or patterns of characters. Regular expressions (abbreviated as regex or regexp, with plural forms regexes, regexps, or regexen) are written in a formal language that can be interpreted by a regular expression processor, a program that either serves as a parser generator or examines text and identifies parts that match the provided specification.&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt; Now, that doesn&#39;t really tell me much about the actual patterns. The regexes I&#39;ll be going over today contains characters such as \w, \s, \1, and many others that represent something totally different from what they look like. &lt;/p&gt; &lt;p&gt; If you&#39;d like to learn a little about regular expressions before you continue reading this article, I&#39;d suggest watching the &lt;a href=&quot;http://www.multiurl.com/ga/regexdummies&quot;&gt;Regular Expressions for Dummies&lt;/a&gt; screencast series. &lt;/p&gt; &lt;p&gt; The eight regular expressions we&#39;ll be going over today will allow you to match a(n): username, password, email, hex value (like #fff or #000), &lt;a href=&quot;http://en.wikipedia.org/wiki/Slug_%28typesetting%29&quot;&gt;slug&lt;/a&gt;, URL, IP address, and an HTML tag. As the list goes down, the regular expressions get more and more confusing. The pictures for each regex in the beginning are easy to follow, but the last four are more easily understood by reading the explanation. &lt;/p&gt; &lt;p&gt; The key thing to remember about regular expressions is that they are almost read forwards and backwards at the same time. This sentence will make more sense when we talk about matching HTML tags. &lt;/p&gt; &lt;p&gt; &lt;em&gt;Note:&lt;/em&gt; The delimiters used in the regular expressions are forward slashes, &quot;/&quot;. Each pattern begins and ends with a delimiter. If a forward slash appears in a regex, we must escape it with a backslash: &quot;\/&quot;. &lt;/p&gt; &lt;h2&gt;Matching a Username&lt;/h2&gt; &lt;div&gt;&lt;img src=&quot;http://nettuts.s3.amazonaws.com/404_regularExpressions/images/username.jpg&quot; alt=&quot;Matching a username&quot; /&gt;&lt;/div&gt; &lt;h4&gt;Pattern:&lt;/h4&gt; &lt;pre name=&quot;code&quot;&gt;/^[a-z0-9_-]{3,16}$/&lt;/pre&gt; &lt;h4&gt;Description:&lt;/h4&gt; &lt;p&gt; We begin by telling the parser to find the beginning of the string (^), followed by any lowercase letter (a-z), number (0-9), an underscore, or a hyphen. Next, {3,16} makes sure that are at least 3 of those characters, but no more than 16. Finally, we want the end of the string ($).&lt;/p&gt; &lt;h4&gt;String that matches:&lt;/h4&gt; &lt;p&gt;my-us3r_n4m3&lt;/p&gt; &lt;h4&gt;String that doesn&#39;t match:&lt;/h4&gt; &lt;p&gt;th1s1s-wayt00_l0ngt0beausername (too long)&lt;/p&gt; &lt;h2&gt;Matching a Password&lt;/h2&gt; &lt;div&gt;&lt;img src=&quot;http://nettuts.s3.amazonaws.com/404_regularExpressions/images/password.jpg&quot; alt=&quot;Matching a password&quot; /&gt;&lt;/div&gt; &lt;h4&gt;Pattern:&lt;/h4&gt; &lt;pre name=&quot;code&quot;&gt;/^[a-z0-9_-]{6,18}$/&lt;/pre&gt; &lt;h4&gt;Description:&lt;/h4&gt; &lt;p&gt; Matching a password is very similar to matching a username. The only difference is that instead of 3 to 16 letters, numbers, underscores, or hyphens, we want 6 to 18 of them ({6,18}).&lt;/p&gt; &lt;h4&gt;String that matches:&lt;/h4&gt; &lt;p&gt; myp4ssw0rd&lt;/p&gt; &lt;h4&gt;String that doesn&#39;t match:&lt;/h4&gt; &lt;p&gt;mypa$$w0rd (contains a dollar sign)&lt;/p&gt; &lt;h2&gt;Matching a Hex Value&lt;/h2&gt; &lt;div&gt;&lt;img src=&quot;http://nettuts.s3.amazonaws.com/404_regularExpressions/images/hex-copy.jpg&quot; alt=&quot;Matching a hex valud&quot; /&gt;&lt;/div&gt; &lt;h4&gt;Pattern:&lt;/h4&gt; &lt;pre name=&quot;code&quot;&gt;/^#?([a-f0-9]{6}|[a-f0-9]{3})$/&lt;/pre&gt; &lt;h4&gt;Description:&lt;/h4&gt; &lt;p&gt;We begin by telling the parser to find the beginning of the string (^). Next, a number sign is optional because it is followed a question mark. The question mark tells the parser that the preceding character — in this case a number sign — is optional, but to be &quot;greedy&quot; and capture it if it&#39;s there. Next, inside the first group (first group of parentheses), we can have two different situations. The first is any lowercase letter between a and f or a number six times. The vertical bar tells us that we can also have three lowercase letters between a and f or numbers instead. Finally, we want the end of the string ($). &lt;/p&gt; &lt;p&gt; The reason that I put the six character before is that parser will capture a hex value like #ffffff. If I had reversed it so that the three characters came first, the parser would only pick up #fff and not the other three f&#39;s. &lt;/p&gt; &lt;h4&gt;String that matches:&lt;/h4&gt; &lt;p&gt;#a3c113&lt;/p&gt; &lt;h4&gt;String that doesn&#39;t match:&lt;/h4&gt; &lt;p&gt;#4d82h4 (contains the letter h)&lt;/p&gt; &lt;h2&gt;Matching a Slug&lt;/h2&gt; &lt;div&gt;&lt;img src=&quot;http://nettuts.s3.amazonaws.com/404_regularExpressions/images/slug.jpg&quot; alt=&quot;Matching a slug&quot; /&gt;&lt;/div&gt; &lt;h4&gt;Pattern:&lt;/h4&gt; &lt;pre name=&quot;code&quot;&gt;/^[a-z0-9-]+$/&lt;/pre&gt; &lt;h4&gt;Description:&lt;/h4&gt; &lt;p&gt;You will be using this regex if you ever have to work with mod_rewrite and pretty URL&#39;s. We begin by telling the parser to find the beginning of the string (^), followed by one or more (the plus sign) letters, numbers, or hyphens. Finally, we want the end of the string ($). &lt;/p&gt; &lt;h4&gt;String that matches:&lt;/h4&gt; &lt;p&gt; my-title-here&lt;/p&gt; &lt;h4&gt;String that doesn&#39;t match:&lt;/h4&gt; &lt;p&gt;my_title_here (contains underscores)&lt;/p&gt; &lt;h2&gt;Matching an Email&lt;/h2&gt; &lt;div&gt;&lt;img src=&quot;http://nettuts.s3.amazonaws.com/404_regularExpressions/images/email.jpg&quot; alt=&quot;Matching an email&quot; /&gt;&lt;/div&gt; &lt;h4&gt;Pattern:&lt;/h4&gt; &lt;pre name=&quot;code&quot;&gt;/^([a-z0-9_\.