Archive for May, 2011

“USA officials are eager to create safe cyberspace”- declared Mrs. Clinton

Tuesday, May 31st, 2011

“USA correlation with other countries will be directed to creating more secure cyberspace. But they won’t stop encouraging web’s openness and accessibility all over the world”- declared Hillary Clinton on Monday introducing new national strategy on cyber security.

Safe Cyberspace

Safe Cyberspace

“Our efforts are directed to creating open but still secure and reliable cyberspace. However there is no easy path to this goal as there is no universal solution. We are to find global agreement and common vision of further cyberspace development in order to be sure it will meet audience’ expectations politically, socially, economically. It can be realized by means of creative and patient diplomacy ”- said state secretary speaking in White House.

New strategy includes seven basic priorities: Economical encouraging of innovations and world trade and simultaneous tightening the protection of intellectual property rights, strengthening net’s cyber security in USA and in the World, intensification of law enforcement activity in cyber security, improvement of international law, building capacity of special services in striking against cyber crimes, international military correlation against cyber danger , creation of Internet control involving several shareholders, assisting countries in developing digital infrastructure and support of web freedom.

“We are eager to do our best in protection private life and providing fundamental freedoms, including the freedom of expression, freedom of assembly-exactly the same way we do it in off line. These are seven priorities of new program for State Department ” – noted state secretary.

She recalled in order to coordinate this procedure there was established office of special representative on cyber security at the State Department . Chris Painter an expert in this sphere took the position.


Sarkozy Offers to Control the Internet

Friday, May 27th, 2011
Sarkozy Offers to Control the Internet

Sarkozy Offers to Control the Internet

During the G8 summit Sarkozy pointed out the importance of Internet communication development and fight against cybercrime.

Unlike the meeting of the Group of Eight such meetings provide the issues of World Wild Web development.

Awareness of Internet potential in the case of Arabian events , understanding that problems for international discussing gather a large Internet audience provoked Sarkozy’s activeness.

“The world you represent, – declared French leader to all gathers, - is not the parallel universe with no moral, legal standards which govern the democratic countries”.

Sarkozy intends to tighten the bounds of the law in France, for example against illegal file exchange all over the world. “No one must suffer from unpunished expropriations of ideas, arts, intellectual property”.

Web community representatives met the idea of Internet settlement unwillingly. Shakers of Internet business in its turn consider selective and non-cruel functions of Internet control. “Facebook” creator Mark Zuckerberg thinks that strengthening of Internet control is impossible: “ No one can forbid the usage of interesting spheres , and strictly control the others”.

As far as private user’s information is concerned here Mark Zuckerberg considers the necessity of lifting the ban for profile creating by children under 13 years. It should be reminded that according to USA law since 2000 web-sites have no right to gather private information from kids under 13 years old without parent’s e-mail permission. 27 years old Zuckerberg is sure : ” As far as education is concerned you are to get the profile in Facebook the sooner the better”. Mark considers both his own resource Facebook and Internet in the whole as a very useful in educational process.


Season Renovation. Arovax Gives Spring Discounts and SmartHide Good Functional Quality

Wednesday, May 25th, 2011

24 of May 2011 Arovax LLC, a leading company in producing online security software announced the reduction of price for SmartHide software. It provides the security for web-users and helps them to get the access to the blocked sites in different countries.

SmartHide Season Renovation

SmartHide Season Renovation

So the price for the most popular subscription “USA Subscription” is less on $4.98 (previous price $24.95) , it makes SmartHide more available, USA citizens can use it while being abroad or on week-ends. Subscription keeps settings no matter where you log in.

Package Extension
By popular demand a new subscription has been added – SmartHide Two Continents Subscription. It helps users to work with USA and EUR servers for personal web security.

Order Page Simplification
Order page has become most convenient and simple. Even an inexperienced user will be able to understand the intricacies in several seconds.

Purchase stage has become simple too, there are two types of billings available.

Support Section Update
It will be easier to apply to technical support. Operational report system has been improved, it makes possible to get a guaranteed response in 24 hours.

Regular Content Updates (Facebook, Twitter, SmartHide Blog)
Recent SmartHide life events (innovations, developments, discounts, actions, special propositions, etc.) are regularly covered in popular social networks, news section website and in corporate blog.

Customer’s Reviews
One of the grateful customers emphasized: “SmartHide helps me much in long work trips to countries with no access to my working sites, sites for spending time with friends and relatives. Now when it costs me less money, I can buy several licenses for home and office usage.”

