How to create a bootable USB

 

bootable USB guide, here we assume that you are using either Vista or Windows 7 to create a bootable USB.

1. Insert your USB (4GB+ preferable) stick to the system and backup all the data from the USB as we are going to format the USB to make it as bootable.

2. Open elevated Command Prompt. To do this, type in CMD in Start menu search field and hit Ctrl + Shift + Enter. Alternatively, navigate to Start > All programs >Accessories > right click on Command Prompt and select run as administrator.

3. When the Command Prompt opens, enter the following command:

DISKPART and hit enter.

LIST DISK and hit enter.

Once you enter the LIST DISK command, it will show the disk number of your USB drive. In the below image my USB drive disk no is Disk 1.

4. In this step you need to enter all the below commands one by one and hit enter. As these commands are self explanatory, you can easily guess what these commands do.

SELECT DISK 1 (Replace DISK 1 with your disk number)

CLEAN

CREATE PARTITION PRIMARY

SELECT PARTITION 1

ACTIVE

FORMAT FS=NTFS

(Format process may take few seconds)
ASSIGN

EXIT

Don’t close the command prompt as we need to execute one more command at the next step. Just minimize it.

5. Insert your Windows DVD in the optical drive and note down the drive letter of the optical drive and USB media. Here I use “D” as my optical (DVD) drive letter and “H” as my USB drive letter.

6. Go back to command prompt and execute the following commands:

D:CD BOOT and hit enter. Where “D” is your DVD drive letter.

CD BOOT and hit enter to see the below message.
BOOTSECT.EXE/NT60 H:

(Where “H” is your USB drive letter)

7. Copy Windows DVD contents to USB.

You are done with your bootable USB. You can now use this bootable USB as bootable DVD on any computer that comes with USB boot feature (most of the current motherboards support this feature).

Note that this bootable USB guide will not work if you are trying to make a bootable USB on XP computer.

Editor e conversor de imagens online

Para quem faz muita apresentação, as vezes é necessário converter formatos de imagens. Descobri ontem esse site que converte imagens online http://www.coolutils.com/Online/Image-Converter/ .

Se você precisa editar alguma imagem e o Paint do Windows não é suficiente. Existe o Thumba. Um ótimo editor de imagens online (em silverlight). http://thumba.com.br/

Uma ‘mão na roda’ para ações rápidas.

Instale o Windows 7 por um PenDrive

Microsoft, disponibilizou uma ferramenta chamada Microsoft Windows 7 USB/DVD Download Tool, que possibilita a criação de um pendrive inicializável e com todos os arquivos necessários para que a instalação do Windows 7 seja feita.

 

 

A interface do Microsoft Windows 7 USB/DVD Download Tool é bem simples, contando com poucas telas e opções, o que lembra muito os assistentes de instalação do Windows. Ao todos são quatro passos para a criação de um disco inicializável, cada um deles descrito em uma tela do programa. Para avançar até a próxima etapa, basta escolher as opções desejadas e clicar em “Next”.

Rodando Windows de um USB flash drive

Ótima documentação que mostra como configurar um pen drive USB para rodar Windows 7 (Live USB)

 