-]+)@([\da-z\.-]+)\.([a-z\.]{2,6})$/&lt;/pre&gt; &lt;h4&gt;Description:&lt;/h4&gt; &lt;p&gt;We begin by telling the parser to find the beginning of the string (^). Inside the first group, we match one or more lowercase letters, numbers, underscores, dots, or hyphens. I have escaped the dot because a non-escaped dot means any character. Directly after that, there must be an at sign. Next is the domain name which must be: one or more lowercase letters, numbers, underscores, dots, or hyphens. Then another (escaped) dot, with the extension being two to six letters or dots. I have 2 to 6 because of the country specific TLD&#39;s (.ny.us or .co.uk). Finally, we want the end of the string ($). &lt;/p&gt; &lt;h4&gt;String that matches:&lt;/h4&gt; &lt;p&gt; john@doe.com&lt;/p&gt; &lt;h4&gt;String that doesn&#39;t match:&lt;/h4&gt; &lt;p&gt;john@doe.something (TLD is too long)&lt;/p&gt; &lt;h2&gt;Matching a URL&lt;/h2&gt; &lt;div&gt;&lt;img src=&quot;http://nettuts.s3.amazonaws.com/404_regularExpressions/images/url.jpg&quot; alt=&quot;Matching a url&quot; /&gt;&lt;/div&gt; &lt;h4&gt;Pattern:&lt;/h4&gt; &lt;pre name=&quot;code&quot;&gt;/^(https?:\/\/)?([\da-z\.-]+)\.([a-z\.]{2,6})([\/\w \.-]*)*\/?$/&lt;/pre&gt; &lt;h4&gt;Description:&lt;/h4&gt; &lt;p&gt;This regex is almost like taking the ending part of the above regex, slapping it between &quot;http://&quot; and some file structure at the end. It sounds a lot simpler than it really is. To start off, we search for the beginning of the line with the caret.&lt;/p&gt; &lt;p&gt; The first capturing group is all option. It allows the URL to begin with &quot;http://&quot;, &quot;https://&quot;, or neither of them. I have a question mark after the s to allow URL&#39;s that have http or https. In order to make this entire group optional, I just added a question mark to the end of it. &lt;/p&gt; &lt;p&gt; Next is the domain name: one or more numbers, letters, dots, or hypens followed by another dot then two to six letters or dots. The following section is the optional files and directories. Inside the group, we want to match any number of forward slashes, letters, numbers, underscores, spaces, dots, or hyphens. Then we say that this group can be matched as many times as we want. Pretty much this allows multiple directories to be matched along with a file at the end. I have used the star instead of the question mark because the star says zero &lt;strong&gt;or more&lt;/strong&gt;, not zero &lt;strong&gt;or one&lt;/strong&gt;. If a question mark was to be used there, only one file/directory would be able to be matched. &lt;/p&gt; &lt;p&gt; Then a trailing slash is matched, but it can be optional. Finally we end with the end of the line. &lt;/p&gt; &lt;h4&gt;String that matches:&lt;/h4&gt; &lt;p&gt; http://net.tutsplus.com/about&lt;/p&gt; &lt;h4&gt;String that doesn&#39;t match:&lt;/h4&gt; &lt;p&gt; http://google.com/some/file!.html (contains an exclamation point)&lt;/p&gt; &lt;h2&gt;Matching an IP Address&lt;/h2&gt; &lt;div&gt;&lt;img src=&quot;http://nettuts.s3.amazonaws.com/404_regularExpressions/images/ip.jpg&quot; alt=&quot;Matching an IP address&quot; /&gt;&lt;/div&gt; &lt;h4&gt;Pattern:&lt;/h4&gt; &lt;pre name=&quot;code&quot;&gt;/^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$/&lt;/pre&gt; &lt;h4&gt;Description:&lt;/h4&gt; &lt;p&gt;Now, I&#39;m not going to lie, I didn&#39;t write this regex; I got it from &lt;a href=&quot;http://www.regular-expressions.info/regexbuddy/ipaccurate.html&quot;&gt;here&lt;/a&gt;. Now, that doesn&#39;t mean that I can&#39;t rip it apart character for character.&lt;/p&gt; &lt;p&gt; The first capture group really isn&#39;t a captured group because &lt;/p&gt;&lt;pre name=&quot;code&quot;&gt;?:&lt;/pre&gt; &lt;p&gt; was placed inside which tells the parser to not capture this group (more on this in the last regex). We also want this non-captured group to be repeated three times — the {3} at the end of the group. This group contains another group, a subgroup, and a literal dot. The parser looks for a match in the subgroup then a dot to move on. &lt;/p&gt; &lt;p&gt; The subgroup is also another non-capture group. It&#39;s just a bunch of character sets (things inside brackets): the string &quot;25″ followed by a number between 0 and 5; or the string &quot;2″ and a number between 0 and 4 and any number; or an optional zero or one followed by two numbers, with the second being optional. &lt;/p&gt; &lt;p&gt; After we match three of those, it&#39;s onto the next non-capturing group. This one wants: the string &quot;25″ followed by a number between 0 and 5; or the string &quot;2″ with a number between 0 and 4 and another number at the end; or an optional zero or one followed by two numbers, with the second being optional. &lt;/p&gt; &lt;p&gt; We end this confusing regex with the end of the string. &lt;/p&gt; &lt;h4&gt;String that matches:&lt;/h4&gt; &lt;p&gt;73.60.124.136 (no, that is not my IP address &lt;img src=&quot;http://net.tutsplus.com/wp-includes/images/smilies/icon_razz.gif&quot; alt=&quot;:P&quot; /&gt; )&lt;/p&gt; &lt;h4&gt;String that doesn&#39;t match:&lt;/h4&gt; &lt;p&gt;256.60.124.136 (the first group must be &quot;25″ and a number between zero and &lt;strong&gt;five&lt;/strong&gt;)&lt;/p&gt; &lt;h2&gt;Matching an HTML Tag&lt;/h2&gt; &lt;div&gt;&lt;img src=&quot;http://nettuts.s3.amazonaws.com/404_regularExpressions/images/htmltag.jpg&quot; alt=&quot;Matching an HTML tag&quot; /&gt;&lt;/div&gt; &lt;h4&gt;Pattern:&lt;/h4&gt; &lt;pre name=&quot;code&quot;&gt;/^&amp;lt;([a-z]+)([^&amp;lt;]+)*(?:&amp;gt;(.