In general SmartHide spring renovation includes several changes which are positive either for external and internal quality of software functioning.


Strengthening of Web Censorial Frameworks in Africa

Tuesday, May 24th, 2011

The danger of new mass protest which took place in Egypt, Tunis, Libya Africa’s official representatives started the company of strengthening web censorial frameworks, – reported Al Jazeera.

Web Censorial Frameworks in Africa

Web Censorial Frameworks in Africa

It appeared number of African countries have already started this procedure.

Ethiopia’s government blocks pages of political opposition’s sites, independent news’ blocks and human’s rights protection organizations.

On 14 of April Uganda’s Communication Commission order to block internet provider’s access to Facebook and Twitter for 24 hours. It was done on the eve of planned protest against the growth provision’s and fuel’s prices in the country.

The strengthening of censorial frameworks appeared in Republic of Burundi and small country in Central Africa too. Last year local authorities arrested local news site’s editor-in-chief who was sentenced to life imprisonment in April 2011.

In some countries they prefer to filter thematically organized sites. So in March government in Cot-De – Voir ordered providers to block sites with critical content towards Lorano Gbagbo.

Government in Sudan in its turn prefers not to block web resources in the country but trace opposition’s and anti-governmental leaders’ protests in means of social nets.

According to independent expert Patrick Meier recently government have released special social web-group with protest’s slogans and then arrested all it members.

Despite gradual development situation around web access in Africa’s country is rather difficult. At the present time Africa’s population constitutes 5,6% of internet audience .

If you are interested in speech freedom and security Register SmartHide for FREE to  express thoughts no matter either you are limited in Internet access or not.


USA Released the Strategy of Internet Security

Thursday, May 19th, 2011

Official representatives of USA  released the  strategy  of Internet  security according to  which there must be international rules  enhancing security in net and providing  safe space for  free commerce  and effective socio-economical  development .

Internet Security

Internet Security

The document includes several principle points of constructing international cyber security.

On the whole USA intends to create free cyber trade mechanism of protection of the participant’s rights and commercial trade secrets.  They also plan to develop the   special Code of Conduct compulsory for all international community. The partnership with other countries will be realized by the means of special international organizations.

Cyber criminality is at the center of attention. The White House presupposes to keep the internet freedom dealing only with specific crimes. Planning and committing of the crime are the objects of the crime. Minister of Justice of USA Eric Holder announced the publication   to be   “historic event”.

It is expected that in producing this strategy will be involved all the offices: the Ministry of Justice, Ministry of Defense and the Ministry of Commerce.

USA hopes that in realizing   all the ideas pointed in the document will take part key partners of the country – Chine and Russia.

Hillary Clinton’s comments of the strategy inform us of USA intention to protect the freedom of speech in the Internet. The cyberspace is the new way of political expression and some governments    use it for   suppression.


Freedom of Cyber Space. Rights for Existence

Tuesday, May 17th, 2011

Community outcry is an evident consequence of the proposal of entering limitation frameworks in European net by analogy with Chinese model.

LEWP was proposed to block illegal content.

LEWP was proposed to block illegal content.

During the conference behind closed doors of European Union’s Law Enforcement Work Party – LEWP in February was proposed to create in Europe single Internet filter in order to block illegal content. On the late April there happened the information leakage, materials of the conference reached the mass media, it provoked the critics and protests of Internet users and providers who in its turn could be responsible for applying new rules. The official representatives of the Europe still have not provided neither conformation nor refutation of this information.

According to the documents published on the agenda of the given conference was considered the creating of “single European secure cyberspace” with its “virtual Schengen borders” which are similar to the real ones. The Internet border is intended to contribute the free transitions inside the blog and strictly control its external borders. In addition must be created “virtual access points” on which providers must block illegal content on the basis of EU’s blacklists.

Among the critics of the project there is a tendency to compare it with Chinese firewall which regulates citizen’s access to web sights of different countries.

The Pirate Bay started the fight!

The Pirate Bay started the fight!

On Monday The Pirate Bay, which spreads the pirate content, started the fight against such limitations. In the present time the site is blocked by Ireland, Italy and Denmark, The US government almost took away site’s domain name last year.

Pirate’s fears are actual – the intention to limit dataflow in the World Wide Web at the state level is actual in all countries, and in Europe too. It’s difficult to deny the pressure on public authorities by the groups which are commercially interested in blocking certain web sites.

