Come modificare il menu “Invia a” in Windows7

A partire da Vista non è più possibile modificare direttamente il menu “Invia a” contestuale (il “Send To”, per gli anglofoni) poiché le directory in questione del profilo utente sono protette dal sistema operativo.
E’ possibile arrivarci, però, digitando nella barra degli indirizzi la variabile %APPDATA% e premendo invio: la directory in questione si trova poi sotto “Microsoft”, “Windows”, “SendTo”.

%APPDATA%MicrosoftWindowsSendTo

Iran Forced To Replace Centrifuges To Stop Stuxnet

https://threatpost.com/en_us/blogs/report-iran-resorts-rip-and-replace-kill-stuxnet-072211

“The report from the Web site DEBKA file cites “intelligence sources” in claiming that Stuxnet was not purged from Iran’s nuclear sites and that the country was never able to return its uranium enrichment operation to “normal operation.” Instead, the country has said in recent days that it is installing newer and faster centrifuges at its nuclear plants and intends to speed up the uranium enrichment process, according to the country’s foreign ministry.

Staremo a vedere se (quando…) verrà fatto uscire un worm Stuxnet 2.0 per sabotare le nuove centrifughe, o se verranno usati metodi alternativi.

[reblog] TCP Tricks to Detect Rogue Wireless Access Points

tratto da http://isc.sans.edu/diary.html?storyid=10615

…If rogue APs are plugged into your network, they will decrease the TTL value in all packets by one that traverse through the access point.  This can make it easy to detect the presence of those by using p0f/tcpdump/snort to look for packets that have TTL values that are lower than expected.  This also works for unauthorized routers, virtual images, bad network stack configurations, etc.  It won’t detect APs that aren’t plugged into your network and has some gaps (for instance, a savvy individual could modify the TTL they use before sending packets out), but again it is a “dirty” method of detection.  The advantage of looking for bad “TTLs” is that you will also have advance detection of network problems as well.
You can profile your network and find legitimate TTL values by running tcpdump -v and verifying the information with a network diagram (each router, NAT device, etc will lower TTL by 1).