*)&amp;lt;\/\1&amp;gt;|\s+\/&amp;gt;)$/&lt;/pre&gt; &lt;h4&gt;Description:&lt;/h4&gt; &lt;p&gt;One of the more useful regexes on the list. It matches any HTML tag with the content inside. As usually, we begin with the start of the line. &lt;/p&gt; &lt;p&gt; First comes the tag&#39;s name. It must be one or more letters long. This is the first capture group, it comes in handy when we have to grab the closing tag. The next thing are the tag&#39;s attributes. This is any character but a greater than sign (&amp;gt;). Since this is optional, but I want to match more than one character, the star is used. The plus sign makes up the attribute and value, and the star says as many attributes as you want. &lt;/p&gt; &lt;p&gt; Next comes the third non-capture group. Inside, it will contain either a greater than sign, some content, and a closing tag; or some spaces, a forward slash, and a greater than sign. The first option looks for a greater than sign followed by any number of characters, and the closing tag. \1 is used which represents the content that was captured in the first capturing group. In this case it was the tag&#39;s name. Now, if that couldn&#39;t be matched we want to look for a self closing tag (like an img, br, or hr tag). This needs to have one or more spaces followed by &quot;/&amp;gt;&quot;. &lt;/p&gt; &lt;p&gt; The regex is ended with the end of the line. &lt;/p&gt; &lt;h4&gt;String that matches:&lt;/h4&gt; &lt;p&gt; &amp;lt;a href=&quot;http://net.tutsplus.com/&quot;&amp;gt;Nettuts+&amp;lt;/a&amp;gt;&lt;/p&gt; &lt;h4&gt;String that doesn&#39;t match:&lt;/h4&gt; &lt;p&gt;&amp;lt;img src=&quot;img.jpg&quot; alt=&quot;My image&amp;gt;&quot; /&amp;gt; (attributes can&#39;t contain greater than signs)&lt;/p&gt; &lt;h2&gt;Conclusion&lt;/h2&gt; &lt;p&gt; I hope that you have grasped the ideas behind regular expressions a little bit better. Hopefully you&#39;ll be using these regexes in future projects! Many times you won&#39;t need to decipher a regex character by character, but sometimes if you do this it helps you learn. Just remember, don&#39;t be afraid of regular expressions, they might not seem it, but they make your life a lot easier. Just try and pull out a tag&#39;s name from a string without regular expressions! &lt;img src=&quot;http://net.tutsplus.com/wp-includes/images/smilies/icon_wink.gif&quot; alt=&quot;;)&quot; /&gt; &lt;/p&gt; &lt;ul&gt; &lt;li&gt;Follow us on &lt;a href=&quot;http://www.twitter.com/nettuts&quot;&gt;Twitter&lt;/a&gt;, or subscribe to the &lt;a href=&quot;http://feeds.feedburner.com/nettuts&quot; title=&quot;NETTUTS RSS Feed&quot;&gt;NETTUTS RSS Feed&lt;/a&gt; for more daily web development tuts and articles.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/1270129246853123093/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/8-regular-expressions-you-should-know.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/1270129246853123093'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/1270129246853123093'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/8-regular-expressions-you-should-know.html' title='8 Regular Expressions You Should Know'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-1136031902529540544</id><published>2009-08-14T15:26:00.002-03:00</published><updated>2009-08-14T15:43:54.641-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="produtividade"/><title type='text'>Five Classic Ways to Boost Your Note-Taking [Back To School]</title><content type='html'>&lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0.5em;&quot;&gt;via &lt;a href=&quot;http://lifehacker.com/&quot; class=&quot;f&quot;&gt;Lifehacker&lt;/a&gt; by Adam Pash on 8/12/09&lt;/div&gt;  &lt;p&gt;&lt;a rel=&quot;lytebox&quot; href=&quot;http://cache.gawker.com/assets/images/lifehacker/2009/08/notes.jpg&quot;&gt;&lt;img src=&quot;http://cache.gawker.com/assets/images/17/2009/08/504x_notes.jpg&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;If your note-taking skills are suffering from summertime rigor mortis, now&#39;s as good a time as any to throw a new technique into the mix. Let&#39;s take a look at some new and old tools for improving your ballpoint repertoire.&lt;/p&gt; &lt;p&gt;&lt;i&gt;Photo by &lt;a href=&quot;http://www.flickr.com/photos/restlessglobetrotter/498649407/&quot;&gt;JasonRogersFooDogGiraffeBee&lt;/a&gt;&lt;/i&gt;.&lt;/p&gt; &lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;The Cornell method&lt;/h3&gt; &lt;p&gt;This oldie is a highly-regarded, very common system that makes it especially easier to retain information. By reviewing things as you go, you might even get away with less studying.&lt;/p&gt; &lt;p&gt;Divide your page into two columns. The left one (which could also just be the back of the previous page in your notebook) is narrower. You&#39;re going to jot larger ideas in this column: the 5-dollar-words and big bullet points. In the right column, you&#39;re going to take down as much information as possible. The right column is allowed to be messy, have pictures and tables—it&#39;s not necessarily organized. To some students, it&#39;s just regular notes. But as you go, record the main corresponding idea in the left column.