I’ve titled this post as “Running Windows from a USB flash drive” because the same principles should be equally applicable to all Windows 7-based operating systems (and even Vista if the Windows 7 bootloader is used) but my specific scenario was based on Hyper-V Server 2008 R2.
I got this working a few hours after Windows 7, Server 2008 and Hyper-V Server 2008 R2 were released to manufacturing but I was still using release candidate code – fingers crossed it still works with the final release!
Boot from VHD is a fantastic new technology in Windows 7/Server 2008 R2 and derivative operating systems and I’ve often wondered if it’s possible to use it to run Hyper-V from a USB flash drive (just like the “embedded” version of VMware ESXi offered by some OEMs). Well, as it happens it is – and this post describes the steps I had to take to make it work.
First of all, I needed to create a virtual hard disk and install an operating system onto it. As Keith Combs noted, there are various ways to do this but only one is supported; however there is also a handy video on TechNet which takes you through the steps of creating a VHD and booting from it.
Using the TechNet video as a guide, I issued the following commands from the command prompt to create my virtual hard disk and apply an image from the Hyper-V Server 2008 R2 release candidate DVD:
diskpart
create vdisk file=driveletter:\virtualharddisk.vhd maximum=15000 type=expandable
select vdisk file=driveletter:\virtualharddisk.vhd
attach vdisk
list disk
(make a note of the disk number.)
select disk disknumber
create partition primary
select partition 1
active
format fs=ntfs quick
assign
exit
(note the drive letter for the newly mounted VHD.)
imagex /info dvddrive:\sources\install.wim
(identify the correct entry.)
imagex /apply dvddrive:\sources\install.wim /check imageindex vhddrive:\
diskpart
select vdisk file=driveletter:\virtualharddisk.vhd
detach vdisk
exit
At this point, Hyper-V Server had been imaged into my new VHD, which could then be copied to the USB flash drive.
Next, to load the VHD from the Boot Manager, I edited the boot configuration data (which is what would be required in a standard boot from VHD scenario); however, as I found later, a different set of actions is needed for booting from the USB flash drive.
bcdedit /copy {current} /d "Hyper-V Server 2008 R2"
bcdedit
(make a note of the GUID for the newly created entry.)
bcdedit /set {guid} device vhd=[usbdrive:]\virtualharddisk.vhd
bcdedit /set {guid} osdevice vhd=[usbdrive:]\virtualharddisk.vhd
bcdedit /set {guid} detecthal on
bcdedit /set {guid} description “Hyper-V Server 2008 R2″
It’s worth understanding that the use of drive letters (which are transient in nature) does not cause a problem as the BCD Editor (bcdedit.exe) extracts the data about the partition and saves it in the BCD store (i.e. it does not actually save the drive letter).
After rebooting, Hyper-V Server loaded from my USB flash drive and ran through the out of box experience. At this stage I had Hyper-V Server running off the flash drive but only if my original Windows installation (with the boot manager) was available and, as soon as I removed the hard disk (I wanted to be sure that I was booting off the flash drive with no other dependencies), then the whole thing collapsed in a heap. Thanks to Garry Martin, I checked my BIOS configuration and made sure that USB device boots were enabled (they were not) but I then spent about a day playing around with various BCD configurations (as well as various attempts to fix my BCD with bootrec.exe) until I stumbled on a post from Vineet Sarda (not for the first time, based on the comments that include one from yours truly a few weeks back!) that discusses booting from VHD without a native operating system.
Following Vineet’s example, I booted my system into Windows 7 (I could have used the Windows Recovery Environment), reformatted the USB flash drive before copying my VHD image back onto it, and issued the following commands:
diskpart
select vdisk file=usbdrive:\virtualharddisk.vhd
attach vdisk
list volume
exit
(note the drive letter for the newly mounted VHD.)
bcdboot vhddrive:\Windows /s usbdrive: /v
(i.e. copying the BCD from the operating system image contained within the VHD, to the physical USB drive. Note that, when running on a live system it is important to specify the target drive for the BCD in order to avoid overwriting the live configuration.)
I then shut down the system, removed the hard disk and booted from the USB flash drive, after which the Windows Boot Manager loaded an operating system from within the VHD.
Looking at my BCD configuration (shown here for reference), I can see the source of my many hours of confusion – the Boot Manager resides on the physical media (my USB key – which was allocated drive D: in this case) and loads an operating system from the virtual disk that is given another drive letter (in this case C:):
Windows Boot Manager
——————–
identifier              {bootmgr}
device                  partition=D:
description             Windows Boot Manager
locale                  en-us
inherit                 {globalsettings}
default                 {current}
resumeobject            {27f66313-771a-11de-90bb-00037ab36ab6}
displayorder            {current}
toolsdisplayorder       {memdiag}
timeout                 30
Windows Boot Loader
——————-
identifier              {current}
device                  partition=C:
path                    \windows\system32\winload.exe
description             Hyper-V Server 2008 R2
locale                  en-us
inherit                 {bootloadersettings}
osdevice                partition=C:
systemroot              \windows
resumeobject            {27f66313-771a-11de-90bb-00037ab36ab6}
nx                      OptOut
detecthal               Yes
It took a while to boot (my flash drive was a freebie is not the fastest in the world) but, once loaded into memory, Hyper-V Server seemed to run without any noticeable delay. I figure that, as long as the workload is stored on another disk this should not present any problems and, given suitably fast flash memory, it ought to be possible to improve boot times as well. Running a full Windows operating System (e.g. Windows 7) in this manner is an entirely different matter – very few USB flash drives will be able to stand the constant writes and further testing would be required.
Now that I have Hyper-V Server running from an inexpensive USB flash drive with no reliance on my PC’s internal hard disk, all I need to do is inject the correct network drivers and I will have a virtualisation solution for colleagues who want to run a full hypervisor on their corporate notebooks, without deviating from the company’s standard client build.
Additional information
The following notes/links may provide useful background information:
Boot Configuration Data Editor Frequently Asked Questions on Microsoft TechNet.
Note that the boot from VHD functionality in Windows 7/Windows Server 2008 R2 does not support the use of BitLocker or hibernation

