<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><meta name="Generator" content="Microsoft Word 12 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
span.hoenzb
        {mso-style-name:hoenzb;}
span.EstiloCorreioElectrnico18
        {mso-style-type:personal-reply;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
.MsoChpDefault
        {mso-style-type:export-only;}
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
        {page:WordSection1;}
--></style></head><body lang="PT" link="blue" vlink="purple"><div class="WordSection1"><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Tudo está correcto . Com os erros todos aprendemos , e, aprendendo, é suposto não os repetir . Portanto é preciso ter algum cuidado em avançar desmesuradamente e quase em competição , com informação com dados acrescentados que muitas vezes se revelam irrelevantes ou contraditórios . Porquê esta competição do “ fui eu , fui eu quem informou primeiro “ ? O meio termo sempre foi boa atitude .</span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">73 numa tarde calorosa e húmida , pelo menos aqui pela Beira Alta .</span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">CT1RH</span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span></p><div style="border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0cm 0cm 0cm"><p class="MsoNormal"><b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif"">De:</span></b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif""> <a href="mailto:cluster-bounces@radio-amador.net">cluster-bounces@radio-amador.net</a> [mailto:<a href="mailto:cluster-bounces@radio-amador.net">cluster-bounces@radio-amador.net</a>] <b>Em nome de </b>Carlos Pinheiro<br><b>Enviada:</b> quinta-feira, 30 de Julho de 2015 16:11<br><b>Para:</b> Resumo Noticioso ARLA/CLUSTER<br><b>Assunto:</b> Re: ARLA/CLUSTER: Vídeo demonstra como aceder a um vulgar telemóvel através da rede GSM</span></p></div><p class="MsoNormal"> </p><div><p class="MsoNormal">Caro colega, não tem nada que pedir desculpa !</p><div><p class="MsoNormal"> </p></div><p class="MsoNormal">"errare humanum est" :-)</p><div><p class="MsoNormal"> </p></div><div><p class="MsoNormal">Eu é que agradeço a quantidade de artigos interessantes a que tenho acesso graças a colegas como o CT1FBF e outros !</p></div><div><p class="MsoNormal"> </p></div><div><p class="MsoNormal">73</p></div><div><p class="MsoNormal">CP</p></div><div><p class="MsoNormal"> </p></div></div><div><p class="MsoNormal"> </p><div><p class="MsoNormal">2015-07-30 16:02 GMT+01:00 João Costa > CT1FBF <<a href="mailto:ct1fbf@gmail.com" target="_blank">ct1fbf@gmail.com</a>>:</p><p class="MsoNormal"> Prezado Colega Carlos,<br><br>Tem toda a razão e peço desculpa pelo meu erro.<br><span style="color:#888888"><br><span class="hoenzb">João Costa (CT1FBF)</span></span></p><div><div><p class="MsoNormal" style="margin-bottom:12.0pt"><br>2015-07-30 15:29 GMT+01:00 Carlos Pinheiro <<a href="mailto:karlus.pinheiro@gmail.com">karlus.pinheiro@gmail.com</a>>:<br>> Caro João Costa,<br>><br>> Acho que o título não está muito correcto, pois lendo o artigo conclui-se<br>> que a ideia é aceder aos dados de um PC através de um simples telemóvel e<br>> não " aceder a um vulgar telemóvel através da rede GSM ".<br>><br>><br>> 73 de CT1PT<br>> CP<br>><br>><br>> 2015-07-30 12:25 GMT+01:00 João Costa > CT1FBF <<a href="mailto:ct1fbf@gmail.com">ct1fbf@gmail.com</a>>:<br>>><br>>> Researchers hack air-gapped computer with simple cell phone<br>>><br>>> THE MOST SENSITIVE work environments, like nuclear power plants, demand<br>>> the strictest security. Usually this is achieved by air-gapping computers<br>>> from the Internet and preventing workers from inserting USB sticks into<br>>> computers. When the work is classified or involves sensitive trade secrets,<br>>> companies often also institute strict rules against bringing smartphones<br>>> into the workspace, as these could easily be turned into unwitting listening<br>>> devices.<br>>><br>>> But researchers in Israel have devised a new method for stealing data that<br>>> bypasses all of these protections—using the GSM network, electromagnetic<br>>> waves and a basic low-end mobile phone. The researchers are calling the<br>>> finding a “breakthrough” in extracting data from air-gapped systems and say<br>>> it serves as a warning to defense companies and others that they need to<br>>> immediately “change their security guidelines and prohibit employees and<br>>> visitors from bringing devices capable of intercepting RF signals,” says<br>>> Yuval Elovici, director of the Cyber Security Research Center at Ben-Gurion<br>>> University of the Negev, where the research was done.<br>>><br>>> The attack requires both the targeted computer and the mobile phone to<br>>> have malware installed on them, but once this is done the attack exploits<br>>> the natural capabilities of each device to exfiltrate data. Computers, for<br>>> example, naturally emit electromagnetic radiation during their normal<br>>> operation, and cell phones by their nature are “agile receivers” of such<br>>> signals. These two factors combined create an “invitation for attackers<br>>> seeking to exfiltrate data over a covert channel,” the researchers write in<br>>> a paper about their findings.<br>>><br>>> The research builds on a previous attack the academics devised last year<br>>> using a smartphone to wirelessly extract data from air-gapped computers. But<br>>> that attack involved radio signals generated by a computer’s video card that<br>>> get picked up by the FM radio receiver in a smartphone.<br>>><br>>> Read the full story at:<br>>><br>>> <a href="http://www.wired.com/2015/07/researchers-hack-air-gapped-computer-simple-cell-phone/" target="_blank">http://www.wired.com/2015/07/researchers-hack-air-gapped-computer-simple-cell-phone/</a><br>>><br>>><br>>> _______________________________________________<br>>> CLUSTER mailing list<br>>> <a href="mailto:CLUSTER@radio-amador.net">CLUSTER@radio-amador.net</a><br>>> <a href="http://radio-amador.net/cgi-bin/mailman/listinfo/cluster" target="_blank">http://radio-amador.net/cgi-bin/mailman/listinfo/cluster</a><br>>><br>><br>><br>><br>> --<br>> Carlos Pinheiro<br>><br>> _______________________________________________<br>> CLUSTER mailing list<br>> <a href="mailto:CLUSTER@radio-amador.net">CLUSTER@radio-amador.net</a><br>> <a href="http://radio-amador.net/cgi-bin/mailman/listinfo/cluster" target="_blank">http://radio-amador.net/cgi-bin/mailman/listinfo/cluster</a><br>></p></div></div><p class="MsoNormal" style="margin-bottom:12.0pt"><br>_______________________________________________<br>CLUSTER mailing list<br><a href="mailto:CLUSTER@radio-amador.net">CLUSTER@radio-amador.net</a><br><a href="http://radio-amador.net/cgi-bin/mailman/listinfo/cluster" target="_blank">http://radio-amador.net/cgi-bin/mailman/listinfo/cluster</a></p></div><p class="MsoNormal"><br><br clear="all"></p><div><p class="MsoNormal"> </p></div><p class="MsoNormal">-- </p><div><p class="MsoNormal">Carlos Pinheiro</p></div></div><div class="MsoNormal" align="center" style="text-align:center"><hr size="1" width="100%" noshade style="color:#a0a0a0" align="center"></div><p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">Não foram detetados vírus nesta mensagem.<br>Verificado por AVG - <a href="http://www.avg.com">www.avg.com</a><br>Versão: 2015.0.6081 / Base de dados de Vírus: 4392/10336 - Data de Lançamento: 07/30/15</p></div></body></html>