&lt;/p&gt; &lt;p&gt;Every so often, cover the detailed notes on the right and just examine the main points and new vocab. See how much you can recite and explain in your own words. Then remove your hand and see how you did. Depending on the teacher, you might do this during lulls in the discussion or after class.&lt;/p&gt; &lt;p&gt;Some versions of the Cornell system leave the last few lines on each page for summarizing the whole page. Since what&#39;s on a given page doesn&#39;t necessarily group together nicely, I don&#39;t recommend doing it. But summarizing can help you with wading through piles of pages when studying time comes.&lt;/p&gt; &lt;p&gt;For a more in-depth look at the Cornell method, take a look at our &lt;a href=&quot;http://lifehacker.com/202418/geek-to-live--take-study+worthy-lecture-notes&quot;&gt;previous guide to taking study-worthy lecture notes&lt;/a&gt;.&lt;/p&gt; &lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Go visual&lt;/h3&gt; &lt;p&gt;It&#39;s tough to enter a classroom with colored pencils and still expect your fellow students to take you seriously. But unless you try it, you&#39;ll never know if it works better for you. Forget the status-quo and try something visual. Color-code with different pens, pencils, and highlighters. You might not have seen a web-style map of ideas since elementary school, but &lt;a href=&quot;http://lifehacker.com/398476/boost-your-brainstorming-session-with-mindmeister&quot;&gt;mind-mapping is hailed as quite an efficient way to group data&lt;/a&gt;. It needn&#39;t even be a rigid classification system—anything is better than doodling in the margins.&lt;/p&gt; &lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Switch mediums&lt;/h3&gt; &lt;p&gt;For how tech-savvy our generation is, I still see surprisingly few laptops in classrooms. Try it out a few times and see if you like it. Particularly, if you&#39;re the type who outlines, computers let you go back and organize information on-the-fly. Laptops also let you and your classmates AIM with real-time questions about &lt;strike&gt;the opposite sex&lt;/strike&gt; the lecture. There are also programs made just for taking notes, sharing them, organizing them, etc. Wikipedia has a &lt;a href=&quot;http://en.wikipedia.org/wiki/Comparison_of_notetaking_software&quot;&gt;great table&lt;/a&gt; that compares them all, or you can take a look at &lt;a href=&quot;http://lifehacker.com/399556/five-best-note+taking-tools&quot;&gt;Lifehacker reader&#39;s favorite note-taking tools&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;On the other hand, if you already use a laptop, try the pen-and-paper route again. Let loose a bit and see how that goes. Try scribbling out mistakes and drawing arrows everywhere. Or try one of the visual techniques above, most of which are difficult on a computer.&lt;/p&gt; &lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Shorthand&lt;/h3&gt; &lt;p&gt;Notes are probably the only place in the classroom where internet slang is commendable. Trying some new shorthand is a really geeky way to slightly tweak your engravings and get you amped about taking notes again. Here are a few resources to get you started:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.alysion.org/handy/althandwriting.htm&quot;&gt;A Guide to Alternative Handwriting and Shorthand Systems&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://shorthandshorthandshorthand.com/&quot;&gt;Shorthand Shorthand Shorthand&lt;/a&gt;&lt;/p&gt; &lt;p&gt;My favorite method is called &lt;a href=&quot;http://en.wikipedia.org/wiki/Teeline&quot;&gt;Teeline&lt;/a&gt;—anyone can look at this one and learn a few things. It&#39;s mostly based around removing unimportant letters and making complex letters easier to write quickly.&lt;/p&gt; &lt;p&gt;Instead of converting entirely to shorthand, you might try translating just some of your most-frequently used words into a shorthand &quot;language&quot; that takes less time to write.&lt;/p&gt; &lt;p&gt;If you&#39;re taking notes on the computer, &lt;a href=&quot;http://lifehacker.com/5164933/use-texter-to-supercharge-your-repetitive-typing&quot;&gt;supercharge your repetitive typing&lt;/a&gt; with tools like our very own text-replacement application &lt;a href=&quot;http://lifehacker.com/software/texter/lifehacker-code-texter-windows-238306.php&quot;&gt;Texter&lt;/a&gt; (Windows) or &lt;a href=&quot;http://www.smileonmymac.com/TextExpander/&quot;&gt;TextExpander&lt;/a&gt; (Mac).&lt;/p&gt; &lt;h3 style=&quot;font-size: 120%; margin-top: 20px;&quot;&gt;Don&#39;t&lt;/h3&gt; &lt;p&gt;Oh goodness! Don&#39;t take notes? How controversial!&lt;/p&gt; &lt;p&gt;Well, it couldn&#39;t hurt to relax every once in a while. Especially in small classes and seminar situations, staying engaged through discussion and questions might do you better than scribbling every word.&lt;/p&gt; &lt;p&gt;Here&#39;s another way to avoid taking notes: Record your lectures. Digital recorders can capture hours of audio. Sit back and just listen. After class, you can play it back at double-speed and take notes in half the time. Take that, engineers!