Converta seu HD em VHD

Uma das novas funcionalidades do Windows 7 é a de permitir que arquivos VHD (Virtual hard Disk) sejam usados como discos físicos. Agora uma novidade legal é que podemos transformar nosso HD em VHD. Entre várias vantagens, podemos falar na possibilidade do backup de todos os dados do nosso micro, incluindo Sistema Operacional.

Para isso iremos precisar de uma ferramenta bem simples chamada DISK2VHD que pode ser baixada do próprio site do Technet Brasil através do link http://technet.microsoft.com/en-us/sysinternals/ee656415.aspx

A ferramenta é simples de utilizar e não gasta mais do que 20 minutos para converter dos os seus dados para um arquivo VHD, após a conversão poderemos fazer uma cópia do arquivo a mantê-lo guardado, caso seu micro seja infectado com vírus ou até ocorra de você perder seu micro inteiro, os dados estarão salvos.

Informações sobre segurança na internet

 

Principais Certificações de Segurança

CISSP Certified Information Systems Security Professional (http://www.isc2.org/)
CISM Certified Information Security Management (http://www.isaca.org/)
CISA Certified Information Systems Auditor (http://www.isaca.org/)
BS7799 Lead Auditor (http://www.bsi-global.com/)
SSCP Systems Security Certified Practitioner (http://www.isc2.org/)
GIAC Global Information Assurance Certification (http://www.sans.org/)
CSP RSA Certified Security Professional (http://www.rsa.com/)    
CBCP Certified Business Continuity Professional (http://www.drii.org/)
ABCP Associate Business Continuity Professional (http://www.drii.org/)
MBCP Master Business Continuity Professional (http://www.drii.org/)   
CCSA Certification in Control Self-Assessment (http://www.theiia.org/)
CIA Certified Internal Auditor  (http://www.theiia.org/)
CFE Certified Fraud Examiner (http://www.cfenet.com/
CPP Certified Protection Professional (http://www.asisonline.org/)

 

Centros de Pesquisa

FERMA – Federation on European Risk Management Associations http://www.ferma-asso.org/
AIRMIC – The Association of Insurance and Risk Managers http://www.airmic.com/
ALARM – The National Forum for Risk Management in the PSector http://www.alarm-uk.com/
IRM – The Institute od Risk Management http://www.theirm.org/
UNICAMP – Equipe de Segurança em Sistemas de Rede http://www.security.unicamp.br/
NIC BR http://www.nic.br/
CERT – Computer Emergency Response Team http://www.cert.org/
CERT.br – Centro de Estudos, Resposta e Tratamento de Incidentes Brasil http://www.cert.br/
ISA – Internet Security Alliance http://www.isalliance.org/
FIRST – Forum of Incident Response and Security Teams http://www.first.org/
RNP CAIS – Centro de Atendimento a Incidentes de Segurança http://www.rnp.br/cais
ISO/IEC 17799:2000 Information Security Management – http://www.iso.org/
SANS Institute – System Administration, Networking, and Security http://www.sans.org/
US-CERT – United States Computer Emergency Readiness Team http://www.us-cert.gov/
CSRC – Computer Security Resource Center, NIST – http://crsc.ncsl.nist.gov/
CSI – Computer Security Institute http://www.gocsi.com/
Security Focus http://www.securityfocus.com
Secunia http://www.secunia.com
MICROSOFT Centro de Segurança – http://www.microsoft.com/brasil/security/default.mspx