Any Internet filters are of a technical problem at this stage. Even the unfortunate virtual “Great Wall of China” has a lot of exploits which lead to the information leakage.


Get 10% Discount Until June 01, 2011. Hurry Up!

Monday, May 16th, 2011
SmartHide 10% Discount Until June 01, 2011

SmartHide 10% Discount Until June 01, 2011


Spring Discount 10% for SmartHide Personal EUR Subscription.

Enter Coupon Code: springdiscount when you Order SmartHide and save 10% on the initial order and recurring charges!

To get 10% Discount Use This Link Only

Offer expires on June 01, 2011.


The phishing activity increases annually

Saturday, May 14th, 2011

The number of phishing attacks in the first quarter of 2011 has greatly increased with comparison of the data of the same period of 2010. Hackers used phishing attempts on 12% more from January to March of 2011 than at the same period of 2010.

Phishing Activity

Phishing Activity


The IID company considers the growth of phishing activity and recent internet security exploits will cause more serious phishing attacks , refined e-mail fraud directed to certain customers and organizations.

“As we know as a consequence of recent attacks on Sony PlayStation Network and on Epsilonhackers got the access to the private information of ten millions of customers, these data can be used in target phishing companies”- informed the president and the technical director of IID Rod Rasmussen.

“We worry that having all these data the hackers can urge people provide them valuable personal information. The companies should take all possible measures to stop these attacks they are to block the access to phishing sights and control the domains, check the domains on the presence of destructive programs which lead to the information leakage. It should be done with the help of the e-mail filters, firewalls and domain name recognition system” – he added.

Other positions of IID’s report:

  • Number of phishing attacks based on notifications on behalf of national banks increased on 11% from the fourth quarter of 2010 to the first quarter of 2011. The banks can be of two types: banks governed by the state and banks of the national level.
  • The biggest part of phishing attacks fell on those customers who live outside the USA.
  • Fraud mobile applications which are so similar to banking ones were downloaded for thousand times.

Biggest BitTorrent Downloading Case in U.S. History Targets 23,000 Defendants

Thursday, May 12th, 2011

At least 23,000 file sharers soon will likely get notified they are being sued for downloading the Expendablesin what has become the single largest illegal-BitTorrent-downloading case in U.S. history.

A federal judge in the case has agreed to allow the U.S. Copyright Group to subpoena internet service providers to find out the identity of everybody who had illegally downloaded (.pdf) the 2010 Sylvester Stallone flick — meaning the number of defendants is likely to dramatically increase as new purloiners are discovered. Once an ISP gets the subpoena, it usually notifies the account holder that his or her subscriber information is being turned over to the Copyright Group, which last year pioneered the practice of suing BitTorrent downloaders in the United States.

Subpoenas are expected to go out this week.

All told, more than 140,000 BitTorrent downloaders are being targeted in dozens of lawsuits across the country, many of them for downloading B-rated movies and porn.

Many lawyers are mimicking the Copyright Group’s legal strategy, which includes offering online settlement payments, in hopes of making quick cash. The litigation can be so lucrative — with settlements around $3,000 per infringement — that two companies are both claiming ownership to a low-budget movie called Nude Nuns with Big Guns, and both firms are suing the same downloaders.

Not all federal judges, are agreeing to allow a massive number of subpoenas in a single case, but many are. The U.S. Copyright Act allows damages of up to $150,000 per infringement, and the cases all demand the maximum.

“It is well beyond time that the courts take control of these automated enterprises being run at great taxpayer expense with the active assistance of the federal court system,” said Lory Lybeck, a Washington state attorney defending about 100 BitTorrent defendants.

The IP addresses of the alleged copyright scofflaws are easily discoverable. Film companies pay snoops to troll BitTorrent sites, dip into active torrents and capture the IP addresses of the peers who are downloading and uploading pieces of the files.

The closest single lawsuit in size to the Expendables case targets 15,551 BitTorrent users for downloading a handful of porn flicks with titles such as Big Dick Glory Holes and Spin on My Cock. A judge has not decided whether to authorize subpoenas in that case.

Thomas Dunlap, who heads the Copyright Group in Washington, D.C., did not return phone messages. He informed the court Wednesday that, so far, he’s obtained 23,322 IP addresses (.pdf) that have allegedly infringed the Expendables, up from 6,500 when he initially filed the District of Columbia federal court case in February.

See terrifying evidence here>>>>

Convinced? Protect yourself with SmartHide>>>

Source  (с)