&lt;/p&gt; &lt;p&gt;&lt;em&gt;The school-bound productivity nuts at weblog &lt;a href=&quot;http://www.hackcollege.com/&quot;&gt;HackCollege&lt;/a&gt; will be joining us all week to offer their perspective on making the most of your Back to School regimen.&lt;/em&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/1136031902529540544/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/five-classic-ways-to-boost-your-note.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/1136031902529540544'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/1136031902529540544'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/five-classic-ways-to-boost-your-note.html' title='Five Classic Ways to Boost Your Note-Taking [Back To School]'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-8957725449986077992</id><published>2009-08-11T09:50:00.002-03:00</published><updated>2009-08-11T09:59:14.600-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fotografia"/><title type='text'>How to Photograph Abandoned Places</title><content type='html'>&lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;via &lt;a href=&quot;http://digital-photography-school.com/&quot; class=&quot;f&quot;&gt;Digital Photography School&lt;/a&gt; by Guest Contributor on 8/10/09  &lt;p&gt;Abandoned buildings have become one of my favorite subjects to photograph.  Over time, I have collected a handful of useful tips to get the most out of shooting in these environments.&lt;/p&gt; &lt;h3&gt;Bring a Flashlight&lt;/h3&gt; &lt;p&gt;The single most important tip I can provide anyone planning on visiting an abandoned building is to bring a flashlight.  Most of these locations are without electricity and will have limited natural light.  As such, you&#39;ll need a flashlight to help navigate the dark rooms and corridors that you will encounter.&lt;/p&gt; &lt;p&gt;Beyond its more obvious application, a flashlight can also provide an interesting source of off-camera lighting.  I have a small LED flashlight that I carry on my camera bag and it is often used to light up an area of a room during a long exposure shot.  While a strobe can certainly be effective for many of these situations, a flashlight allows for a high degree of precision with the light.  You can directly control exactly what is lit and for how long.  A flashlight can also add an element of movement to the lighting that will result in an unusual combination of shadows that a flash otherwise may not.&lt;/p&gt; &lt;p&gt;It takes some practice to get a feel for how much light is enough, but with some work the results can be very satisfying.&lt;/p&gt; &lt;div style=&quot;width: 610px;&quot;&gt;&lt;a href=&quot;http://www.flickr.com/photos/zero101/3498123555/&quot;&gt;&lt;img src=&quot;http://digital-photography-school.com/wp-content/uploads/2009/08/stairwell.jpg&quot; alt=&quot;Stairwell by Chris Folsom&quot; title=&quot;stairwell&quot; width=&quot;600&quot; height=&quot;402&quot; /&gt;&lt;/a&gt;&lt;p&gt;Stairwell by Chris Folsom&lt;/p&gt;&lt;/div&gt;  &lt;h3&gt;Tripod not Optional&lt;/h3&gt; &lt;p&gt;Because of the aforementioned lighting conditions, it goes without saying that you will need a tripod.  More than half of the photos I take at these locales are shot on a tripod with a long exposure of anywhere from a couple of seconds to as much as 20 or 30 seconds.&lt;/p&gt; &lt;p&gt;For those instances when I don&#39;t have my camera on a tripod, image stabilization and fast lenses help as well.  My favorite lens is a 17-50mm f/2.8 paired with my camera&#39;s in-body stabilized sensor.  Wide open, I can usually get a relatively sharp image at 1/10th of a second.  More often than not though, the best results will come from shooting on a tripod.&lt;br /&gt; &lt;/p&gt;&lt;div style=&quot;margin-bottom: 15px;&quot; align=&quot;center&quot;&gt;   &lt;/div&gt; &lt;p&gt;&lt;/p&gt; &lt;h3&gt;Control the Exposure&lt;/h3&gt; &lt;p&gt;I am not one who believes all serious photographers should shoot in manual 100% of the time.  There are plenty of instances where I am confident that the camera will properly meter the lighting and autopilot mode is fine.  Unfortunately, that tactic will not work in most abandoned buildings.&lt;br /&gt;&lt;br /&gt;Because of the extreme lighting conditions of these spaces, you&#39;ll need to control all aspects of the shot.  In the photo shown here, for example, I needed to control the aperture (I wanted this fairly sharp from front to back) and I needed to control the shutter speed to ensure proper lighting.  So, in this case I shot for 30 seconds at f/8.  This particular image is also another example of the flashlight technique described above… I used it to highlight and bring attention to the chairs while leaving the walls to be lit by the little bit of light coming from the window.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;width: 610px;&quot;&gt;&lt;a href=&quot;http://www.flickr.com/photos/zero101/3753426996/&quot;&gt;&lt;img src=&quot;http://digital-photography-school.com/wp-content/uploads/2009/08/auditorium.jpg&quot; alt=&quot;Auditorium by Chris Folsom&quot; title=&quot;auditorium&quot; width=&quot;600&quot; height=&quot;402&quot; /&gt;&lt;/a&gt;&lt;p&gt;Auditorium by Chris Folsom&lt;/p&gt;&lt;/div&gt; &lt;h3&gt;Go Wide&lt;/h3&gt; &lt;p&gt;A wide angle lens can really add to the sense of emptiness and foreboding in these buildings.  The photo shown below was taken by a friend of mine with a 10-22mm lens at 10mm.  Having something that can go wide in the small areas you&#39;ll be photographing can be a huge benefit.