 

Institutos de Pesquisa e Desenvolvimento Profissional

ISACA – Information System Security & Control Association http://www.isaca.org/
ISC2 – International Information Systems Security Certification Consortium http://www.isc2.org/
ISSA – Information System Security Professionals http://www.issa.org/ http://www.issabrasil.org/
BSI – British Stantard Institution http://www.bsi-global.com/
DRI – Disaster Recovery Institute http://www.drii.org/
SANS Institute http://www.sans.org/
CompTIA http://www.comptia.org/
BCI – Business Continuity Institute http://www.thebci.ogr/
CISSPs http://www.cissps.com/
RSA http://www.rsa.com/
ASIS http://www.asisonline.org/
CFENET http://www.cfenet.com %20iisp/ – Intitute of Information Security Professionals (UK)
IISP Institute of Information Security Professionals (UK) http://www.instisp.com/
Information Security Management Maturity Model (ISM3) http://www.ism3.com/
ABRAIC http://www.abraic.org.br/
Brazilian Information Security http://www.brassec.com.br/
Associação Brasileira de Analistas de Inteligência Competitiva

 

Comunidades e Guias

ISMS International User Group www.xisec.com/
Comunidade ISMS PT http://ismspt.blogspot.com/
IFTF Info Security Task Force http://www.istf.com.br/vb/index.php
Blog CISSP http://www.cissp-certification.info/
Guia Sobre Sites http://www.sobresites.com/segurancadainformacao/index.htm
Microsoft Security http://www.microsoft.com/brasil/athome/security/default.mspx
Cartilha de Segurança na Internet http://cartilha.cert.br/
Navegue Seguro – http://www.navegueprotegido.org/
Internet Segura – http://www.internetsegura.org/

 

Standards

BSI BS25999-1: DRAFT DPC http://www.bsi-global.com/Risk/BusinessContinuity/bs25999.xalter
BSI BS7799-2:2002, http://www.bsi-global.com/
BSI BS ISO/IEC 27001:2005, http://www.bsi-global.com/
BSISEI CMMI, http://www.sei.cmu.edu/cmmi/
ISACA COBIT, http://www.isaca.org/
EA 7/03, http://www.european-accreditation.org/
ISO 13335, http://www.iso.org/
ISO 19011:2002, http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=31169
ITSM, ITIL, http://www.itil-itsm-world.com/
ISSA GAISP, http://www.issa.org/gaisp/_pdfs/v30.pdf
IETF RFC2119, http://rfc.net/rfc2119.html
NIST SP800-53, http://csrc.nist.gov/publications/nistpubs/
NIST SP800-55, http://csrc.nist.gov/publications/nistpubs/
ISO 9001:2000, http://www.iso.org/
ISO/IEC 17799:2000, http://www.bsi-global.com/
ISO 18044, ISO 15228, http://www.iso.org/
ISO 15408, http://www.iso.org/
ISO 12207, http://www.iso.org/

 

Bibliografia

•MACHADO, André e FREIRE, Alexandre, Como Blindar seu PC, Editora Campus 2006 
• NBR/ISO/IEC 17799. Tecnologia da Informação: Código de prática para a gestão da segurança da informação. ABNT, 2002. 56p
• PELTIER, Thomas R.: Information Security Policies and Procedures – a practitioner’s reference. Auerbach Publications. 373p.
• DOU. Decreto nº3.505, que institui Política de Segurança na Administração Federal.13 Jun 2000.
• DOU. Decreto 3.587. Estabelece a composição de ICP do governo. 5 de setembro de 2000.
• PARKER, Donn. Fighting Computer Crime: a new framework for protecting information. New York: Willey. 1998. 512p.
• GIL, Antonio de Loureiro. Segurança em Informática. 2 ed.. São Paulo: Atlas, 1998. 193p.
• HUTT, Arthur E. et al. Computer Security Handbook. 3rd Edition. New York: John Wiley & Sons, Inc. 1995.
• RUSSEL, Deborah e GANGEMI, G.T. Computer Security Basics. California, O’Reilly & Associates, Inc. 1991. 441p.
• KRAUSE TIPON, Handbook of Information Security Management 1999, Editora Auerback
• VALLABHANENI, S.Rao. CISSP Examination Texbooks. Vol1: Theory. SRV Professional Publications, Illinois. 2000. 519p.
• ISO/IEC JTC 1/SC 27. Glossary of IT Security Terminology. Information technology – security techniques. 1998.
• SCHNEIER, Bruce. Segurança.com – Segredos e mentiras sobre a proteção na vida digital. Editora Campus.
• DIAS, Claudia, Segurança e Auditoria da Tecnologia da Informação, Axcel Books, 2000. 
• BRASILIANO, Antônio Celso Ribeiro, A (In)segurança nas Redes Empresariais, Editora Sicurezza 2002.

 

Lista de Blogs em Português sobre Segurança da Informação:
 

Vitor Santos: http://hackbusters.blogspot.com/
Jerônimo Zucco: http://jczucco.blogspot.com/
Alexandro Silva: http://blog.alexos.com.br
Gabriel Lima: http://www.falandodeseguranca.com
Fábio Dapper: http://openpci.blogspot.com/
Luiz Zanardo: http://siembrasil.blogspot.com
Alexandre Teixeira: http://foren6.wordpress.com
Emerson Wendt: http://www.emersonwendt.com.br
Lucas Ferreira: http://blog.sapao.net
Marcos Nascimento: http://respostaincidente.blogspot.com
Maycon Vitali : http://blog.hacknroll.com
Fernando Amatte – http://segurancaimporta.blogspot.com
Tony Rodrigues: http://forcomp.blogspot.com
CAIS/RNP: http://www.rnp.br/cais/alertas
ThreatPost BR: http://threatpost.com/pt_br
Luis Rabelo: http://forensics.luizrabelo.com.br
Paulo Braga: http://cyberneurons.blogspot.com
Marcelo Souza: http://marcelosouza.com
Anchises: http://anchisesbr.blogspot.com
Wagner Elias: http://wagnerelias.com
Nelson Brito: http://fnstenv.blogspot.com
Microsoft BR: http://blogs.technet.com/risco
Anderson Ramos: http://www.flipside-scp.com.br/blog
William Caprino: http://mrbilly.blogspot.com
NaoPod PodCast: http://naopod.com.br
Ivo e Ronaldo: http://brainsniffer.blogspot.com
Rodrigo Montoro: http://spookerlabs.blogspot.com
Claudio Moura: http://webcasting-today.blogspot.com
José Mariano A Filho: http://mariano.delegadodepolicia.com
Otavio Ribeiro: http://otavioribeiro.com
Rodrigo Jorge: http://qualitek.blogspot.com
Luis Bittencourt: http://arquivosmaximus.blogspot.com
Bruno Gonçalves: http://g0thacked.wordpress.com
NextHop: http://blog.nexthop.com.br
Linha Defensiva: http://www.linhadefensiva.org
ISTF: http://www.istf.com.br
InfoAux: http://infoaux-security.blogspot.com
RfdsLabs: http://www.rfdslabs.com.br
Nod32 e Segurança: http://esethelp.blogspot.com
CamargoNeves: http://camargoneves.wordpress.com
Luiz Vieira: http://hackproofing.blogspot.com
Pedro Quintanilha: http://pedroquintanilha.blogspot.com
Gustavo Bittencourt: http://www.gustavobittencourt.com
Marcelo Martins: http://administrandoriscos.wordpress.com
Raffael Vargas Imasters UOL: http://bit.ly/8lyvdT
Alex Loula: http://alexloula.blogspot.com
Victor Santos: http://hackbusters.blogspot.com
Fábio Sales – http://www.abrigodigital.com.br
Drak – http://deadpackets.wordpress.com
Edison Fontes – http://edison.fontes.blog.uol.com.br
Marcos Aurélio: http://deigratia33.blogspot.com
Marcos Abadi: http://marcosabadi.blogspot.com
ComputerWorld – http://computerworld.uol.com.br/seguranca
IDGNow – http://idgnow.uol.com.br/seguranca
WebSegura – http://www.websegura.net (PT)
Unsecurity: http://www.unsecurity.info (PT)
Infosec Portugal: http://www.infosec.online.pt (PT)
CrkPortugal: http://www.crkportugal.net (PT)
Seg. Informática: http://www.seguranca-informatica.net (PT)
ISMSPT: http://ismspt.blogspot.com (PT)
WebAppSec: http://webappsec.netmust.eu (PT)
Miguel Almeida: http://miguelalmeida.pt/blog_index.html (PT)
SSegurança: http://sseguranca.blogspot.com