&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;width: 410px;&quot;&gt;&lt;a href=&quot;http://www.flickr.com/photos/headsoak/3753456592/&quot;&gt;&lt;img src=&quot;http://digital-photography-school.com/wp-content/uploads/2009/08/lobby.jpg&quot; alt=&quot;The Lobby by Jonathan Mowry&quot; title=&quot;lobby&quot; width=&quot;400&quot; height=&quot;600&quot; /&gt;&lt;/a&gt;&lt;p&gt;The Lobby by Jonathan Mowry&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt; &lt;h3&gt;Emphasize the Mood&lt;/h3&gt; &lt;p&gt;Use creative angles and perspectives to play up the natural character of the buildings.  Get your camera low to the ground and shoot upwards to emphasize the vastness of a room, or shoot an angle to heighten the sense of disorientation.  As a photographer you are telling the story of the place you are in and even a subtle shift of the camera&#39;s perspective can make a huge impact on the mood of the photo.&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;width: 610px;&quot;&gt;&lt;a href=&quot;http://www.flickr.com/photos/zero101/3269499889/&quot;&gt;&lt;img src=&quot;http://digital-photography-school.com/wp-content/uploads/2009/08/mouth-of-madness.jpg&quot; alt=&quot;Mouth of Madness by Chris Folsom&quot; title=&quot;mouth-of-madness&quot; width=&quot;600&quot; height=&quot;402&quot; /&gt;&lt;/a&gt;&lt;p&gt;Mouth of Madness by Chris Folsom&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt; &lt;h3&gt;Focus on the Details&lt;/h3&gt; &lt;p&gt;While it is easy to get caught up in the architecture, try to also pay attention to the discarded items and details in the area as well.  Chairs, books, phones and other remnants from days gone by can provide a powerful centerpiece to the image.   Focusing on a single object can also act as an anchor in an otherwise chaotic environment.&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;width: 610px;&quot;&gt;&lt;a href=&quot;http://www.flickr.com/photos/zero101/3321415112&quot;&gt;&lt;img src=&quot;http://digital-photography-school.com/wp-content/uploads/2009/08/lost-art.jpg&quot; alt=&quot;Lost Art by Chris Folsom&quot; title=&quot;lost-art&quot; width=&quot;600&quot; height=&quot;402&quot; /&gt;&lt;/a&gt;&lt;p&gt;Lost Art by Chris Folsom&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt; &lt;p&gt;My final tip is for you to be careful while exploring these buildings.  No photograph is worth endangering yourself, so take extreme precaution whenever you enter an unfamiliar location.  Be safe and happy shooting!&lt;br /&gt;&lt;br /&gt;&lt;i&gt;&lt;img src=&quot;http://digital-photography-school.com/wp-content/uploads/2009/08/chrisfolsom.jpg&quot; alt=&quot;chrisfolsom&quot; title=&quot;chrisfolsom&quot; width=&quot;80&quot; height=&quot;80&quot; /&gt;Chris Folsom is a hobbyist photographer who spends much of his time photographing buildings that are no longer in use.  You can view his site at &lt;a href=&quot;http://www.studiotempura.com/&quot;&gt;studiotempura.com&lt;/a&gt; or &lt;a href=&quot;http://www.flickr.com/photos/zero101/&quot;&gt;see more of his photos at Flickr&lt;/a&gt;.  His photos have been published on numerous websites and newspapers.&lt;/i&gt;&lt;/p&gt; &lt;p&gt;Post from: &lt;a href=&quot;http://digital-photography-school.com/&quot;&gt;Digital Photography School - Photography Tips&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://digital-photography-school.com/how-to-photograph-abandoned-places&quot;&gt;How to Photograph Abandoned Places&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/8957725449986077992/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/how-to-photograph-abandoned-places.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8957725449986077992'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/8957725449986077992'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/how-to-photograph-abandoned-places.html' title='How to Photograph Abandoned Places'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-4330009810252984290</id><published>2009-08-10T16:27:00.002-03:00</published><updated>2009-08-10T16:29:55.395-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hardware"/><title type='text'>eXtreme Power Suppply Calculator Helps Accurately Select a PSU  [Hardware]</title><content type='html'>&lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;margin-bottom: 0.5em;&quot;&gt;via &lt;a href=&quot;http://lifehacker.com/&quot; class=&quot;f&quot;&gt;Lifehacker&lt;/a&gt; by Jason Fitzpatrick on 8/10/09&lt;/div&gt;  &lt;p&gt;&lt;a rel=&quot;lytebox&quot; href=&quot;http://cache.gawker.com/assets/images/lifehacker/2009/08/2009-08-10_114900_01.jpg&quot;&gt;&lt;img src=&quot;http://cache.gawker.com/assets/images/17/2009/08/504x_2009-08-10_114900_01.jpg&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;If you &lt;a href=&quot;http://lifehacker.com/5313141/power-supply-calculator-figures-out-what-size-psu-to-buy&quot;&gt;checked out the PSU calculator we shared with you&lt;/a&gt; and wished it had a more detailed selection process for really granular and precise control, you&#39;ll definitely want to check out the eXtreme Power Supply Calculator.&lt;/p&gt; &lt;p&gt;The calculator in the link above is great for a quick estimate, but what if you want to be able to run a more detailed calculation before purchasing your new PSU? The eXtreme PSU calculator pulls from a very detailed database of parts to give you a more accurate estimate. During our testing we were able to select the exact CPU and graphics card, for example, that our test system was running.