 

 

 

Twitter – Profissionais da área de Segurança da Informação
 
1.    Adriano Cansian: @adrianocansian
2.    Alan: @djalancs
3.    Alexandre Vargas: @alexvrn
4.    Altieres Rohr: @altieres
5.    Anchises M. G de Paula (eu, só para constar): @anchisesbr
6.    Anderson Ramos: @aramosorg
7.    Andre Felipe: @afelipealves
8.    Andre Pitkowski: @andrepit
9.    Arthur Scarpato: @ascarpato
10.    Augusto Paes de Barros: @apbarros
11.    Bruno G. de Oliveira: @mphx2
12.    Bruno Zani: @brunozani
13.    Carlos E. Santiviago: @segfault
14.    Carol Bozza: @carolbozza
15.    Cleber Brandao: @clebeer
16.    Coriolano Camargo: @CoriolanoAC
17.    Derneval Cunha: @curupira
18.    Dimitri Abreu: @dimitriabreu
19.    Edu Godinho: @egodinho
20.    Eduardo V. C. Neves: @evcneves
21.    Emerson Wendt: @emersonwendt
22.    Erasmo Guimarães: @erasmoguimaraes
23.    Fabiano Paixão: @fabianopaixao
24.    Fabio Assolini: @assolini
25.    Fábio Juliano Dapper: @fjdapper
26.    Fabio Sales: @fsales
27.    Fernando Amatte: @famatte
28.    Fernando Carbone: @flcarbone
29.    Fernando Fonseca: @fernandofonseca
30.    Filipe Balestra: @filipebalestra
31.    Fioravanti Cavallari: @fiocavallari
32.    Francisco Milagres: @fmilagres
33.    Gabriel Hayduk: @_hayduk
34.    Gisele Truzzi : @giseletruzzi
35.    Guilherme: @marinheiroc
36.    Hélio Cordeiro: @heliocordeiro
37.    Igor de Oliveira Sá: @igordeoliveira
38.    Ivan Carlos: @IvanCarlos
39.    Jayme Orts y Lugo: @ortsylugo
40.    Jeronimo Zucco: @jczucco
41.    Joaquim Espinhara: @jespinhara
42.    Jordan Bonagura: @jbonagura
43.    José Antonio Milagre: @periciadigital
44.    José Mariano A. Fº (Delegado): @Digital_Crimes
45.    Julio Cesar Fort: @juliocesarfort
46.    Leonardo Cavallari: @leocm
47.    Leonardo Goldin: @goldim
48.    Lucas Donato: @lucasdonato
49.    Lucas Marques: @Lucasg3
50.    Luciano Barreto: @LuckyBarr
51.    Lucimara Desiderá: @ldesidera
52.    Luiz Eduardo (LE): @elduardo
53.    Luiz Zanardo: @lzanardo
54.    Marcelo Caiado: @mbcaiado
55.    Marcelo Carvalho: @MarCarvalho
56.    Marco Botelho: @botelho
57.    Marcos Cabral: @maraurcab
58.    Maria Tereza Aarão (a Teca!): @mtaarao
59.    Marlon Borba: @mborba
60.    Marlon Dias: @marlon_net
61.    Michel Pereira: @michelpereira
62.    Nelson Biagio Junior: @Nelsonb
63.    Nelson Brito: @nbrito
64.    Nelson Murilo: @nelsonmurilo
65.    Nelson Novaes: @nnovaes
66.    Omar Kaminski: @internetlegal
67.    Paolo Oliveira: @paoloo
68.    Paulo Renato: @PRenato
69.    Paulo Teixeira: @paulort
70.    Paulo Vianna: @pvianna
71.    Pedro César: @tecdom
72.    Pedro Bueno: @besecure
73.    Peixinho: @ivocarv
74.    Raphael Cerdeira: @RaphaelCerdeira
75.    Reginaldo Rizato: @rarizato
76.    Renato Opice Blum: @Opiceblum
77.    Ricardo Castro: @profrcastro
78.    Ricardo Giorgi: @ricseclx
79.    Rodrigo Branco: @bsdaemon
80.    Rodrigo Jorge: @rodrigojorge
81.    Rogerio Kaza: @rckasa
82.    Rodrigo Montoro(Sp0oKeR): @spookerlabs
83.    Ronaldo Vasconcelos: @ronaldotcom
84.    Sandro Süffert: @suffert
85.    Sergio Dias: @stdiasp
86.    Thiago Bordini: @tbordini
87.    Thiago Nascimento: @palmitu
88.    Thiago Prado: @tdprado
89.    Thiago Zaninotti: @zaninotti
90.    Uelinton Santos: @uelintons
91.    Vanessa Padua: @vpadua
92.    Victor Bonomi: @victorbonomi
93.    Vinícius K-Max: @viniciuskmax
94.    Vladimir Amarante: @vamarante
95.    Wagner Elias: @welias
96.    Weber Ress: @WeberRess
97.    Welkson Renny: @welkson
98.    Willian Caprino: @wcaprino

 

 

 

Twitter – Entidades ou publicações na área de segurança da informação
 

1.    ARIS/Linha Defensiva: @linhadefensiva
2.    BR Connection: @BRconnection
3.    CAIS: @cais_rnp
4.    CNASI: @CNASI
5.    Conviso: @conviso
6.    Dynsec Labs: @dynsec
7.    Firebits (Backtrack Brasil): @backtrackbrasil
8.    G1 Segurança: @g1seguranca
9.    H2HC conference: @h2hconference
10.    HackerSPace: @hackerspaceSP
11.    IDETI: @IDETI
12.    ISSA Brasil: @issabrasil
13.    IT Security Brazil: @securitybr
14.    ITversa Security: @itversa
15.    MalwarePatrol: @MalwarePatrol
16.    NStalker: @nstalker
17.    Teknobank: @teknobank
18.    The Bug! Magazine: @thebugzine
19.    YSTS: @ystscon

Entenda a interface do Windows Phone 7

 

 

A interface do recém anunciado sistema operacional para telefones da Microsoft é uma revolução na maneira de navegar em um dispositivo. Ela funciona como se você estivesse navegando em uma grande área horizontal em cada sessão do sistema.

 

Assim como aconteceu com o Windows 7 (sistema operacional de desktop da Microsoft), o Windows Phone 7 recebem ótimas críticas de várias páginas especializadas ao redor do mundo.

 

Abaixo um trecho de uma delas:

Windows Phone 7 feels like an iPhone from the future. The UI has the simplicity and elegance of Apple’s industrial design, while the iPhone’s UI still feels like a colorized Palm Pilot.

http://gizmodo.com/5472010/windows-phone-7-interface-microsoft-has-out+appled-apple?skyline=true&s=i

 

Telas demonstram melhor como funciona a interface do futuro sistema operacional para celulares da Microsoft.