&lt;/p&gt; &lt;p&gt;There are dozens of variables you can set within the Lite version of the calculator, for even more options there is a $1.99 premium version of the calculator with even more settings for your calculating pleasure. &lt;em&gt;Thanks Erik!&lt;/em&gt;&lt;/p&gt; &lt;div&gt;&lt;a href=&quot;http://extreme.outervision.com/PSUEngine&quot;&gt;eXtreme Power Supply Calculator Lite&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/4330009810252984290/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/extreme-power-suppply-calculator-helps.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/4330009810252984290'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/4330009810252984290'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/extreme-power-suppply-calculator-helps.html' title='eXtreme Power Suppply Calculator Helps Accurately Select a PSU  [Hardware]'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-6242579376955961321</id><published>2009-08-10T12:20:00.003-03:00</published><updated>2009-08-10T16:30:25.341-03:00</updated><title type='text'>Moleque resolvendo dois cubos mágicos ENQUANTO toca Guitar Hero no Expert</title><content type='html'>&lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt;  &lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;h2 style=&quot;margin: 0.25em 0pt 0pt;&quot;&gt;&lt;div class=&quot;&quot;&gt;&lt;a href=&quot;http://www.gizmodo.com.br/conteudo/moleque-resolvendo-dois-cubos-magicos-enquanto-toca-guitar-hero-no-expert&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/h2&gt; &lt;div style=&quot;margin-bottom: 0.5em;&quot;&gt;via &lt;a href=&quot;http://www.gizmodo.com.br/&quot; class=&quot;f&quot;&gt;Gizmodo Brasil&lt;/a&gt; by Pedro Burgos on 8/9/09&lt;/div&gt;  &lt;p&gt;O que o Youtube criou, meu Deus?&lt;/p&gt; &lt;p&gt;   &lt;embed src=&quot;http://www.youtube.com/v/pUdXhhDDnaY&amp;amp;rel=0&amp;amp;color1=0xb1b1b1&amp;amp;color2=0xcfcfcf&amp;amp;feature=player_profilepage&amp;amp;fs=1&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;never&quot; wmode=&quot;transparent&quot; type=&quot;application/x-shockwave-flash&quot; height=&quot;344&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/p&gt; &lt;p&gt;Sério. Qual o motivo de um cara treinar resolver um cubo mágico (ou dois!) enquanto toca Guitar Hero World Tour no Expert? &quot;Melhorar a coordenação e a musculatura do cotovelo&quot;, você pode apontar. &quot;É um exercício que os psicólogos passam hoje para curar crianças com déficit de atenção&quot;, uma prima da sua amiga que estuda psicologia dá o pitaco.&lt;/p&gt; &lt;p&gt;Mas não. A ideia é só colocar a façanha no Youtube e ver quantos % falam &quot;você precisa fazer sexo&quot; (mesmo que ele tenha aparentemente 16 anos), quantos escrevem &quot;AWESOME&quot; e quantos duvidam de alguma das coisas. &quot;Foi tudo photoshopado&quot;.&lt;/p&gt; &lt;p&gt;Ah, sim, como você pode ver pela terrível execução de Mr. Crowley, do Ozzy, a especialidade do JRefleX93 é resolver Cubos Mágicos. O recorde dele no tradicional 3x3 é 16.44 segundos. Um pouco menos que o tempo que eu levo&lt;span style=&quot;font-size:small;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color: rgb(255, 255, 255);&quot;&gt;&lt;span style=&quot;font-size:small;&quot;&gt;para comer um hamburguer do McDonald&#39;s&lt;/span&gt;&lt;/span&gt;. Como fazer isso sem estudar meticulosamente o cubo (perceba que ele olha pouco para o negócio): é &quot;só&quot; usar o &lt;a href=&quot;http://cubomagicobrasil.com/forum/index.php?showtopic=233&quot;&gt;Método Fridrich&lt;/a&gt;. Moleza. [Via &lt;a href=&quot;http://continue.com.br/07/08/2009/tube-do-dia-ele-joga-guitar-hero-no-expert-e-resolve-dois-cubos-magicos-ao-mesmo-tempo&quot;&gt;Continue&lt;/a&gt;]&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/6242579376955961321/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/moleque-resolvendo-dois-cubos-magicos.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/6242579376955961321'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/6242579376955961321'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/moleque-resolvendo-dois-cubos-magicos.html' title='Moleque resolvendo dois cubos mágicos ENQUANTO toca Guitar Hero no Expert'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-1798798685729119246</id><published>2009-08-10T11:59:00.002-03:00</published><updated>2009-08-10T16:30:38.917-03:00</updated><title type='text'>Chinese Farmer Builds His Own Flying Machine</title><content type='html'>&lt;div style=&quot;margin: 0px 1px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 2px; padding-top: 1px; background-color: rgb(195, 217, 255); font-size: 1px ! important; line-height: 0px ! important;&quot;&gt; &lt;/div&gt; &lt;div style=&quot;margin: 0px 10px; overflow: auto; font-family: sans-serif; width: 100%;&quot;&gt;&lt;h2 style=&quot;margin: 0.25em 0pt 0pt;&quot;&gt;&lt;div class=&quot;&quot;&gt;&lt;a href=&quot;http://feeds.wired.com/%7Er/GearFactor/%7E3/aJ7RohN_2sQ/&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/h2&gt; &lt;div style=&quot;margin-bottom: 0.5em;&quot;&gt;via &lt;a href=&quot;http://www.wired.com/gadgetlab&quot; class=&quot;f&quot;&gt;Wired: Gadget Lab&lt;/a&gt; by Charlie Sorrel on 8/10/09&lt;/div&gt;  &lt;p&gt;&lt;img title=&quot;chinese-farmer-wooden-helicopter-thumb-550x355-21956&quot; src=&quot;http://www.wired.com/images_blogs/gadgetlab/2009/08/chinese-farmer-wooden-helicopter-thumb-550x355-21956.jpg&quot; alt=&quot;chinese-farmer-wooden-helicopter-thumb-550x355-21956&quot; height=&quot;414&quot; width=&quot;640&quot; /&gt;&lt;/p&gt; &lt;p&gt;&quot;I had this dream from childhood of not needing to climb mountains anymore. I wanted to go to school in my own flying machine.&quot;&lt;/p&gt; &lt;p&gt;This was the childhood dream of Wu Zhongyuan, of China&#39;s Henan province. It is also, quite likely, a childhood dream of most you, dear Gadget Lab readers. Unlike you, though, Zhongyuan actually did something about it. He built his own helicopter.&lt;/p&gt; &lt;p&gt;The device, which likely breaks almost every airspace and safety law simultaneously, is made from steel scaffold, has blades cut from Elm and is powered by an old motorcycle engine. Zhongyuan says that the &#39;copter, which took three months and around $1600 to build, can soar to 800 meters (2600 feet). We&#39;re not sure if it can even get airborne, though, as currently the machine is grounded by Chinese authorities.&lt;/p&gt; &lt;p&gt;How did he come up with his ramshackle design? The internet, of course. &quot;I didn&#39;t have a design. The only source for me to get relevant knowledge was surfing the internet via my mobile phone,&quot; he said to news site Ananova. We love it. A personal helicopter is a fantastic project, and we wish Zhongyuan luck getting it off the ground. Of course, we&#39;d never go near the thing. Imagine being half a mile up and when the engine cuts out on you. No thanks.&lt;/p&gt; &lt;p&gt;&lt;a title=&quot;Ananova - Farmer&#39;s home-made helicopter&quot; href=&quot;http://www.ananova.com/news/story/sm_3427238.html?menu=&quot;&gt;Farmer&#39;s home-made helicopter&lt;/a&gt; [Ananova via &lt;a title=&quot;Chinese MacGyver builds working helicopter out of wood | DVICE&quot; href=&quot;http://dvice.com/archives/2009/08/chinese-macgyve.php&quot;&gt;DVICE&lt;/a&gt;]&lt;/p&gt; &lt;p&gt;&lt;a title=&quot;Chinese Farmer Builds A Working Wooden Helicopter - Auto Motto&quot; href=&quot;http://www.automotto.org/entry/chinese-farmer-builds-a-working-wooden-helicopter/&quot;&gt;Chinese farmer builds a working wooden helicopter&lt;/a&gt; [Auto Motto]&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/1798798685729119246/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/chinese-farmer-builds-his-own-flying.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/1798798685729119246'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/1798798685729119246'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/chinese-farmer-builds-his-own-flying.html' title='Chinese Farmer Builds His Own Flying Machine'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-4408214043590731820</id><published>2009-08-10T11:50:00.002-03:00</published><updated>2009-08-10T11:52:48.413-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anúncios"/><title type='text'>Bloging</title><content type='html'>Tá dificil de blogar alguma coisa por aqui, heim ?&lt;br /&gt;&lt;br /&gt;Depois do &lt;a href=&quot;http://twitter.com/wcaprino&quot;&gt;Twitter&lt;/a&gt;, Google Reader, etc, esse blog que ja era pouco atualizado piorou...&lt;br /&gt;&lt;br /&gt;Bom, vou fazer uma ponte dos meus shares do Reader para cá.&lt;br /&gt;&lt;br /&gt;Valeu !</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/4408214043590731820/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/08/bloging.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/4408214043590731820'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/4408214043590731820'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/08/bloging.html' title='Bloging'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7142808.post-2239760276959445624</id><published>2009-07-14T21:25:00.003-03:00</published><updated>2009-07-14T21:28:47.737-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fun"/><title type='text'>Ghostbusters Ecto-1 no e-bay</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://i.ebayimg.com/12/%21BVqELo%21Bmk%7E$%28KGrHgoH-DgEjlLlgJ6SBKTl+K7ekg%7E%7E_3.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 640px; height: 480px;&quot; src=&quot;http://i.ebayimg.com/12/%21BVqELo%21Bmk%7E$%28KGrHgoH-DgEjlLlgJ6SBKTl+K7ekg%7E%7E_3.JPG&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://cgi.ebay.com/ebaymotors/Replica-Kit-Makes-1959-Cadillac_W0QQcmdZViewItemQQ_trkparmsZ65Q3a3Q7c66Q3a2Q7c39Q3a1Q7c293Q3a1Q7c294Q3a50QQ_trksidZp3286Q2ec0Q2em14QQhashZitem45ecea5643QQitemZ300327523907QQptZUSQ5fCarsQ5fTrucksQQsalenotsupported&quot;&gt;Fantasmas, tremei....&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Via: &lt;a href=&quot;http://www.boingboing.net/2009/07/14/ghostbusters-ecto-1.html&quot;&gt;Boing Boing&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://mrbilly.blogspot.com/feeds/2239760276959445624/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://mrbilly.blogspot.com/2009/07/ghostbusters-ecto-1-no-e-bay.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/2239760276959445624'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7142808/posts/default/2239760276959445624'/><link rel='alternate' type='text/html' href='http://mrbilly.blogspot.com/2009/07/ghostbusters-ecto-1-no-e-bay.html' title='Ghostbusters Ecto-1 no e-bay'/><author><name>Willian Caprino</name><uri>http://www.blogger.com/profile/07396238471214094878</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='30' src='http://www.naopod.com.br/images/iss-logo_pb_zero.png'/></author><thr:total>0</thr:total></entry></feed>